Security and Privacy Technologies Vitaly Shmatikov CS 6431

Slides:



Advertisements
Similar presentations
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Course Introduction.
Advertisements

Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
Introduction and Logistics Amir Houmansadr CS660: Advanced Information Assurance Spring 2015.
James Tam Introduction To CPSC 233 James Tam Java Object-Orientation Event driven software.
Slide 1 Vitaly Shmatikov CS 378 Network Security and Privacy
6/19/2015 Prof. Ehud Gudes Security Ch 1 1 Chapter 0 - Overview.
Welcome to CS 450 Internet Security: A Measurement-based Approach.
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Wenyuan Xu Department of Computer Science and Engineering University of South.
Network Security and Privacy Vitaly Shmatikov CS 378
COMS W1004 Introduction to Computer Science May 27, 2009.
Welcome to EECS 395/495 Networking Problems in Cloud Computing.
Welcome to CS 395/495 Measurement and Analysis of Online Social Networks.
Welcome to CS 395/495 Internet Architectures. What is this class about? (1) Goal: to help you understand what the future Internet will look like –What.
ECS15: Introduction to Computers Fall 2013 Patrice Koehl
CSE Graphical User Interface Design & Implementation Jason Murphy Lecture 1 - Introduction.
Networked Systems Practicum Lecture 1 – Introduction 1.
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
How to Learn in This Course CS 5010 Program Design Paradigms “Bootcamp” Lesson 0.1 © Mitchell Wand, This work is licensed under a Creative Commons.
Computer Networks Lecture 1: Logistics Based on slides from D. Choffnes Northeastern U. and P. Gill from StonyBrook University Revised Autumn 2015 by S.
Lecture 1 Page 1 CS 239, Fall 2010 Introduction CS 239 Advanced Topics in Computer Security Peter Reiher September 23, 2010.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
Network Security CS nd Term Course Syllabus Cairo University Faculty of Computers and Information.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Course Overview Ted Baker  Andy Wang COP 5641 / CIS 4930.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
CNS 4450 Syllabus. Context Language is a tool of thought. We rarely think without words. In solving problems by computer, we eventually get to the point.
Introduction to Information Security J. H. Wang Sep. 10, 2013.
CS 858 – Hot Topics in Computer and Communications Security Winter 2009 Introduction.
1 CS4521 – Mobile and Topics in Web Programming L. Grewe.
Course Overview Ted Baker  Andy Wang COP 5641 / CIS 4930.
1 CAP6133: Advanced Topics in Computer Security and Computer Forensics (spring’08) Class Overview Dr. Cliff Zou.
How to Learn in This Course CS 5010 Program Design Paradigms “Bootcamp” Lesson 0.1 © Mitchell Wand, This work is licensed under a Creative Commons.
424 - Honors Biology Text: Dynamic Biology NGSS, Sapling Learning online course Biology, Mader, 10 th edition, McGraw Hill.
Welcome to EECS 395/495 Networking Problems in Cloud Computing.
CS Welcome to CS 5383, Topics in Software Assurance, Toward Zero-defect Programming Spring 2007.
8/25/2010CS 686 Course Outline and Questionnaire EJ Jung CS 686 Special Topics in CS Privacy and Security.
ECS152BXin Liu 1 ECS 152B Computer Networks Winter 2009 Prof. Xin Liu
Introduction to Information Security J. H. Wang Sep. 18, 2012.
MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office New Building
Course web page: ECE 646 Cryptography and Computer Network Security ECE web page  Courses  Course web pages  ECE 646.
CSCD 330 Network Programming Winter 2015 Lecture 1 - Course Details.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
Special topics in computer applications Taekyoung Kwon
CS614: Advanced Course in Computer Systems (Spring’04) Instructor: Ken Birman TA: non assigned (yet)
Course Overview Ted Baker  Andy Wang COP 5641 / CIS 4930.
Lecture 1 Page 1 CS 236 Online Introduction CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
1 CS/ECE 354 Fall 2013 “New, and improved!”. 2 Karen Miller Phone: CS.
Dr. Ying Lu ylu at cse.unl.edu Schorr Center Aug 22, CSCE 351 Operating System Kernels.
MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office 4210 N Fall 2010.
Course Overview 1 MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office 4210 N
Welcome to EECS 395/495 Networking Problems in Cloud Computing
Welcome to CS 4390/CS5381: Introduction to Formal Methods
Principles of Computer Security
CIS5930 Software Defined Networking
Purpose of Class To prepare students for research and advanced work in security topics To familiarize students working in other networking areas with important.
Introduction to Information Security
Introduction to Information Security
E 96 Introduction to Engineering Design Peter Reiher UCLA
CS/ECE 478 Introduction to Network Security Dr. Attila Altay Yavuz
Computer Systems Security
CAS CS 558 Network Security.
Lecture 1a- Introduction
Topics in Database Systems
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Lecture 1- Introduction
CS 8803: Memory Models David Devecsery.
Lecture 1a- Introduction
Introduction To CPSC 233 James Tam Event driven software
CS201 – Course Expectations
Presentation transcript:

Security and Privacy Technologies Vitaly Shmatikov CS

slide 2 Course Logistics uLectures: Wednesday, 7:30-9:25pm uAlternating between New York and Ithaca uInstructor: Vitaly Shmatikov Office hours by appointment uNo textbook; we will read a fair number of research papers uWatch the course website for lecture notes, assignments, and reference materials

slide 3 Grading uHomeworks: 40% (4 homeworks, 10% each) Homework problems will be based on research papers uProject: 60% Computer security is a contact sport – the best way to understand it is to get your hands dirty Projects can be done individually or in small teams Project proposal due October 1 You can find a list of potential project ideas on the course website, but don’t hesitate to propose your own

slide 4 Prerequisites uPhD students only Except by permission of instructor (rarely granted) uBasic understanding of operating systems and memory management At the level of an undergraduate OS course uSome familiarity with cryptography Cryptographic hash functions, public-key and symmetric cryptosystems uAsk if you are not sure whether you are qualified to take this course

slide 5 What This Course is Not About uNot a comprehensive or “fundamentals” course on computer security uNot a course on cryptography We will cover some crypto when talking about secure network protocols and privacy uNot a seminar course We will read and understand state-of-the-art research papers, but you’ll also have to do some actual work uFocus on several specific research areas uYou have a lot of leeway in picking your project

slide 6 Syllabus  Memory and code security  Application security: Web, mobile, hybrid  Anonymity networks  Data privacy, anonymity, online tracking  Side channels  Network security: SSL, DNS, BGP; network telescopes

slide 7 Start Thinking About a Project uA few ideas are on the course website uMany ways to go about it Build a tool that improves software security –Analysis, verification, attack detection, attack containment Apply an existing tool to a real-world system Demonstrate feasibility of some attack Do a substantial theoretical study Invent something of your own uStart forming teams and thinking about potential topics early on!

slide 8 A Few Project Ideas uPrivacy-preserving augmented reality, computer vision, image recognition uProgram analysis for finding security bugs in multi- protocol network stacks uSide channels in cloud infrastructure uSecurity and privacy of genetic data uCensorship resistance and steganography uSecurity and privacy of consumer devices uSecurity of mobile APIs uChoose something that interests you!