**This is an old revision of the document!**
Exam 2
Date: Tues Dec 8th
Location: In Class
Closed book, No notes
Study the lecture slides available on the web site, and other readings
Secure email (example of how we combine symmetric and asymmetric encryption to send an encrypted message)
TLS Handshake
Review Exam 1 problems
Multi-Factor Authentication
Attacks against, and countermeasures for programs that hold passwords
Buffer Overflow Attacks
Binary extraction attacks and the use of a debugger.
Integer Manipulation Vulnerabilities
Passwords
Ken Thompson compiler hack - how it works
Principle of Least Privilege
Defense in Depth
Remaining topics are for final exam
Social Engineering