Binary file handouts/ho01.pdf has changed
--- a/handouts/ho01.tex Thu Sep 10 09:45:10 2015 +0100
+++ b/handouts/ho01.tex Sun Sep 20 22:09:58 2015 +0100
@@ -47,7 +47,7 @@
hypothetically, about ways in which you can cheat in an exam
(whether it is by hiding notes or by looking over the
shoulders of your fellow pupils). Right? To defend a system,
-you need to have this kind mindset and be able to think like
+you need to have this kind of mindset and be able to think like
an attacker. This will include understanding techniques that
can be used to compromise security and privacy in systems.
This will many times result in insights where well-intended
@@ -137,13 +137,13 @@
generate random enough numbers (nonces) on which the security
of the underlying protocols relies.
-The problem with all this is that the banks who introduced
-Chip-and-PIN managed with the new system to shift the
-liability for any fraud and the burden of proof onto the
+The overarching problem with all this is that the banks who
+introduced Chip-and-PIN managed with the new system to shift
+the liability for any fraud and the burden of proof onto the
customer. In the old system, the banks had to prove that the
customer used the card, which they often did not bother with.
-In effect, if fraud occurred the customers were either refunded
-fully or lost only a small amount of money. This
+In effect, if fraud occurred the customers were either
+refunded fully or lost only a small amount of money. This
taking-responsibility-of-potential-fraud was part of the
``business plan'' of the banks and did not reduce their
profits too much.
@@ -191,7 +191,7 @@
a web-application that has the feature of recording how many times a
customer visits a page. For example in order to give a discount
whenever the customer has visited a webpage some $x$ number of times
-(say $x$ equal $5$). There is one more constraint: we want to store
+(say $x$ equals $5$). There is one more constraint: we want to store
the information about the number of visits as a cookie on the
browser. I think, for a number of years the webpage of the New York
Times operated in this way: it allowed you to read ten articles per
@@ -200,8 +200,8 @@
was visited, because if I switched browsers I could easily circumvent
the restriction about ten articles.\footnote{Another online media that
works in this way is the Times Higher Education
- \url{http://www.timeshighereducation.co.uk}. It also uses cookies to
-restrict the number of free articles to five.}
+ \url{http://www.timeshighereducation.co.uk}. It also seems to
+ use cookies to restrict the number of free articles to five.}
To implement our web-application it is good to look under the
hood what happens when a webpage is displayed in a browser. A
@@ -531,12 +531,12 @@
as simple as it might seem. At the beginning only ``real''
dictionaries were available (like the Oxford English
Dictionary), but such dictionaries are not optimised for the
-purpose of cracking passwords. The first real hard data about actually
-used passwords was obtained when a company called RockYou
-``lost'' 32 Million plain-text passwords. With this data of
-real-life passwords, dictionary attacks took off. Compiling
-such dictionaries is nowadays very easy with the help of
-off-the-shelf tools.
+purpose of cracking passwords. The first real hard data about
+actually used passwords was obtained when a company called
+RockYou ``lost'' at the end of 2009 32 Million plain-text
+passwords. With this data of real-life passwords, dictionary
+attacks took off. Compiling such dictionaries is nowadays very
+easy with the help of off-the-shelf tools.
These dictionary attacks can be prevented by using salts.
Remember a hacker needs to use the most likely candidates
@@ -629,6 +629,14 @@
\url{http://goo.gl/dIzqMg}
\end{center}
+\noindent Here is an interesting blog-post about how a group
+``cracked'' efficiently millions of bcrypt passwords from the
+Ashley Madison leak.
