Presentation is loading. Please wait.

Presentation is loading. Please wait.

Proposal for Term Project Information Security, Fall 2016

Similar presentations


Presentation on theme: "Proposal for Term Project Information Security, Fall 2016"— Presentation transcript:

1 Proposal for Term Project Information Security, Fall 2016
J. H. Wang Nov. 2, 2016

2 What’s Included in the Score for Term Projects?
Proposal: one week after midterm (Nov. 16, 2016) Presentation: the last 3-4 weeks of the semester (Dec. 21/28, 2016 – Jan. 12, 2017) Final Report: the last week (Jan. 13, 2017)

3 Term Project Options Requirements
Programming projects using security libraries Team-based with at most 4 persons Topical survey in information security related topics NOT team-based Requirements Presentation is *required* for both options A proposal is *required* one week after midterm (Nov. 16, 2016) Programming: introduction, system designs Surveys: introduction, selected topics Final report is *required* after presentation

4 Proposal for Programming Projects
A one-page description of your idea about the system you want to design Introduction: an overview of the system Methods: possible security issues and the principal ideas of your ways to solve them Tools: design of your system, and the reasons why you use selected tools For team members: the names and the expected responsible parts of each individual member should be clearly identified Functionality of your system will be considered in the final score

5 Possible Topics for Programming Projects (1/2)
Programming of selected components Implementation and demonstration of symmetric encryption/decryption algorithms Block cipher: DES, 3DES, AES, … Stream cipher: RC4, … Implementation and demonstration of public-key encryption/decryption algorithms SHA, HMAC, … Diffie-Hellman, RSA, …

6 Possible Topics for Programming Projects (2/2)
Adding security functions into existing systems Implementation of an application , e.g.: Client-server application: secured chat room Functions added: confidentiality, integrity, authentication, … Methods used: SSL/TLS (or 3DES, Diffie-Hellman, Kerberos, …) Libraries: OpenSSL, … Platform/language: …

7 Proposal for Topical Survey
A one-page description of which topics you want to survey and present No team work allowed You have to prepare a 20-minute presentation of the major ideas of the topics in your survey An in-depth survey on the major topics in recent developments of information security The content and depth of your surveys will be considered in the final score

8 Possible Topics for Topical Surveys
Topics should focus on deep analysis of recent developments in information security, for example, Recent security attacks and solutions in specific protocols E.g.: “Shellshock” for bash, “heartbleed” for OpenSSL, FREAK ("Factoring RSA Export Keys"), … Smart phone security issues and solutions E.g. Android “FakeID” problem, Android “QuadRooter”, iCloud security, … Cloud security/privacy and solutions E.g. cloud storage security threats, cloud computing platform security for IaaS/PaaS/SaaS, big data security, … (in Amazon, Google, …) Others ATM security, social network security/privacy and solutions (in Facebook, Twitter, Instagram, …) Research papers with detailed analysis of the mechanism are preferred Broad overviews will *not* be good choices, and will affect your score Most security news reports in Chinese are *not* recommended since they tend to be very broad general overview

9 Some Possible Sources for Topical Surveys
IEEE Security & Privacy Marco Carvalho, Jared DeMott, Richard Ford, David A. Wheeler, "Heartbleed 101", IEEE Security & Privacy, vol.12, no. 4, pp , July-Aug 36th IEEE Symposium on Security and Privacy 2015, Distinguished paper A Messy State of the Union: Taming the Composite State Machines of TLS ACM Queue ”Why Is It Taking So Long to Secure Internet Routing?” by Sharon Goldberg, Sep. 11, 2014.

10 Academic Papers Conferences: Journals: USENIX Security Symposium
IEEE Symposium on Security & Privacy ACM CCS, AsiaCCS Crypto, EuroCrypt, AsiaCrypt Journals: ACM TISSEC: Journal of Cryptology:

11 Submission Due: one week after midterm (Nov. 16, 2016)
Please submit to our homework submission site Your proposal is included in the final score, and is subject to reviews and possible suggestions on changes

12 Tentative Schedule for Presentation
The last 3-4 weeks in this semester (Dec. 21/22, Dec. 28/29, Jan. 4/5, and Jan. 11/12) A 20-minute time slot will be allocated to each team for presentation and system demo Please be sure to *focus* on the most important part in your system/survey Presentation is allowed only within the scheduled time slots Project Report: (Due: Jan. 13, 2016) After presentation, each team is required to submit the final report for term project Including: presentation slides, source codes, executable files, and documents for installation/configuration/execution instructions

13 Any Questions or Comments?


Download ppt "Proposal for Term Project Information Security, Fall 2016"

Similar presentations


Ads by Google