CS 854 – Hot Topics in Computer and Communications Security Fall 2006 Introduction.

Slides:



Advertisements
Similar presentations
ADM 1100 B/ ADM 1300 D – Intro. to Business Management
Advertisements

Introduction to Computer- Based Information Systems Summer 2005 (CRN 50291), MW 7: :25, CS100 Instructor: Jack G. Zheng Course Introduction June.
Teachers, administrators and staff continuously seek and share learning and then act on what they learn. The goal of their actions is to enhance their.
Smarter Balanced Field Test MARCH 2014 WHITTIER CITY SCHOOL DISTRICT.
Creating a WordPress Website Oklahoma Conference of The UMC Department of Communications 1.
CS 858 – Hot Topics in Computer and Communications Security Fall 2010 Introduction.
CMPT 275 Software Engineering
Management and Mining of Spatio-Temporal Data Rui Zhang The University of Melbourne.
IB SL BUSINESS & MANAGEMENT COURSE OVERVIEW Academic Year.
20&27 May Agenda 1.Highlight the difference between system flow of e- Invoice and paper invoice – 15 minutes 2.Demonstrate the operation procedure.
NSW Supported decision making pilot Supported Decision Making Conference Melbourne 18 October 2013.
What is… Learner-Centered Instruction. What Is The Goal For A Learner-Centered Course? Making the student more responsible for his/her learning. 1.
Findings from Fall 2001 UM.CourseTools Survey Michelle Bejian, UM Media Union Findings from UM.CourseTools Satisfaction Survey Fall 2001.
Welcome to the seminar course
21-1 Last time Database Security  Data Inference  Statistical Inference  Controls against Inference Multilevel Security Databases  Separation  Integrity.
Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
CS3516 The main course syllabus is at: This document is an expansion of that syllabus. I’m hoping they say the same thing.
CS 345 Distributed Systems Fabián E. Bustamante, Winter 2004 Welcome to Advanced OS Fabián E. Bustamante (Instructor) Yi Qiao (Ad Honorem TA) Communication.
CS510 Concurrent Systems Course Overview. CS510 - Concurrent Systems 2 About the Instructor  Instructor – Jonathan Walpole o Professor at PSU o Research.
Exploring the Internet Instructor: Michael Krolak.
IS112 - Computer Organization1 IS112 Computer Organization and Programming Professor Catherine Dwyer Fall 2006.
CS510 Concurrent Systems Course Overview. CS510 - Concurrent Systems 2 About the Instructor  Instructor – Jonathan Walpole o Professor at PSU o Professor.
Questionmark Perception Online assessment (tests & surveys) Suite of software applications which allow:  create questions  organise questions into tests.
S-005 Introduction to Educational Research Fall Harvard Graduate School of Education.
Introduction to SEG 5010 Hong Cheng 2009/10 Second Term.
Research Trends in Software Engineering – CS661 Shafay Shamail Malik Jahan Khan.
Privacy-Aware Computing Introduction. Outline  Brief introduction Motivating applications Major research issues  Tentative schedule  Reading assignments.
IS112 Computer Organization and Programming Professor Catherine Dwyer Fall 2003.
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Wenyuan Xu Department of Computer Science and Engineering University of South.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2013 Lecture 3 09/03/2013 Security and Privacy in Cloud Computing.
Project Management Take a Tour of the Online Course.
28 August 2015T Kari Laitinen1 T Seminar on Wireless Future 3 ECTS cr Dr. Kari Laitinen Principal Lecturer Oulu University of Applied Sciences.
1 Data Communications and Network Management ISQS 6341, Summer II, 2001 Instructor: Zhangxi Lin Office: BA 708 Phone:
CSSE 492 Advanced Computer Networks Dr. Yingwu Zhu Spring 2008.
Ready – Set – ACTION! Jumpstart your information literacy classes with visual blogs using videos, photos and more! Jane Verostek Associate Librarian SUNY.
1 CDA6938 Special Topic: Research in Computer and Network Security (spring’07) Class Overview.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
CS598CXZ (CS510) Advanced Topics in Information Retrieval (Fall 2014) Instructor: ChengXiang (“Cheng”) Zhai 1 Teaching Assistants: Xueqing Liu, Yinan Zhang.
RFID Technology Issues Interactive discussion. Intended to elicit comments and questions to lead towards White Paper outline.
Lecture 1 Page 1 CS 239, Fall 2010 Introduction CS 239 Advanced Topics in Computer Security Peter Reiher September 23, 2010.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
Tobacco and Health: From Cells to Society Fall 2012 Wednesdays, 1 – 4 pm EST September 12 – December 5, 2012.
Introduction to Mobile Computing -CSE 535 Fall 2007 Sandeep K. S. Gupta School of Computing and Informatics Arizona State University.
T Seminar on Network Security. Overview Paper finalization (deadline ) –Final check, images, references, style –Note the changed date of.
CAP6135: Malware and Software Vulnerability Analysis Cliff Zou Spring 2010.
CS 858 – Hot Topics in Computer and Communications Security Winter 2009 Introduction.
Classroom Presenter: Using Tablet PCs to promote classroom interaction Richard Anderson University of Washington
Daniel W. Engels, PhD Chief Technology Officer Revere Security.
CIS 4930/6930: Systems Security Instructor: Xinming “Simon” Ou TA: Xiaolong “Daniel” Wang Class time: MW 2-3:15 1.
Low-Cost Untraceable Authentication Protocols for RFID Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede BCRYPT workshop on RFID Security February.
MRKT 370 – PRINCIPLES OF MARKETING FALL 2003 Dr. Ugur Yucelt Office Phone: Class Time: MW: 12:30-1:45 Office hours: MW:2:00-6:00 pm
1 CAP6133: Advanced Topics in Computer Security and Computer Forensics (spring’08) Class Overview Dr. Cliff Zou.
Tobacco and Health: From Cells to Society Fall 2013 Wednesdays, 1 – 4 pm EST September 11 – December 4, 2013.
David Evans Nate Paul Anh Nguyen-Tuong CS851: Malware University of Virginia Computer Science Malware Seminar Fall 2004.
8/25/2010CS 686 Course Outline and Questionnaire EJ Jung CS 686 Special Topics in CS Privacy and Security.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Research Overview Nitesh Saxena Research areas: computer and network security, applied cryptography.
1 BUS 3500 MANAGEMENT INFORMATION SYSTEMS Abdou Illia, Ph.D. (Monday 8/24/2015)
CSCD 303 Essential Computer Security Lecture 1 - Course Details.
高等計算機網路 Advanced Computer Networks Spring 2012, NTNU-CSIE.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
We’re flipping the classroom! Turning the classroom up side down!
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
New York Libraries Leading the Way to Digital Libraries.
HCI problems in computer security Mark Ryan. Electronic voting.
CSCE 715: Network Systems Security
CS598CXZ (CS510) Advanced Topics in Information Retrieval (Fall 2016)
RFID & applications گردآوری: بیتا تدین
Presentation transcript:

CS 854 – Hot Topics in Computer and Communications Security Fall 2006 Introduction

Urs Hengartner2CS HoTCCS Overview  Goals  Organization  Paper Survey – Part I

Urs Hengartner3CS HoTCCS Goals  Research wise Introduce current research problems in computer and communications security Study proposed solutions Hopefully come up with new solutions  Research project  Grad-student skills Reviewing papers Giving presentations

Urs Hengartner4CS HoTCCS Topics (tentative)  Privacy in general  Pervasive computing  Location privacy  RFID privacy  Usability  Phishing  Graphical passwords  Trusted computing  Worms/botnets  Secure software  Electronic voting  Side-channel attacks

Urs Hengartner5CS HoTCCS The AOL Privacy Disaster  August 6: AOL released 20 million search queries from 658,000 users  To protect users’ anonymity, AOL assigned random number to each user “numb fingers” “landscapers in Lilburn, Ga” “how to kill your wife”  August 9: New York Times article re-identified user Thelma Arnold, 62-year old widow from Lilburn, GA

Urs Hengartner6CS HoTCCS RFID Tags  Barcodes of the future  Passive device that receives power from reader  Wireless communication with range of up to several meters  Tag calls out its unique number and static data

Urs Hengartner7CS HoTCCS Wig model #4456 (cheap polyester) Das Kapital and Communist- party handbook 1500 Euros in wallet Serial numbers: , … 30 items of lingerie Replacement hip medical part # The RFID Privacy Problem Mr. Jones in 2015 © Ari Juels

Urs Hengartner8CS HoTCCS Security and Usability © Lorrie Cranor

Urs Hengartner9CS HoTCCS Overview  Goals  Organization  Paper Survey – Part I

Urs Hengartner10CS HoTCCS Meetings  Time: MW 2:30-4pm Probably 4:05pm with break in the middle  Location: DC 3314  Different from today!

Urs Hengartner11CS HoTCCS Prerequisites  No formal prerequisites  Basic knowledge of computer systems/networks helpful  Papers range from high-level discussion about privacy to low-level discussion about stack layouts

Urs Hengartner12CS HoTCCS Lectures  First three lectures: cryptography/security introduction given by me  Following lectures: Two students will each present and lead a discussion on a research paper  See course website for schedule

Urs Hengartner13CS HoTCCS Grading  One assignment: 5%  Paper presentations: 25%  Paper reviews: 10%  Class participation: 10% Includes presentation feedback  Research project :50%

Urs Hengartner14CS HoTCCS Paper Review  Goal: learn what makes a good paper So that you can write your own good papers  Every student should read the two mandatory papers before each lecture See course website for papers  Every student should submit a review for one of the two papers by noon the day of the presentation See course website for instructions  (Anonymized) reviews will be posted online

Urs Hengartner15CS HoTCCS Paper Presentation  Goal: practice your presentation skills  Every student should present 2-3 research papers during term  Workshop/conference-style presentation Present work as it is your own Carefully prepare your slides  Figures instead of text  Maybe additional background material About 30 minutes  Send me slides before lecture

Urs Hengartner16CS HoTCCS Paper Discussion  Discussion follows presentation  Presenter of paper gives his/her opinion about paper  Presenter comes up with interesting questions and leads a discussion  15 minutes

Urs Hengartner17CS HoTCCS Presentation Feedback  Feedback is essential for training speaking skills  Every student should submit a review for each presentation by noon the day after a presentation See course website for review form Look at review form before preparing your presentation  (Anonymized) feedback will be sent to presenter

Urs Hengartner18CS HoTCCS Project  Goal: novel research in the area of security, cryptography, or privacy Might lead to workshop/conference submission  Free to choose your topic Instructor will present sample topics  In groups of two  Proposal: October 16  Presentation: December 4  Write-up: December 6

Urs Hengartner19CS HoTCCS Questions?  Teaching

Urs Hengartner20CS HoTCCS Overview  Goals  Organization  Paper Survey – Part I

Urs Hengartner21CS HoTCCS Paper Survey – Part I  Mandatory and optional papers Optional: Ideas for discussion questions & projects  Each student should present 2-3 mandatory papers  First paper will be assigned September 18 Second paper once registration has settled down  TODO: Send me list of three papers that you would like to present by September 17 Optional: Tell me why