This course covers computer and network security, exploring a range of topics to illustrate some of the modern research challenges in the area and the standards for advancement. It is not designed to be a tutorial course, but rather to give the student the context to understand current security research and evaluate interest in the field. The course will examine both the defensive and offensive side of the field. At the conclusion of the course, the student will have the foundation to conduct research in computer security and to apply the latest security research to a particular area of practice.
Students will be evaluated on the readings covered in class via in-class quizzes and in-class discussion participation, and on their ability to conduct research via research project carried out in groups of 4-5 students.
- Jan 15: Form project groups.
- Jan 29 (8 am): Submit project proposal (1 page max).
- Mar 17 (8 am): Preset project (15 mins).
- Mar 19 (8 pm): Submit project report (6 pages max).
- Group 1: It Takes Two to Infer: Partitioning as an Encrypted Database Defense
- Group 2: Making Marshmallow's Permissions Sweet Again
- Group 3: A Study of the Evolution of Defences in Linux Software and Vulnerable Register Spilling
- Group 4: Smartwatch User Identification as a Means of Authentication
- Group 5: Resilience of Authorship Detection Methods and Hoax Detection Techniques to Machine Generated Text
- Group 6: Predict Malicious Torrents online
- Group 7: Email Link Side Effect Analysis