+
+\begin{center}
+\url{http://goo.gl/83Ho0N}
+\end{center}
+
\noindent Clearly, passwords are a technology that comes to
the end of its usefulness, because brute force attacks become
more and more powerful and it is unlikely that humans get any
Binary file handouts/ho02.pdf has changed
Binary file handouts/ho03.pdf has changed
--- a/handouts/ho03.tex Thu Sep 10 09:45:10 2015 +0100
+++ b/handouts/ho03.tex Sun Sep 20 22:09:58 2015 +0100
@@ -28,9 +28,9 @@
ylabel={\% of total attacks},
ylabel style={yshift=-1em},
enlargelimits=false,
- xtick={1997,1998,2000,...,2014},
+ xtick={1997,1999,2001,...,2015},
xmin=1996.5,
- xmax=2015,
+ xmax=2016,
ymax=21,
ytick={0,5,...,20},
scaled ticks=false,
Binary file handouts/ho04.pdf has changed
Binary file handouts/ho05.pdf has changed
Binary file handouts/ho06.pdf has changed
Binary file handouts/ho07.pdf has changed
Binary file handouts/ho08.pdf has changed
Binary file handouts/ho09.pdf has changed
Binary file hws/hw01.pdf has changed
Binary file hws/hw02.pdf has changed
Binary file hws/hw03.pdf has changed
Binary file hws/hw04.pdf has changed
Binary file hws/hw05.pdf has changed
Binary file hws/hw06.pdf has changed
Binary file hws/hw07.pdf has changed
Binary file hws/hw08.pdf has changed
Binary file hws/so04.pdf has changed
Binary file pics/barrier.jpg has changed
Binary file slides/slides01.pdf has changed
--- a/slides/slides01.tex Thu Sep 10 09:45:10 2015 +0100
+++ b/slides/slides01.tex Sun Sep 20 22:09:58 2015 +0100
@@ -9,7 +9,7 @@
\hfuzz=220pt
% beamer stuff
-\renewcommand{\slidecaption}{APP 01, King's College London}
+\renewcommand{\slidecaption}{SEN 01, King's College London}
\lstset{language=JavaScript,
style=mystyle,
@@ -23,12 +23,11 @@
\begin{frame}
\frametitle{%
\begin{tabular}{@ {}c@ {}}
- \LARGE Access Control and \\[-3mm]
- \LARGE Privacy Policies (1)\\[-6mm]
+ \LARGE Security Engineering (1)\\[-3mm]
\end{tabular}}
\begin{center}
- \includegraphics[scale=1.3]{../pics/barrier.jpg}
+ \includegraphics[scale=0.3]{../pics/barrier.jpg}
\end{center}
\normalsize
@@ -46,90 +45,12 @@
\begin{frame}
\begin{center}
-\includegraphics[scale=2.1]{../pics/barrier.jpg}
-\end{center}
-
-\end{frame}
-%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
-%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\begin{frame}
-
-\begin{center}
-\begin{tikzpicture}[scale=1.3]
- %\draw[very thick, scale=1] (0, 0) grid (6, -4);
- \draw (0,0) node (X) {\includegraphics[scale=0.1]{../pics/rman.png}};
- \draw (6,0) node (Y) {\includegraphics[scale=0.1]{../pics/gman.png}};
- \node[below] at (X.south) {Alice};
- \node[below] at (Y.south) {Bob};
-
- \draw[red,<->,line width = 3mm] (X) -- (Y);
- \node [inner sep=5pt,label=above:{\begin{tabular}{c}
- secure/private\\
- communication
- \end{tabular}}]
- at ($ (X)!.5!(Y) $) {};
-
- \draw (1.0,-1.5) node {\includegraphics[scale=0.05]{../pics/nsa.png}};
- \draw (2.4,-1.5) node {\includegraphics[scale=0.3]{../pics/gchq.jpg}};
- \draw (1.7,-2.3) node {\huge\ldots};
- \draw (4.2,-1.5) node {\includegraphics[scale=0.05]{../pics/apple.png}};
- \draw (5.4,-1.7) node {\includegraphics[scale=0.15]{../pics/google.png}};
- \draw (5.0,-2.3) node {\huge\ldots};
-\end{tikzpicture}
-\end{center}
-
-\begin{center}
-\includegraphics[scale=0.1]{../pics/snowden.jpg}
+\includegraphics[scale=0.5]{../pics/barrier.jpg}
\end{center}
\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\begin{frame}
-
-\begin{center}
-\includegraphics[scale=0.45]{../pics/lavabit-email.jpg}
-\end{center}
-\small{}\mbox{}\hfill{}
-Lavabit email service closed down on 8 August 2013. \\
-\mbox{}\hfill{}\url{www.goo.gl/bgSrVp}
-
-\end{frame}
-%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
-%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\begin{frame}
-\frametitle{Also Bad Guys}
-
-\begin{textblock}{1}(4,2.5)
- \begin{tikzpicture}[scale=1.3]
- \draw (0,0) node (X) {\includegraphics[scale=0.1]{../pics/rman.png}};
- \draw (4,0) node (Y) {\includegraphics[scale=0.1]{../pics/gman.png}};
- \draw[red, <->, line width = 2mm] (X) -- (Y);
- \end{tikzpicture}
-\end{textblock}
-
-\begin{textblock}{1}(1,5)
-\begin{bubble}[11cm]
-\small
-Anonymous Hacker operating a 10k bonnet using the ZeuS
-hacking tool wrote:\medskip\\ ``FYI I do not cash out the bank
-accounts or credit cards, I just sell the information (I know,
-its just as bad...), there isn't even a law against
-such in most countries, dealing with stolen information is
-most of the time a legally greyzone (I was just as surprised
-when I looked it up), I'm not talking about 3rd world
-countries, but about European like Spain (The Mariposa botnet
-owner never got charged, because a botnet isn't illegal, only
-abusing CC information is, but that did other guys).''
-\hfill{}\url{www.goo.gl/UWluh0}
-\end{bubble}
-\end{textblock}
-
-\end{frame}
-%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\begin{frame}
@@ -140,7 +61,7 @@
\end{center}
\centering
-\begin{bubble}[9cm]
+\begin{bubble}[10cm]
\small
There is some consensus that the NSA can probably not
brute-force magically better than the ``public''.
@@ -748,84 +669,6 @@
\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\begin{frame}[t]
-\begin{itemize}
-\item While cookies are per web-page, this can be easily circumvented.
-\end{itemize}
-
-\begin{textblock}{1}(1.5,4.5)
-\begin{tabular}{c}
-\includegraphics[scale=0.07]{../pics/servers.png}\\[-2mm]
-\small Pet Store\\[-2mm]
-\small Dot.com\\[-2mm]
-\end{tabular}
-\end{textblock}
-
-\begin{textblock}{1}(1.5,8)
-\begin{tabular}{c}
-\includegraphics[scale=0.07]{../pics/servers.png}\\[-2mm]
-\small Dating.com
-\end{tabular}
-\end{textblock}
-
-\begin{textblock}{1}(10.5,7.5)
-\begin{tabular}{c}
-\includegraphics[scale=0.07]{../pics/servers.png}\\[-2mm]
-\small Evil-Ad-No\\[-2mm]
-\small Privacy.com
-\end{tabular}
-\end{textblock}
-
-\begin{textblock}{1}(6,10.5)
-\begin{tabular}{c}
-\includegraphics[scale=0.16]{../pics/rman.png}\\[-1mm]
-\small you
-\end{tabular}
-\end{textblock}
-
-\begin{textblock}{1}(4,5)
- \begin{tikzpicture}[scale=1]
- \draw[white] (0,0.5) node (X) {};
- \draw[white] (5.7,-1) node (Y) {};
- \draw[red, ->, line width = 0.5mm] (X) -- (Y);
- \node [inner sep=5pt,label=above:\textcolor{black}{}] at ($ (X)!.5!(Y) $) {};
- \end{tikzpicture}
-\end{textblock}
-
-\begin{textblock}{1}(4,7.9)
- \begin{tikzpicture}[scale=1]
- \draw[white] (0,0) node (X) {};
- \draw[white] (5.7,0) node (Y) {};
- \draw[red, ->, line width = 0.5mm] (X) -- (Y);
- \node [inner sep=5pt,label=above:\textcolor{black}{}] at ($ (X)!.5!(Y) $) {};
- \end{tikzpicture}
-\end{textblock}
-
-\begin{textblock}{1}(3.3,9.3)
- \begin{tikzpicture}[scale=1.2]
- \draw[white] (0,0) node (X) {};
- \draw[white] (1.5,-1) node (Y) {};
- \draw[red, <->, line width = 2mm] (X) -- (Y);
- \node [inner sep=5pt,label=above:\textcolor{black}{}] at ($ (X)!.5!(Y) $) {};
- \draw[white] (0.9,0.3) node (X1) {};
- \draw[white] (1.9,-1) node (Y1) {};
- \draw[red, <->, line width = 2mm] (X1) -- (Y1);
- \node [inner sep=5pt,label=above:\textcolor{black}{}] at ($ (X1)!.5!(Y1) $) {};
- \end{tikzpicture}
-\end{textblock}
-
-\begin{textblock}{1}(8.6,10.1)
- \begin{tikzpicture}[scale=0.9]
- \draw[white] (0,0) node (X) {};
- \draw[white] (-2,-1) node (Y) {};
- \draw[red, <->, line width = 0.5mm] (X) -- (Y);
- \node [inner sep=5pt,label=above:\textcolor{black}{}] at ($ (X)!.5!(Y) $) {};
- \end{tikzpicture}
-\end{textblock}
-
-\end{frame}
-%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\begin{frame}[c]
@@ -860,7 +703,7 @@
\begin{frame}[c]
\begin{center}
-\includegraphics[scale=1.8]{../pics/barrier.jpg}
+\includegraphics[scale=0.5]{../pics/barrier.jpg}
\end{center}
\begin{itemize}
@@ -949,10 +792,10 @@
}
\begin{itemize}
-\item \texttt{\$} is separator
+\item \texttt{\$} is the separator
\item \texttt{1} is MD5 (actually SHA-512 is used nowadays, \texttt{6})
-\item \texttt{QIGCa} is salt
-\item \texttt{ruJs8AvmrknzKTzM2TYE} $\rightarrow$ password + salt
