Computer Security

CS 255 - Winter 2017

OverviewSchedule/ReadingsAttack/Tool PresentationsCourse Project

Professor: Zhiyun Qian
Credits: 4
Prerequisites:  Undergraduate Operating Systems – CS 153, Undergraduate Networking – CS 164
Lectures: Mon Wed Fri 1:10–2:00PM, Gordon Watkins Hall 1111
Forum: iLearn for class materials and Piazza for discussions
Class Email: cs255@cs.ucr.edu
Office hours:
Tuesday 11AM to noon, Wednesday 2 to 3PM
TA:
Daimeng Wang < dwang030@cs.ucr.edu >

This intensive research seminar covers foundational work and current topics in computer systems security. We will read research papers and discuss attacks and defenses against operating systems, software, web applications, Internet, mobile devices, and mobile networks. Students will be prepared for research in computer security and learn to make connections to other areas. They will gain hands-on experience evaluating and designing secure systems.

Tentative Topic List

There will be many opportunities to tailor the course to your backgrounds and interests. The tentative list of topics below should give you an idea of what to expect. See the schedule and reading list for additional details. Please get in touch if you have questions or suggestions.

Grading

There will be no exams. Instead, your grade will be based on the following:

Paper Summary and Class Participation (25%) – You will read no more than two papers each class. You are required to write a short summary and offer critical comments for each paper. I'll look for evidence that you read the paper and thought carefully about the topic. The summaries are due at the beginning of class.

Attack and Tool Presentation (25%) – Choose an attack/vulnerability/exploit and a tool from the provided list and explain it and/or demo it in class. In a 10-15 minute presentation, explain the basic background, how the attack works, demo it (when possible), relate it to our daily life, and discuss possible defense/solution.  Introduce a tool to show what it can do and how the tool works behind the scene. Give a demo on how to use the tool. Presentations will take place throughout the semester per the course schedule.

Research Project (50%) – You will conduct a research project during the quarter, with the goal of writing a publishable workshop paper. Students are encouraged to work in a small group of size 2 to 3. However, individual project is allowed and the output will be considered corresponding to that. Typical project topics involve analyzing the security of a system, developing a new security mechanism, or re-implementing or adapting an existing attack/defense.

Ethics, Law, and University Policies

Please respect the rights and privacy of others. Be aware that Federal and state laws criminalize computer intrusion and wiretapping. You can be expelled by the university and arrested if you violate the policies and laws. When in doubt, consult me or a lawyer.

Computer Fraud and Abuse Act (CFAA)
Electronic Communications Privacy Act (ECPA)
University of California Electronic Communications Policy