External Readings
These external readings supplement the concepts that will be
covered in lectures. Most of the readings are freely available
to anyone, while some papers are licensed the UMN community via
the libraries. For this latter category you should use the
library proxy, a university VPN, or an on-campus computer to
access them free of charge.
-
David A. Wheeler, Secure
Programming HOWTO. Chapters 3, Summary of Linux and Unix
Security Features, and 7, Design Your Program for Security,
skipping section 7.16. (Quiz due 10/29)
-
OWASP Top 10 - 2017: The Ten Most Critical Web Application Security Risks
-
Anderson, chapter 5, Cryptography
-
Introduction
to Modern Cryptography, Jonathan Katz and Yehuda Lindell,
Chapter 1, Introduction,
sections 1.1, 1.2, and 1.4.
-
Anderson, chapter 15, Biometrics
-
Anderson section 23.5, Elections (part of chapter 23,
The
Bleeding Edge); Joseph A. Calandrino, Ariel J. Feldman,
J. Alex Halderman, David Wagner, Harlan Yu, and William
P. Zeller. "Source
Code Review of the Diebold Voting System", Executive Summary
through Section 3: Major Attacks (pp. i-17)