CSE 564: Computer Security and Privacy Winter 2015 Franzi Roesner

Slides:



Advertisements
Similar presentations
LECTURE 1: COURSE INTRODUCTION Xiaowei Yang. Roadmap Why should you take the course? Who should take this course? Course organization Course work Grading.
Advertisements

CS 858 – Hot Topics in Computer and Communications Security Fall 2010 Introduction.
Welcome to Computer Science at Stanford University! 1.
Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
Introduction and Logistics Amir Houmansadr CS660: Advanced Information Assurance Spring 2015.
EGR 105 Foundations of Engineering I Fall 2007 – Week 1 Introduction.
Computers and Society Lecture 1: administrative details and an introduction to the class Professor: Evan Korth New York University.
Prof. James A. Landay University of Washington Spring 2012 Introduction & Course Overview CSE 441 – Advanced HCI March 27, 2012.
Info 203: Social and Organizational Issues of Information Course Introduction: Social Science Perspectives on Information and Information Technology.
213: User Interface Design & Development Professor: Tapan Parikh TA: Eun Kyoung Choe
CSCD 555 Research Methods for Computer Science
Introduction to SEG 5010 Hong Cheng 2009/10 Second Term.
Psychology 366 Research Project Jen St.Onge Kenny Building, Room #3506 Website:
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Wenyuan Xu Department of Computer Science and Engineering University of South.
Welcome to CS 395/495 Measurement and Analysis of Online Social Networks.
Welcome to CS 395/495 Internet Architectures. What is this class about? (1) Goal: to help you understand what the future Internet will look like –What.
» Teaching an online class, what takes up most of your time?
ECS15: Introduction to Computers Fall 2013 Patrice Koehl
Training of Adults Useful tips to know to conduct a good training Presentation 22.
Politics and the Media (POLS 328) Professor Jonathan Day 1.Introduction 2.Syllabus 3.Website 4.1 minute paper 5.First Reading.
Student Forum March5, pm - Collaborate Students will share their thoughts on topics including: --experiences with online courses --ways instructors.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
James Tam CPSC 203: Introduction To Computers (Independent Study) James Tam.
OPIM 3801: Principles of Project Management Instructor: Bob Day Associate Professor OPIM Dept.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
1 Introduction to Engineering Second Semester Overview Agenda Team Assignments and Information Exchange Course Overview.
Welcome – You’ve found CSE120 OR Computer Science Principles OR UWIT…  Announcements are usually listed here and displayed before the start of class 
CSCD 330 Network Programming Fall/Winter/Spring 2014 Lecture 1 - Course Details.
ICS 6B Boolean Algebra and Logic Winter 2015
CS 858 – Hot Topics in Computer and Communications Security Winter 2009 Introduction.
HE 520: Higher Education Laws and Regulations Unit One Seminar Pre-Seminar Welcome to HE 520: Higher Education Laws and Regulations, Unit One Seminar Seminar.
1 CAP6133: Advanced Topics in Computer Security and Computer Forensics (spring’08) Class Overview Dr. Cliff Zou.
1 Technologies for Electronic Commerce and EBusiness Walt Scacchi, Ph.D. FEMBA 290 Winter 2003.
Welcome to EECS 395/495 Networking Problems in Cloud Computing.
David Evans Nate Paul Anh Nguyen-Tuong CS851: Malware University of Virginia Computer Science Malware Seminar Fall 2004.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved Introduction.
Advanced Legal Writing Seminar: Wednesdays, 10:00 p.m. EST Office Hours: Mondays from 3 – 5 p.m. EST, and by appointment AIM sign-in: cssouthall
INF 117 Project in Software Engineering Lecture Notes -Winter Quarter, 2008 Michele Rousseau Set 1.
Database Design and Implementation ITCS3160 Instructor: Jianping Fan Course Webpage:
CSCD 330 Network Programming Winter 2015 Lecture 1 - Course Details.
Introduction to Software Engineering Lab Instructor: Jacob.
CS614: Advanced Course in Computer Systems (Spring’04) Instructor: Ken Birman TA: non assigned (yet)
Prof. James A. Landay Computer Science Department Stanford University Winter 2016 dt+UX 2 : USER EXPERIENCE DESIGN PROJECT Introduction & Course Overview.
Research Experience Program (REP) Spring 2008 Psychology 100 Ψ.
CSCD 303 Essential Computer Security Lecture 1 - Course Details.
Welcome to Survey of Social Problems! “When solving problems, dig at the roots instead of just hacking at the leaves.” (Anthony J. D’Angelo) There is Audio!
Welcome to EECS 395/495 Online Advertising: A Systems Approach.
Prof. James A. Landay University of Washington Winter 2009 Introduction & Course Overview CSE 441 – Advanced HCI January 6, 2009.
Research Experience Program (REP) Fall 2007 Psychology 100 Ψ.
CSE 403, Spring 2008, Alverson CSE 403 Software Engineering Pragmatic Programmer Tip: Care about Your Craft Why spend your life developing software unless.
MIS 610: Seminar in Information Systems Management Yong Choi School of Business Administration CSU, Bakersfield.
Classic Connections: Innovative Methods for Making Education Work.
Survey of Digitization INF 385R - Megan Winget Fridays, INF 385R - Megan Winget Fridays,
REMINDER: If you haven’t yet passed the Gateway Quiz, make sure you take it this week! (You can find more practice quizzes online in the Gateway Info menu.
CSE Wireless and Adhoc networks Instructor: Ayman Alharbi Computer Engineering Dept. (Head of dept. ) Why ?
Introduction to Competition & Consumer Law Open Universities Australia / Graduate School of Business & Law Juris Doctor (JD) LAW1033/LAW2419/OJD340 Competition.
CSE6339 DATA MANAGEMENT AND ANALYSIS FOR COMPUTATIONAL JOURNALISM CSE6339, Spring 2012 Department of Computer Science and Engineering, University of Texas.
Welcome to EECS 395/495 Networking Problems in Cloud Computing
Welcome to Computer Science at Stanford University!
Online Composition with Georgie Ziff
CS 139 – Programming Fundamentals
CSCD 303 Essential Computer Security
CS6501 Embedded Operating Systems for the IoT
CSCD 303 Essential Computer Security
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
MPATE-GE 2626: Thesis in Music Technology Spring 2019
CSCD 303 Essential Computer Security
Course Introduction Data Visualization & Exploration – COMPSCI 590
Presentation transcript:

