skip to primary navigationskip to content
 

Course pages 2025–26

Computer Security: Principles and Foundations

This course is taught in a seminar style. Each week we expect students to read the set papers below and either prepare a presentation or submit an essay. During the session we will then watch the presentations and discuss the papers.

Slides

  1. Introduction to R209
  2. Thunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection via DMA from Untrustworthy Peripherals
  3. Spy-oT: Understanding How Users Learn to Use Internet of Things Devices For Abusive Purposes

Reading assignments

The following papers are assigned reading for R209, which should be read prior to the class indicated. Please contact the module instructors if you have any questions.

  1. Threat modelling (9 October 2025 - Watson, Hutchings)

  2. Usable security (16 October 2025 - Hutchings)

  3. Fifty Years of Access Control (23 October 2025 - Watson)

  4. Leveraging hardware vulnerabilities (30 October 2025 - Beresford)

  5. Security Economics (6 November 2025 - Hutchings)

  6. Correctness vs. Mitigation (13 November 2025 - Watson)

  7. Cryptographic identity (20 November 2025 - Kleppmann)

  8. Metadata-private communications (27 November 2025 - Kleppmann, Beresford)

    Optional additional readings: