**This is an old revision of the document!**
Exam 2
Date: Tues Dec 8th
Location: In Class
Closed book, No notes
Study the lecture slides available on the web site, and other readings
MAC and HMAC (abstract definitions and also specific examples)
Secure email (example of how we combine symmetric and asymmetric encryption to send an encrypted message)
TLS Handshake
Review Exam 1 problems
Buffer Overflow Attacks
Integer Manipulation Vulnerabilities
Passwords
Ken Thompson compiler hack - how it works
Principle of Least Privilege
Remaining topics are for final exam
Social Engineering