+\item \texttt{QIGCa} is the salt
+\item \texttt{ruJs8AvmrknzKTzM2TYE.} $\rightarrow$ password + salt
\end{itemize}
\textcolor{gray}{\small
@@ -1015,6 +858,10 @@
\item June 6th, 2012, 6 million unsalted SHA-1 passwords were leaked from linkedIn
% linkedIn password
% http://erratasec.blogspot.co.uk/2012/06/confirmed-linkedin-6mil-password-dump.html
+
+\item in July 2015, hackers leaked a password database from
+Ashley Madison containing 31 million passwords, many of them
+poorly hashed
\end{itemize}\medskip
\small
@@ -1078,7 +925,6 @@
\begin{itemize}
\item Do not send passwords in plain text.
\item Security questions are tricky to get right.
-\item QQ (Chinese Skype) authenticates you via contacts.
\end{itemize}
\end{frame}
@@ -1089,20 +935,76 @@
\frametitle{This Course}
\begin{itemize}
+\item electronic voting
\item break-ins (buffer overflows)
\item access control\\ (role based, data security / data integrity)
-\item electronic voting
-\item protocols (specification)
-\item access control logic
+\item protocols
+\item zero-knowledge proofs
\item privacy
\begin{quote}
Scott McNealy: \\``You have zero privacy anyway. Get over it.''
\end{quote}
-\item zero-knowledge proofs
+\item trust, bitcoins
+\item static analysis
\end{itemize}
\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+\begin{frame}[c]
+\frametitle{Books + Homework}
+
+\begin{itemize}
+\item There is no single book I am following, but
+
+ \begin{center}
+ \includegraphics[scale=0.012]{../pics/andersonbook1.jpg}
+ %%\includegraphics[scale=0.23]{../pics/accesscontrolbook.jpg}
+ \end{center}\medskip\pause
+
+\item The question ``\emph{Is this relevant for the exams?}''
+ is not appreciated!\medskip\\
+
+ Whatever is in the homework (and is not marked optional) is
+ relevant for the exam. No code needs to be written.
+
+\end{itemize}
+
+\end{frame}
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+\begin{frame}[c]
+\frametitle{Further Information}
+
+For your personal interest:
+
+\begin{itemize}
+\item RISKS mailing list
+\item Schneier's Crypto newsletter
+\item Google+ Ethical Hacker group
+\end{itemize}
+
+\end{frame}
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+\begin{frame}[c]
+\frametitle{Take-Home Points}
+
+\begin{itemize}
+\item Never store passwords in plain text.\medskip
+\item Always salt your hashes!\medskip
+\item Use an existing crypto algorithm; do not write your own!\medskip
+\item Make the party responsible for losses that is in the position to improve
+security.
+\end{itemize}
+
+\end{frame}
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+
+
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\begin{frame}[c]
@@ -1189,60 +1091,9 @@
\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\begin{frame}[c]
-\frametitle{Books + Homework}
-
-\begin{itemize}
-\item There is no single book I am following
-
- \begin{center}
- \includegraphics[scale=0.012]{../pics/andersonbook1.jpg}
- %%\includegraphics[scale=0.23]{../pics/accesscontrolbook.jpg}
- \end{center}\medskip\pause
-
-\item The question ``Is this relevant for the exams'' is not appreciated!\medskip\\
-
- Whatever is in the homework (and is not marked optional) is relevant for the
- exam. No code needs to be written.
-\end{itemize}
-
-\end{frame}
-%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
-%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\begin{frame}[c]
-\frametitle{Further Information}
-
-For your personal interest:
-
-\begin{itemize}
-\item RISKS mailing list
-\item Schneier's Crypto newsletter
-\item Google+ Ethical Hacker group
-\end{itemize}
-
-\end{frame}
-%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+\end{document}
-%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\begin{frame}[c]
-\frametitle{Take-Home Points}
-
-\begin{itemize}
-\item Never store passwords in plain text.\medskip
-\item Always salt your hashes!\medskip
-\item Use an existing crypto algorithm; do not write your own!\medskip
-\item Make the party responsible for losses that is in the position to improve
-security.
-\end{itemize}
-
-\end{frame}
-%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
-
-\end{document}
%%% Local Variables:
%%% mode: xelatex
Binary file slides/slides02.pdf has changed
--- a/slides/slides02.tex Thu Sep 10 09:45:10 2015 +0100
+++ b/slides/slides02.tex Sun Sep 20 22:09:58 2015 +0100
@@ -9,7 +9,7 @@
\hfuzz=220pt
% beamer stuff
-\renewcommand{\slidecaption}{APP 02, King's College London}
+\renewcommand{\slidecaption}{SEN 02, King's College London}
%Bank vs Voting
%http://www.parliament.vic.gov.au/images/stories/committees/emc/2010_Election/submissions/13_VTeague_EMC_Inquiry_No.6.pdf
@@ -26,8 +26,7 @@
\frametitle{%
\begin{tabular}{@ {}c@ {}}
\\
- \LARGE Access Control and \\[-3mm]
- \LARGE Privacy Policies (2)\\[-6mm]
+ \LARGE Security Engineering (2)\\[-3mm]
\end{tabular}}\bigskip\bigskip\bigskip
\normalsize
Binary file slides/slides03.pdf has changed
--- a/slides/slides03.tex Thu Sep 10 09:45:10 2015 +0100
+++ b/slides/slides03.tex Sun Sep 20 22:09:58 2015 +0100
@@ -9,7 +9,7 @@
\hfuzz=220pt
% beamer stuff
-\renewcommand{\slidecaption}{APP 03, King's College London}
+\renewcommand{\slidecaption}{SEN 03, King's College London}
\begin{document}
@@ -19,8 +19,7 @@
\frametitle{%
\begin{tabular}{@ {}c@ {}}
\\
- \LARGE Access Control and \\[-3mm]
- \LARGE Privacy Policies (3)\\[-6mm]
+ \LARGE Security Engineering (3)\\[-3mm]
\end{tabular}}\bigskip\bigskip\bigskip
\normalsize
Binary file slides/slides04.pdf has changed
--- a/slides/slides04.tex Thu Sep 10 09:45:10 2015 +0100
+++ b/slides/slides04.tex Sun Sep 20 22:09:58 2015 +0100
@@ -11,7 +11,7 @@
\hfuzz=220pt
% beamer stuff
-\renewcommand{\slidecaption}{APP 04, King's College London}
+\renewcommand{\slidecaption}{SEN 04, King's College London}
\newcommand{\bl}[1]{\textcolor{blue}{#1}}
\begin{document}
@@ -21,8 +21,7 @@
\frametitle{%
\begin{tabular}{@ {}c@ {}}
\\
- \LARGE Access Control and \\[-3mm]
- \LARGE Privacy Policies (4)\\[-6mm]
+ \LARGE Security Engineering (4)\\[-3mm]
\end{tabular}}\bigskip\bigskip\bigskip
\normalsize
Binary file slides/slides05.pdf has changed
--- a/slides/slides05.tex Thu Sep 10 09:45:10 2015 +0100
+++ b/slides/slides05.tex Sun Sep 20 22:09:58 2015 +0100
@@ -12,7 +12,7 @@
% beamer stuff
\newcommand{\bl}[1]{\textcolor{blue}{#1}}
-\renewcommand{\slidecaption}{APP 05, King's College London}
+\renewcommand{\slidecaption}{SEN 05, King's College London}
\begin{document}
@@ -22,8 +22,7 @@
\frametitle{%
\begin{tabular}{@ {}c@ {}}
\\
- \LARGE Access Control and \\[-3mm]
- \LARGE Privacy Policies (5)\\[-6mm]
