Advanced Systems and Network Security Fall 2015 Instructor: Kun Sun, Ph.D.

Slides:



Advertisements
Similar presentations
Introduction 1-1 CS6204 Recent Advances in Computer Security and Privacy 3-credit graduate-level seminar Danfeng (Daphne) Yao Spring 2010 Office hours:
Advertisements

Advanced Data Communications (Network Security) TaeKyoung Kwon
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Preparation for In-class Presentations.
The Aggie Code of Honor and the Aggie Honor System Office
General information CSE 230 : Introduction to Software Engineering
Advanced Topics in Next- Generation Wireless Networks Qian Zhang Department of Computer Science HKUST.
CSE 322: Software Reliability Engineering Topics covered: Course outline and schedule Introduction, Motivation and Basic Concepts.
Advanced Computer Networks Fall 2010 Instructor: Haining Wang.
Introduction to SEG 5010 Hong Cheng 2009/10 Second Term.
Administrative Issues ICS 151 Fall 2007 Instructor: Eli Bozorgzadeh.
Course Introduction (Lecture #1) ENGR 107 – Intro to Engineering The slides included herein were taken from the materials accompanying Engineering Fundamentals.
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Wenyuan Xu Department of Computer Science and Engineering University of South.
PROBABILITY AND STATISTICS FOR ENGINEERS Session 1 Dr Abdelaziz Berrado MTH3301 —Fall 09.
BA 378: Accounting Information Systems Instructor: Dr. James R. Coakley.
Welcome to CS 395/495 Measurement and Analysis of Online Social Networks.
Advanced Network Security Fall 2014 Instructor: Kun Sun, Ph.D.
1 EEL 6935: Embedded Systems Seminar. 2 General Information Instructor: Ann Gordon-Ross Office: Benton Office Hours – By appointment.
CPSC 100 – Personal Computers & Their Uses Fall 2010 Dongsheng Che Department of Computer Science East Stroudsburg University.
CS 450: COMPUTER GRAPHICS COURSE AND SYLLABUS OVERVIEW SPRING 2015 DR. MICHAEL J. REALE.
CS 450 MODELING AND SIMULATION Instructor: Dr. Xenia Mountrouidou (Dr. X)
Understanding data communications Taekyoung Kwon
1 EEL 6935: Embedded Systems Seminar. 2 General Information Instructor: Ann Gordon-Ross Office: Benton Office Hours – By appointment.
CS 103 Discrete Structures Lecture 01 Introduction to the Course
ACIS 4684/5584 IS Security and Assurance. 2 Dr. Linda Wallace  Office: Pamplin 3092  
Object Oriented Programming (OOP) Design Lecture 1 : Course Overview Bong-Soo Sohn Assistant Professor School of Computer Science and Engineering Chung-Ang.
Proposal for Term Project Operating Systems, Fall 2015 J. H. Wang Sep. 18, 2015.
Term Project Description CAP6135 Spring Term Project Two students form a group to do term project together – A research oriented term project.
T Seminar on Network Security. Overview Paper finalization (deadline ) –Final check, images, references, style –Note the changed date of.
BUS 462 Marketing Research Yinghong (Susan) Wei. Day 1 - Introduction Agenda for Today:  About Me  About You  About the Class  Form Teams  Discussion.
MRKT 370 – PRINCIPLES OF MARKETING FALL 2003 Dr. Ugur Yucelt Office Phone: Class Time: MW: 12:30-1:45 Office hours: MW:2:00-6:00 pm
Proposal for Term Project Operating Systems, Fall 2012 J. H. Wang Nov. 13, 2012.
Term Project Description CAP6135 Spring Term Project Two students form a group to do term project together – A research oriented term project.
Welcome to EECS 395/495 Networking Problems in Cloud Computing.
Proposal for Term Project Information Security, Fall 2014 J. H. Wang Sep. 25, 2014.
1 How to Give a Good Presentation? Cliff C. Zou CAP /2010.
Advanced Computer and Network Security Fall 2014 Instructor: Haining Wang.
Course Information Andy Wang COP 5611 Advanced Operating Systems.
ITCS 6265 Details on Project & Paper Presentation.
Network Economics -- Introduction and rules Patrick Loiseau EURECOM Fall 2012.
Course Information Andy Wang COP 5611 Advanced Operating Systems.
Term Project Description CAP6135 Spring Term Project Two students form a group to do term project together – A research oriented term project.
Dr. Jeff Cummings MIS323 Business Telecommunications.
Advances in Cloud Computing CIS6930/CIS4930
Welcome to EECS 395/495 Online Advertising: A Systems Approach.
CSCE 990 Advanced Distributed Systems Seminar Ying Lu 104 Schorr Center
MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office 4210 N Fall 2010.
Course Information Andy Wang COP 5611 Advanced Operating Systems.
Course Information Andy Wang COP 5611 Advanced Operating Systems.
Course Information Andy Wang COP 5611 Advanced Operating Systems.
Course Overview 1 MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office 4210 N
CSE6339 DATA MANAGEMENT AND ANALYSIS FOR COMPUTATIONAL JOURNALISM CSE6339, Spring 2012 Department of Computer Science and Engineering, University of Texas.
Welcome to EECS 395/495 IoT Networks Seminar
APPLIED MANAGEMENT SCIENCE IN AGRICULTURAL SYSTEMS I
Welcome to EECS 395/495 Networking Problems in Cloud Computing
CS6501 Advanced Topics in Information Retrieval Course Policy
EEL 6686: Embedded Systems Seminar
Introduction to CS Senior Design Project I / II
MIS323 Business Telecommunications
Informatics 291S Literature Survey in Software Engineering
Database Design and Implementation
Introduction to CS Senior Design Project I / II
Introduction to CS Senior Design Project I / II
Andy Wang Operating Systems COP 4610 / CGS 5765
Proposal for Term Project Operating Systems, Fall 2018
MIS323 Business Telecommunications
CIS5930: Advanced Topics in Parallel and Distributed Systems
Introduction to CS Senior Design Project I / II
CS 6640 Sample Presentation
Lecture 1a- Introduction
Term Project Description
Presentation transcript:

Advanced Systems and Network Security Fall 2015 Instructor: Kun Sun, Ph.D.

Instructor  Dr. Kun Sun, Assistant Professor of Computer Science   Phone: (757)   Office: McGrothlin-Street Hall, 105  Office hours  1:30pm-3:30pm MW, or by appointment (send me ) Course website:

3 Goals  Familiar with the latest security research activities  Reading technical papers in recent years  Top level security and systems conferences  No textbook  Learn how to do research in security area  How to read research paper?  How to write a paper review?  How to present your research work?  How to write research paper?

Grading Policy  10% Class participation  10% Five paper reviews  20% Two class presentation  30% Term project  30% Final exam

Class Participation  One point deduction for missing one class without justification  Let the instructor know in advance.

6 5 Paper Reviews  We have a pool of papers to choose from.  Insightful comments  Other than the presented papers  1-2 pages, single space, 10 font point  Summarize the main idea of the paper  Problem they solved  Approach they took: novelty  How did they evaluate  Any ways to improve the work  Limitation of the work  Pros and cons  Break its assumption

7 Term Project  Each team has at most 2 students.  Topics on systems security or network security  Project Proposal (Due on Oct. 5)  Problem statement  Progress report (Optional)  Preliminary results  Final report (Due on Dec. 2)  Complete project report

Project Proposal  In PDF, 2-3 pages, single space, 10 font size  Potential format:  Problem Statement  Motivation  Objectives  Related works  Technical approach  Expected results from the project

Final Project Report  In PDF, pg, single space, 10 font size  Conform to formats of research papers  May contain the following sections:  Title  Abstract  Introduction  Related work  System Architecture/System design/Technical Approach  Implementation and experimental results  Discussion (e.g., limitations)  Conclusion and future works

10 Required Skills for Project  System programming  Network simulation  Kernel hacking  Data collection and processing, etc.  Analytical skills  Probability and statistics  Mathematical modeling, etc.

11 Useful Resources  Security conferences  First tier: ACM CCS, IEEE S&P, Usenix Security, NDSS; Crypto, Eurocrypt  Second tier: DSN, ESORICS, RAID, ACSAC, IMC, etc.  Third tier: SecureComm, CODASPY, DIMVA, ACNS, WiSec, etc.  System conferences  SOSP, OSDI, Usenix ATC, NSDI, ASPLOS, etc.  Journals  ACM Transactions on Information and System Security (TISSEC)  IEEE Transactions on Dependable and Secure Computing (TDSC)

Presentation  Each student is required to present two papers in two different classes.  Two presentations in each class.  Each presentation lasts for 30 minutes.  Audience may ask questions during presentation  The presenter is responsible for controlling the time.  10 minutes for in-class quiz and evaluation.

Requirement for Presenter  Requirement for presenter 1. Prepare slides 2. Prepare 3 questions on the paper along with the answers 3. Include the 3 questions on the last slide 4. Send the slides, 3 questions with answers to the instructor ONE Week before the class.  If late, you lost one point for one day late, two points for two day late, and so one.

Requirement for Audience  Requirement for audience 1. Read the paper before the class 2. Listen to the presentation carefully 3. Evaluate the presentation and provide comments using the given form 4. Answer the 3 questions after the presentation 5. Send both evaluation and quiz answer to the instructor in class  The instructor will summarize the comments and send the feedback to the presenter.

Final Exam  12/09/2015 9:00am – noon  Most exam questions based on the questions from the presenters

16 Honor Code Violations  A. Lying: the presentation of false information with the intent to deceive.  B. Stealing: knowingly taking or appropriating the property of another, including property of the College, without the rightful owner’s permission and with the intent to permanently or substantially deprive the owner of the property.  Cheating: including, but not limited to, Plagiarism, Unauthorized Assistance/Collaboration, Use of Unauthorized materials, Unauthorized Dual Submission of Previous Academic Work, Time Constraint Violation, Directions Violation,