CS 356 is graduate course that covers foundational work and current topics in computer and network security. The course consists of reading and discussing published research papers, presenting recent security work, and completing an original research project.
Discussion: Mon/Wed 1:30–2:50 PM. Location TBA.
This course is largely based on in-person discussion rather than lecture. Attendance is expected.
火箭加速器app安卓版下载 Zakir Durumeric
Office Hours: Monday 3:00–4:00 PM, or by appointment. Gates 280.
Course Assistant: TBA. Office hours by appointment.
Prerequisites: CS 356 is open to all graduate students as well as advanced undergraduate students. While the course has no official prerequisites, it requires a mature understanding of software systems and networks. I encourage undergraduate students to first take CS 155: Computer and Network Security.
Communication: We use 手机加速器下载火箭版 for announcements and discussion. Students can superⅴpn 下载 at any time.
Submissions: All course assignments should be submitted through Gradescope. Enrollment code: TBA.
The tentative schedule and required readings for the class are below:
Short Blog Post. Chris Palmer.
S. Keshav.
火箭加速器下载官网. N. Heninger, Z. Durumeric, E. Wustrow, J.A. Halderman.
CCS '14. Gunes Acar, Christian Eubank, Steven Englehardt, Marc Juarez, Arvind Narayanan, Claudia Diaz.
WWW '10. Sid Stamm, Brandon Sterne, Gervase Markham.
2008. Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger.
CCS '15. D. Adrian, K. Bhargavan, Z. Durumeric, P. Gaudry, M. Green, J.A. Halderman, N. Heninger, A. Springall, E. Thomé, L. Valenta, B. VanderSloot, E. Wustrow, S. Zanella-Beguelin, P. Zimmermann.
SEC '13. Devdatta Akhawe, Adrienne Porter Felt.
手机加速器下载火箭版. Kurt Thomas, Danny Yuxing Huang, David Wang, Elie Bursztein, Chris Grier, Thomas Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, Giovanni Vigna.
SEC '16. K. Thomas, J. Elices Crespo, R. Rasti, J. Picod, C. Phillips, M. Decoste, C. Sharp, F. Tirelo, A. Tofigh, M. Courteau, L. Ballard, R. Shield, N. Jagpal, M. Abu Rajab, P. Mavrommatis, N. Provos, E. Bursztein, D. McCoy.
CCS '08 Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey Voelker, Vern Paxson, and Stefan Savage.
SIGCOMM '06. Anirudh Ramachandran and Nick Feamster.
SEC '01. David Moore, Geoffrey Voelker, Stefan Savage.
SEC '17. M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z Durumeric, J.A. Halderman, L. Invernizzi, M. Kallitsis, D. Kumar, C. Lever, Z. Ma, J. Mason, D. Menscher, C. Seaman, N. Sullivan, K. Thomas, Y. Zhou.
CCS '07. Hovav Shacham.
Oakland '13. Laszlo Szekeres, Mathias Payer, Tao Wei, Dawn Song.
Apple Whitepaper.
SEC '01. Dawn Song, David Wagner, Xuqing Tia.
superⅴpn 下载. Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage.
Oakland '19. P. Kocher, J. Horn, A. Fogh, D. Genkin, D. Gruss, W. Haas, M. Hamburg, M. Lipp, S. Mangard, T. Prescher, M. Schwarz, Y. Yarom.
SEC '08. J.A. Halderman, S. Schoen, N. Heninger, W. Clarkson, W. Paul, J. Calandrino, A. Feldman, J. Appelbaum, E. Felten.
SEC '11. Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage.
火箭加速器 安卓 官网. Amit Levy, Bradford Campbell, Branden Ghena, Daniel B. Giffin, Pat Pannuto, Prabal Dutta, Philip Levis.
Oakland '16. Nicholas Carlini and David Wagner.
Oakland '10. Robin Sommer and Vern Paxson.
手机加速器下载火箭版. Roger Dingledine, Nick Mathewson, Paul Syverson.
SIGCOMM '15. Sam Burnett and Nick Feamster.
2013 CADO Policy Report. Julian Sanchez.
Wikipedia Article
H. Abelson, R. Anderson, S. Bellovin, J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, M. Green, S. Landau, P. Neumann, R. Rivest, J. Schiller, B. Schneier, M. Specter, D. Weitzner.
Blog Post. Bill Marczak and John Scott-Railton.
CHI '18. Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell.
CHES '13. Georg Becker, Francesco Regazzoni, Christof Paar, Wayne Burleson.
Symantec Technical Report. Nicolas Falliere, Liam Murchu, Eric Chien.
Phillip Rogaway.
Oakland '17. Cormac Herley and P.C. van Oorschot.
No assigned reading.
No assigned reading.
Attendance required. No assigned reading.
Attendance required. No assigned reading.
This course is composed of three parts: reading and discussing foundational papers in every class, reading and presenting recent work for one class, and completing a group research project. Grading will be based on:
Readings and Discussion (30%)
We will read and discuss 1–2 papers for each class. Typically, these will formative works in an area of security. Students should come prepared to actively discuss assigned papers and to make substantive intellectual contributions. This means that you need to thoroughly read each paper ahead of time. Before each section, students will submit a short (400 word) summary and reaction for each each paper, as well as a proposal of one discussion question for class.
Students should submit the reading assignments through Gradescope by noon on the day of each class.
Grading will be based 20% on these written responses and 10% on in-class participation. We do not allow any late days for paper reactions, but students may skip two paper summaries and two lectures without penalty. Participation grades are based on not only attendence, but active participation during class discussion.
Do not underestimate the amount of time required to properly read and process a research paper. Expect to spend several hours preparing for each section.
Topic Presentation (15%)
腾讯网游加速器app下载_腾讯加速器手机安卓版免费下载_游戏吧:2021-11-13 · 腾讯网游加速器是一款专为手游量身定制的加速器。用户通过使用加速器可众有效解决游戏过程中的延迟、卡顿问题,提升网络稳定性,优化手机内存空间,释放空间。
Course Project (55%)
Students will complete a quarter-long original research project in small groups (1–3 students) on a topic of their own choosing. Groups will present their work during the last two sections as well as submit a 6–10 page report, similar to the papers we read in the course.
Projects have four graded components:
Students should submit all reports through 火箭加速器永久免费版 by 11:59PM on the day of each deadline.
In past offerings, well-executed projects have led to publications at top-tier security conferences and workshops. I'm happy to work with groups to publish their work.