110 likes | 246 Vues
This course aims to develop research interests in computer security, focusing on topics like security tunnels, denial of service, web services, privacy, and smart cards. Students will engage in discovering, understanding, and presenting related work, formulating a research problem, and working in teams to develop primary materials. Deliverables include background presentations, demonstrations, and a standard exam. The class includes foundational lectures, project meetings, and discussions, with an emphasis on collaboration and practical application of security concepts.
E N D
Advanced Computer SecurityCS598CAGSpring 2005 Carl A. Gunter University of Illinois
Course Basics • Objective: develop research interests in security. • Prerequisites: maturity in CS and strong interest in security. • Helpful background: knowledge of security basics, research experience.
You Will • Select a recommended topic. • Discover, understand, and present related work in your selected topic. • Finalize the formulation of a research problem and a research team. • Develop primary materials addressing the problem. • Present your primary materials in a demo. • Demonstrate your understanding of general concepts in all focus areas.
I Will • Choose the recommended topics. • Provide some background on these topics. • Suggest some sample research questions. • Provide platform assistance. • Guide your efforts.
Your Deliverables • 35 minute background presentation (per person). • Primary material (per group). • Simulation • Implementation • Theorem and proof • 35 minute demo presentation (per group). • Standard in-class exam.
Recommended Topics • Fundamentals and five areas of widespread research interest in security. • Fundamentals • Security tunnels • Denial of service • Web services • Privacy • Smart cards
Format • Background lectures (mainly by me) at the beginning. • Meetings with topic groups. • More background lectures (by you). • Project meetings with me, for most of the course. • Project demos. • Final exam.
Research Materials • Primary materials (raw data): • Simulation results, prototype code, experimental data, test beds. • Detailed proofs and counter-examples. • Technical specifications, architectural diagrams. • Secondary materials (write-ups): • Publications: journals, symposia, conferences, or workshops. Web pages and tech reports. • Slide presentations and demos. • Tertiary materials: • Survey articles, tutorials, textbooks. • Magazines and news reports.
Research Proposals • Research problem statement (elevator pitch). • Four panel slide. • Project description. • Detailed research proposal.
Research Problem Statement • Topic. • I am studying smart card software • Research question or original objective. • so I can develop an open API for payment cards • Who cares? • so the embedded programming community • Why should they care? • will better understand how to provide more flexible programming for embedded systems.
Project Name OpEm Project University of Pennsylvania Logo Approach Limited on-device programming analyzed formally. Java provides portability and aids analysis. Explore delivery challenges. Four Panel Slide • Problem Statement • Open APIs aid flexible response to req’s. • Challenged by portability, flexibility, predictability, deliverability. • Plans and Progress • Designs and prototypes for programmable m/w and payment card. • Plan general model-based design for smart cards.