CSE 564: Computer Security and Privacy Winter 2015 Franzi Roesner

Today Introductions Course Overview Security/Privacy Teaser Security Mindset 1/6/2015CSE Winter 20152

Course Staff Instructor: Franzi – Office hours: Mondays 1:30-2:30pm (and by appointment) – Location: CSE 654 TA: Paul Vines – Graduate student in the security lab – Office hours: TBD 1/6/2015CSE Winter 20153

Course Goals Teach or sharpen a security mindset (challenge assumptions, think critically) Introduce a broad range of security & privacy topics, and bring you to the forefront of research on those topics Ultimately design better systems Provide background and perspective for your research – in security or otherwise! 1/6/2015CSE Winter 20154

Course Non-Goals Learn any specific security/privacy technologies Cryptography – Yoshi is teaching a crypto course next quarter – Dan Boneh (Stanford) has a good Coursera crypto course: 1/6/2015CSE Winter 20155

Class Format Two meetings per week: T/Th 10:30am Research-focused course – Mainly discussions of papers (2 per class) 3-4 people to lead the discussion for each class (2x per quarter), but everyone should come prepared to discuss the assigned papers Participation counts for a non-negligible portion of your grade One guest lecture: Xi Wang (2/5/2015) 1/6/2015CSE Winter 20156

Class Resources Webpage: – Reading schedule and deadlines – Links to everything Catalyst discussion board – Mainly for reading writeups Catalyst dropbox – For assignments, including project checkpoints 1/6/2015CSE Winter 20157

Evaluation 45%: Project – 5%: Proposal – 5%: Checkpoint – 5%: Draft – 15%: Oral presentation – 15%: Final report 45%: Assignments – 20%: Security reviews (2) – 10%: Attack lab – 15%: Reading discussion board posts 10%: Class participation 1/6/2015CSE Winter 20158

Class Participation An important part of your grade Because: – We would like you to read and think about papers throughout the quarter – Important to learn to discuss papers Expectations – Ask questions, raise issues, think critically – Learn to express your opinion – Respect and invite other people’s opinions 1/6/2015CSE Winter 20159

Paper Writeups Due at 8 am before every class – You have 4 “freebies” (but remember that there are 2 per class) Short: one paragraph per paper (2 paragraphs total) Say something original! For example: – Paper summary, key points – Evaluation, opinions, response to others’ opinions – Questions for discussion, responses to others’ questions – Open research questions – Broader implications, relationships with previous papers Graded on scale of 0-2 1/6/2015CSE Winter

Security Reviews Goal: learn to evaluate potential security and/or privacy issues with new technologies – For example, something you see in the news, on social media, in stores, etc. 2-3 pages, submit to Catalyst dropbox You may work individually or in groups of 2 Follow specific format on website (more details later today) 1/6/2015CSE Winter

Attack Lab Goals: – Teach you some practical security-related skills. – Show you how easy it is to break a system! – Help you remember not to make those mistakes in the systems you build yourselves You may work individually or in groups of 2 Details TBD 1/6/2015CSE Winter

Project Groups of 2-3 people (talk to me for exceptions). Topic: – Choose from a list of topics, or come up with your own. – Can be related to your ongoing research. – Can be related to a project in another course. – Must be related to computer security and/or privacy. – I encourage you to come talk to me about ideas. Types of projects: Design/Build, Analyze, Measure, HCI 1/6/2015CSE Winter

Project Final deliverables: – Conference-style report (at most 12 pages) and presentation. Milestones (see course website for deadlines) – Group formation – Project proposal – Checkpoint – Draft – Presentation – Final report – Summary of contributions 1/6/2015CSE Winter Project presentations: March 16, 2015 between 8:30am-12:20pm

Let’s Get Started What is computer security? What is privacy? Why haven’t we solved this? Game: spot the fake! (with thanks/apologies to Avi Rubin) 1/6/2015CSE Winter

Gyroscope Eavesdropping 1/6/2015CSE Winter

Accelerometer Eavesdropping 1/6/2015CSE Winter

Keyboard Eavesdropping 1/6/2015CSE Winter

Audio from Video 1/6/2015CSE Winter

Key Extraction 1/6/2015CSE Winter

Exploding Devices 1/6/2015CSE Winter

Fingerprints from Photos 1/6/2015CSE Winter

Hacking Defibrillators 1/6/2015CSE Winter

Spot the Fake 1/6/2015CSE Winter gyroscope key extraction keyboards fingerprint explosions defibrillator video->audio accelerometer

Computer Security & Privacy Why I love it: – Critical lens – Breadth and flexibility – Problems that really matter for people – Fun! (Lets you be a little sneaky) Variety of approaches: system design/building, attacks, measurements, human factors 1/6/2015CSE Winter

Security Mindset Thinking critically about designs, challenging assumptions Being curious, thinking like an attacker “That new product X sounds awesome, I can’t wait to use it!” versus “That new product X sounds cool, but I wonder what would happen if someone did Y with it…” Why it’s important – Technology changes, so learning to think like a security person is more important than learning specifics of today – Will help you design better systems/solutions – Interactions with broader context: law, policy, ethics, etc. 1/6/2015CSE Winter

Example 1/6/2015CSE Winter

Security Reviews Assets (what should be protected) Adversaries (possible attackers) Threats (actions by adversaries to exploit system) Vulnerabilities (weaknesses of system) Risk (how important are assets, how likely is exploit) Defenses 1/6/2015CSE Winter

Example Security Review 1/6/2015CSE Winter Assets, Adversaries, Threats, Vulnerabilities, Risk, Defenses?

Spot the Fake 1/6/2015CSE Winter gyroscope key extraction keyboards fingerprint explosions defibrillator video->audio accelerometer

Reminders Fill out the pre-course survey Sign up to lead discussions (2 slots) Reading writeups due at 8am Thursday Come see me after class if you’re not yet registered for the course but want to be 1/6/2015CSE Winter