Below follows a day-by-day calendar for the class, including reading assignments, lecture topics, and courseworks. Lecture notes will be posted immediately after each lecture.
Class meetings consist largely of discussions of research papers. They are designed under the assumption that students have already read the assigned papers. If you do not read the papers that appear on a day of the calendar before that day's lecture, you are likely to have difficulty following the lecture and discussion.
N.B. that all assigned readings are examinable.
Monday | Wednesday | Friday |
30th Sep Course Introduction; Lecture Notes: Lecture Notes: |
2nd Oct Design: Worse Is Better; Reading: Worse Is Better Lecture Notes: |
4th Oct |
7th Oct NFS Reading: NFS Case Study (accessible only through UCL IS account) Reading: Design and Implementation of the Sun Network Filesystem Lecture Notes: |
9th Oct RPC and Transparency; Coursework Background Reading: Coursework 1 Out: Lecture Notes: |
11th Oct |
14th Oct Ivy: Distributed Shared Memory Reading: Ivy Lecture Notes: |
16th Oct Two-Phase Commit Lecture Notes: |
18th Oct |
21st Oct Paxos Reading: Paxos Lecture Notes: |
23rd Oct Bayou: Weak Connectivity and Update Conflicts Reading: Bayou Lecture Notes: |
25th Oct |
28th Oct GFS: The Google File System Reading: GFS Lecture Notes: |
30th Oct Busy Servers: Receive Livelock Reading: Eliminating Receive Livelock Lecture Notes: Coursework 1 Due, 5:05 PM |
1st Nov |
4th Nov Reading week; no lecture today! |
6th Nov Reading week; no lecture today! |
8th Nov |
11th Nov Introduction to Security; Lecture Notes: |
13th Nov Cryptographic Primitives I Lecture Notes: |
15th Nov Cryptographic Primitives II Lecture Notes: The Kerberos Authentication Service Reading: Kerberos Lecture Notes: |
18th Nov Secure Sockets Layer (SSL) Lecture Notes: |
20th Nov Reasoning Formally about Authentication: TAOS Reading: TAOS Lecture Notes: Coursework 2 Out: |
22nd Nov |
25th Nov No lecture today! |
27th Nov No lecture today! |
29th Nov |
2nd Dec Software Vulnerabilities and Exploits Reading: Smashing the Stack for Fun and Profit Reading: Exploiting Format String Vulnerabilities Reading: Once Upon a free() Lecture Notes: |
4th Dec Preventing Exploits Reading: TaintCheck Reading: PaX Overview Reading: ASLR Overview Reading: Limits of Address Space Randomization Lecture Notes: |
6th Dec |
9th Dec Containing Buggy Code: Software-based Fault Isolation Reading: SFI Lecture Notes: |
11th Dec OKWS: Approximating Least Privilege in a Real-World Web Server Reading: OKWS Lecture Notes: Coursework 2 Due in lecture: 9:35 AM |
13th Dec |