+ \LARGE Security Engineering (5)\\[-3mm]
\end{tabular}}\bigskip\bigskip\bigskip
\normalsize
Binary file slides/slides06.pdf has changed
--- a/slides/slides06.tex Thu Sep 10 09:45:10 2015 +0100
+++ b/slides/slides06.tex Sun Sep 20 22:09:58 2015 +0100
@@ -9,7 +9,7 @@
% beamer stuff
\newcommand{\bl}[1]{\textcolor{blue}{#1}}
-\renewcommand{\slidecaption}{APP 06, King's College London}
+\renewcommand{\slidecaption}{SEN 06, King's College London}
\begin{document}
@@ -18,8 +18,7 @@
\frametitle{%
\begin{tabular}{@ {}c@ {}}
\\
- \LARGE Access Control and \\[-3mm]
- \LARGE Privacy Policies (6)\\[-6mm]
+ \LARGE Security Engineering (6)\\[-3mm]
\end{tabular}}\bigskip\bigskip\bigskip
\normalsize
Binary file slides/slides07.pdf has changed
--- a/slides/slides07.tex Thu Sep 10 09:45:10 2015 +0100
+++ b/slides/slides07.tex Sun Sep 20 22:09:58 2015 +0100
@@ -2,7 +2,7 @@
\usepackage{../slides}
% beamer stuff
-\renewcommand{\slidecaption}{APP 07, King's College London}
+\renewcommand{\slidecaption}{SEN 07, King's College London}
\newcommand{\bl}[1]{\textcolor{blue}{#1}}
\begin{document}
@@ -15,8 +15,7 @@
\frametitle{%
\begin{tabular}{@ {}c@ {}}
\\
- \LARGE Access Control and \\[-3mm]
- \LARGE Privacy Policies (7)\\[-6mm]
+ \LARGE Security Engineering (7)\\[-3mm]
\end{tabular}}\bigskip\bigskip\bigskip
\normalsize
Binary file slides/slides08.pdf has changed
--- a/slides/slides08.tex Thu Sep 10 09:45:10 2015 +0100
+++ b/slides/slides08.tex Sun Sep 20 22:09:58 2015 +0100
@@ -6,7 +6,7 @@
\usetikzlibrary{shapes}
% beamer stuff
-\renewcommand{\slidecaption}{APP 08, King's College London}
+\renewcommand{\slidecaption}{SEN 08, King's College London}
\newcommand{\bl}[1]{\textcolor{blue}{#1}}
\newcommand{\DOWNarrow}[3]{%
@@ -33,8 +33,7 @@
\frametitle{%
\begin{tabular}{@ {}c@ {}}
\\
- \LARGE Access Control and \\[-3mm]
- \LARGE Privacy Policies (8)\\[-6mm]
+ \LARGE Security Engineering (8)\\[-3mm]
\end{tabular}}\bigskip\bigskip\bigskip
\normalsize
Binary file slides/slides09.pdf has changed
--- a/slides/slides09.tex Thu Sep 10 09:45:10 2015 +0100
+++ b/slides/slides09.tex Sun Sep 20 22:09:58 2015 +0100
@@ -6,7 +6,7 @@
\usepackage{soul}
% beamer stuff
-\renewcommand{\slidecaption}{APP 09, King's College London}
+\renewcommand{\slidecaption}{SEN 09, King's College London}
\newcommand{\bl}[1]{\textcolor{blue}{#1}}
\begin{document}
@@ -16,8 +16,7 @@
\frametitle{%
\begin{tabular}{@ {}c@ {}}
\\
- \LARGE Access Control and \\[-3mm]
- \LARGE Privacy Policies (9)\\[-6mm]
+ \LARGE Security Engineering (9)\\[-3mm]
\end{tabular}}\bigskip\bigskip\bigskip
\normalsize
Binary file slides/slides10.pdf has changed
--- a/slides/slides10.tex Thu Sep 10 09:45:10 2015 +0100
+++ b/slides/slides10.tex Sun Sep 20 22:09:58 2015 +0100
@@ -6,7 +6,7 @@
\usepackage{../grammar}
% beamer stuff
-\renewcommand{\slidecaption}{APP 10, King's College London}
+\renewcommand{\slidecaption}{SEN 10, King's College London}
\newcommand{\bl}[1]{\textcolor{blue}{#1}}
\begin{document}
Binary file slides/slides11.pdf has changed
--- a/slides/slides11.tex Thu Sep 10 09:45:10 2015 +0100
+++ b/slides/slides11.tex Sun Sep 20 22:09:58 2015 +0100
@@ -6,7 +6,7 @@
\usepackage{../grammar}
% beamer stuff
-\renewcommand{\slidecaption}{APP 11, King's College London}
+\renewcommand{\slidecaption}{SEN 11, King's College London}
\newcommand{\bl}[1]{\textcolor{blue}{#1}}
\begin{document}