Proposal for Term Project Information Security, Fall 2014 J. H. Wang Sep. 25, 2014.

Slides:



Advertisements
Similar presentations
Customized Network Security Protocols Cristina Nita-Rotaru and Jeffrey Seibert SPONSORED BY DOUBLE-TAKE SOFTWARE (Jan July 2009) Department of.
Advertisements

Introduction 1-1 CS6204 Recent Advances in Computer Security and Privacy 3-credit graduate-level seminar Danfeng (Daphne) Yao Spring 2010 Office hours:
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
CSCD 433/533 Advanced Computer Networks Lecture 1 Course Overview Fall 2011.
CMSC 456 Introduction to Cryptography
School of Computing and Mathematical Sciences
Advanced Computer Networks Fall 2010 Instructor: Haining Wang.
Advanced Network Security Fall 2014 Instructor: Kun Sun, Ph.D.
CSE6339 COMPUTATIONAL JOURNALISM (SPECIAL TOPICS IN ADVANCED DATABASE SYSTEMS) CSE6339, Spring 2015 Department of Computer Science and Engineering, University.
Introduction to Operating Systems J. H. Wang Sep. 18, 2012.
1 Computer Engineering Department Islamic University of Gaza ECOM 6301: Advanced Computer Architectures (Graduate Course) Fall 2013 Prof. Mohammad A. Mikki.
Understanding data communications Taekyoung Kwon
C HU H AI C OLLEGE O F H IGHER E DUCATION D EPARTMENT O F C OMPUTER S CIENCE Preparation of Final Year Project Report Bachelor of Science in Computer Science.
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
Proposal for Term Project Operating Systems, Fall 2011 J. H. Wang Nov. 3, 2011.
Proposal for Term Project Operating Systems, Fall 2015 J. H. Wang Sep. 18, 2015.
Proposal for Term Project Operating Systems, Fall 2008 J. H. Wang Nov. 5, 2008.
CS 006 Effective Use of WWW Fall 2007 WeeSan Lee
Introduction to Operating Systems J. H. Wang Sep. 18, 2015.
Welcome to the San Bernardino County Coach Quarterly Meeting.
Term Project Description CAP6135 Spring Term Project Two students form a group to do term project together – A research oriented term project.
CS 498 Senior Seminar Students will research a current topic in computer science, write a paper on that topic, and make an oral presentation.
Next Semester Classes Planning. Previous bioinformatics class  They can give you an idea about the difficulty level and interestingness factor.
BIS3324 Group Assignment – Schedule, guideline & templates (2015-Jan Semester)
Proposal for Term Project J. H. Wang Mar. 2, 2015.
Computer Network Management Course
B. Prabhakaran1 Multimedia Systems Textbook Any/Most Multimedia Related Books Reference Papers: Appropriate reference papers discussed in class from time.
CSE 534: Advanced Computer Networks
Advanced Systems and Network Security Fall 2015 Instructor: Kun Sun, Ph.D.
Introduction 1-1 Lecture 1 University of Nevada – Reno Computer Science & Engineering Department Fall 2015 CPE 400 / 600 Computer Communication Networks.
Introduction to Information Security J. H. Wang Sep. 10, 2013.
Proposal for Term Project Operating Systems, Fall 2012 J. H. Wang Nov. 13, 2012.
Term Project Description CAP6135 Spring Term Project Two students form a group to do term project together – A research oriented term project.
INFSCI 2935: Introduction to Computer Security1 Project Implementation Implementation  Reasonable sophistication  Up to 3 people maximum Survey type.
Introduction to Operating Systems J. H. Wang Sep. 15, 2010.
Class 4 Asymmetric Cryptography and Trusting Internal Components CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Peer to Peer Streaming Protocol (PPSP) BOF Gonzalo Camarillo Ericsson Yunfei Zhang China Mobile IETF76, Hiroshima, Japan 13:00~15:00 THURSDAY, Nov 12,
Advanced Computer and Network Security Fall 2014 Instructor: Haining Wang.
Audio/Video Transport Core Maintenance Working Group Magnus Westerlund Roni Even Jabber room:
Introduction to Information Security J. H. Wang Sep. 18, 2012.
ITCS 6265 Details on Project & Paper Presentation.
1 Computer Engineering Department Islamic University of Gaza ECOM 6303: Advanced Computer Networks (Graduate Course) Spr Prof. Mohammad A. Mikki.
Course web page: ECE 646 Cryptography and Computer Network Security ECE web page  Courses  Course web pages  ECE 646.
C HU H AI C OLLEGE O F H IGHER E DUCATION D EPARTMENT O F C OMPUTER S CIENCE Preparation of Final Year Project Report Bachelor of Science in Computer Science.
Term Project Description CAP6135 Spring Term Project Two students form a group to do term project together – A research oriented term project.
Introduction to Operating Systems J. H. Wang Sep. 13, 2013.
Advances in Cloud Computing CIS6930/CIS4930
B. Prabhakaran1 Multimedia Systems Reference Text “Multimedia Database Management Systems” by B. Prabhakaran, Kluwer Academic Publishers. – Kluwer bought.
Proposal for Term Project Information Security, Fall 2013 J. H. Wang Nov. 5, 2013.
CSE6339 DATA MANAGEMENT AND ANALYSIS FOR COMPUTATIONAL JOURNALISM CSE6339, Spring 2012 Department of Computer Science and Engineering, University of Texas.
Proposal for Term Project Compilers, Fall 2015 J. H. Wang Nov. 2, 2015.
CS & CS ST: Probabilistic Data Management Fall 2016 Xiang Lian Kent State University Kent, OH
Term Project Proposal By J. H. Wang Apr. 7, 2017.
Introduction to Operating Systems
Instructional Leadership for a Professional Learning Culture:
JavaScript Applications
Proposal for Term Project Information Security, Fall 2016
Introduction to Information Security
Introduction to Information Security
Proposal for Term Project
CHU HAI COLLEGE OF HIGHER EDUCATION DEPARTMENT OF COMPUTER SCIENCE Preparation of Mid-Term Progress Report Bachelor of Science in Computer Science.
Introduction to Operating Systems
Final Project Description
Proposal for Term Project Operating Systems, Fall 2018
EE362G Smart Grids: End of semester presentations
Presentation transcript:

Proposal for Term Project Information Security, Fall 2014 J. H. Wang Sep. 25, 2014

What’s Included in the Score for Term Projects? Proposal: after midterm Presentation: the last three weeks of the semester Final Report: the last week

Term Project Options 1.Programming projects using security libraries Team-based with at most 4 persons 2.Topical survey in information security related topics NOT team-based Requirements –Presentation is *required* for both options –A proposal is *required* after midterm (Nov. 24, 2014) Programming: introduction, system designs Surveys: introduction, selected topics –Final report is *required* after presentation

Proposal for Programming Projects A one-page description of your idea about the system you want to design – Introduction : an overview of the system – Methods : possible security issues and the principal ideas of your ways to solve them – Tools : design of your system, and the reasons why you use selected tools –For team members: the names and the expected responsible parts of each individual member should be clearly identified Functionality of your system will be considered in the final score

Possible Topics for Programming Projects (1/2) Programming of selected components –Implementation and demonstration of symmetric encryption/decryption algorithms Block cipher: DES, 3DES, AES, … Stream cipher: RC4, … –Implementation and demonstration of public- key encryption/decryption algorithms SHA, HMAC, … Diffie-Hellman, RSA, …

Possible Topics for Programming Projects (2/2) Adding security functions into existing systems –Implementation of an application, e.g.: Client-server application: secured chat room Functions added: confidentiality, integrity, authentication, … Methods used: SSL/TLS –(or 3DES, Diffie-Hellman, Kerberos, …) Libraries: OpenSSL, … Platform/language: … –…

Proposal for Topical Survey A one-page description of which topics you want to survey and present –No team work allowed –You have to prepare a 20-minute presentation of the major ideas of the topics in your survey –An in-depth survey on the major topics in recent developments of information security The content and depth of your surveys will be considered in the final score

Possible Topics for Topical Surveys Topics should focus on selected parts in recent developments in information security, for example, –Cloud security/privacy (e.g. cloud storage security, cloud computing security, …) –Social network security/privacy (e.g. facebook privacy issues, …) –Smart phone security (e.g. Android “Fake-ID” problem, iCloud security, …) –Recent security bug: “Shell Shock” for bash, “heartbleed” for OpenSSL, … Broad topics will *not* be good choices, and will affect your score –Most security articles in Chinese are *not* recommended since they tend to be very broad general overview

Some Possible Sources for Topical Surveys IEEE Security & Privacy: mputingnow/securityandprivacy mputingnow/securityandprivacy –E.g. Marco Carvalho, Jared DeMott, Richard Ford, David A. Wheeler, "Heartbleed 101", IEEE Security & Privacy, vol.12, no. 4, pp , July- Aug Heartbleed 101 ACM Queue: –E.g.: ”Why Is It Taking So Long to Secure Internet Routing?” by Sharon Goldberg, Sep. 11, 2014.Why Is It Taking So Long to Secure Internet Routing?

Academic Papers Conferences: –USENIX Security Symposium –IEEE Symposium on Security & Privacy –ACM CCS, AsiaCCS –Crypto, EuroCrypt, AsiaCrypt –… Journals: –ACM TISSEC: –Journal of Cryptology: ut ut –…

Submission Due: after midterm (Nov. 24, 2014) Please submit to our homework submission site Your proposal is included in the final score, and is subject to reviews and possible suggestions on changes

Tentative Schedule for Presentation The last 3 weeks in this semester (Dec. 29, Jan. 5, and Jan. 12) –A 20-minute time slot will be allocated to each team for presentation and system demo –Please be sure to focus on the most important part in your system/survey –Presentation is allowed only within the scheduled time slots Project Report : (Due: Jan. 19, 2015 ) –After presentation, each team is required to submit the final report for term project –Including: presentation slides, source codes, executable files, and documents for installation/configuration/execution instructions

Any Questions or Comments?