1 / 11

Advanced Computer Security CS598CAG Spring 2005

Advanced Computer Security CS598CAG Spring 2005. Carl A. Gunter University of Illinois. Course Basics. Objective: develop research interests in security. Prerequisites: maturity in CS and strong interest in security. Helpful background: knowledge of security basics, research experience.

artie
Télécharger la présentation

Advanced Computer Security CS598CAG Spring 2005

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Advanced Computer SecurityCS598CAGSpring 2005 Carl A. Gunter University of Illinois

  2. Course Basics • Objective: develop research interests in security. • Prerequisites: maturity in CS and strong interest in security. • Helpful background: knowledge of security basics, research experience.

  3. You Will • Select a recommended topic. • Discover, understand, and present related work in your selected topic. • Finalize the formulation of a research problem and a research team. • Develop primary materials addressing the problem. • Present your primary materials in a demo. • Demonstrate your understanding of general concepts in all focus areas.

  4. I Will • Choose the recommended topics. • Provide some background on these topics. • Suggest some sample research questions. • Provide platform assistance. • Guide your efforts.

  5. Your Deliverables • 35 minute background presentation (per person). • Primary material (per group). • Simulation • Implementation • Theorem and proof • 35 minute demo presentation (per group). • Standard in-class exam.

  6. Recommended Topics • Fundamentals and five areas of widespread research interest in security. • Fundamentals • Security tunnels • Denial of service • Web services • Privacy • Smart cards

  7. Format • Background lectures (mainly by me) at the beginning. • Meetings with topic groups. • More background lectures (by you). • Project meetings with me, for most of the course. • Project demos. • Final exam.

  8. Research Materials • Primary materials (raw data): • Simulation results, prototype code, experimental data, test beds. • Detailed proofs and counter-examples. • Technical specifications, architectural diagrams. • Secondary materials (write-ups): • Publications: journals, symposia, conferences, or workshops. Web pages and tech reports. • Slide presentations and demos. • Tertiary materials: • Survey articles, tutorials, textbooks. • Magazines and news reports.

  9. Research Proposals • Research problem statement (elevator pitch). • Four panel slide. • Project description. • Detailed research proposal.

  10. Research Problem Statement • Topic. • I am studying smart card software • Research question or original objective. • so I can develop an open API for payment cards • Who cares? • so the embedded programming community • Why should they care? • will better understand how to provide more flexible programming for embedded systems.

  11. Project Name OpEm Project University of Pennsylvania Logo Approach Limited on-device programming analyzed formally. Java provides portability and aids analysis. Explore delivery challenges. Four Panel Slide • Problem Statement • Open APIs aid flexible response to req’s. • Challenged by portability, flexibility, predictability, deliverability. • Plans and Progress • Designs and prototypes for programmable m/w and payment card. • Plan general model-based design for smart cards.

More Related