Presentation is loading. Please wait.

Presentation is loading. Please wait.

Proposal for Term Project Information Security, Fall 2014 J. H. Wang Sep. 25, 2014.

Similar presentations


Presentation on theme: "Proposal for Term Project Information Security, Fall 2014 J. H. Wang Sep. 25, 2014."— Presentation transcript:

1 Proposal for Term Project Information Security, Fall 2014 J. H. Wang Sep. 25, 2014

2 What’s Included in the Score for Term Projects? Proposal: after midterm Presentation: the last three weeks of the semester Final Report: the last week

3 Term Project Options 1.Programming projects using security libraries Team-based with at most 4 persons 2.Topical survey in information security related topics NOT team-based Requirements –Presentation is *required* for both options –A proposal is *required* after midterm (Nov. 24, 2014) Programming: introduction, system designs Surveys: introduction, selected topics –Final report is *required* after presentation

4 Proposal for Programming Projects A one-page description of your idea about the system you want to design – Introduction : an overview of the system – Methods : possible security issues and the principal ideas of your ways to solve them – Tools : design of your system, and the reasons why you use selected tools –For team members: the names and the expected responsible parts of each individual member should be clearly identified Functionality of your system will be considered in the final score

5 Possible Topics for Programming Projects (1/2) Programming of selected components –Implementation and demonstration of symmetric encryption/decryption algorithms Block cipher: DES, 3DES, AES, … Stream cipher: RC4, … –Implementation and demonstration of public- key encryption/decryption algorithms SHA, HMAC, … Diffie-Hellman, RSA, …

6 Possible Topics for Programming Projects (2/2) Adding security functions into existing systems –Implementation of an application, e.g.: Client-server application: secured chat room Functions added: confidentiality, integrity, authentication, … Methods used: SSL/TLS –(or 3DES, Diffie-Hellman, Kerberos, …) Libraries: OpenSSL, … Platform/language: … –…

7 Proposal for Topical Survey A one-page description of which topics you want to survey and present –No team work allowed –You have to prepare a 20-minute presentation of the major ideas of the topics in your survey –An in-depth survey on the major topics in recent developments of information security The content and depth of your surveys will be considered in the final score

8 Possible Topics for Topical Surveys Topics should focus on selected parts in recent developments in information security, for example, –Cloud security/privacy (e.g. cloud storage security, cloud computing security, …) –Social network security/privacy (e.g. facebook privacy issues, …) –Smart phone security (e.g. Android “Fake-ID” problem, iCloud security, …) –Recent security bug: “Shell Shock” for bash, “heartbleed” for OpenSSL, … Broad topics will *not* be good choices, and will affect your score –Most security articles in Chinese are *not* recommended since they tend to be very broad general overview

9 Some Possible Sources for Topical Surveys IEEE Security & Privacy: http://www.computer.org/portal/web/co mputingnow/securityandprivacy http://www.computer.org/portal/web/co mputingnow/securityandprivacy –E.g. Marco Carvalho, Jared DeMott, Richard Ford, David A. Wheeler, "Heartbleed 101", IEEE Security & Privacy, vol.12, no. 4, pp. 63-67, July- Aug. 2014.Heartbleed 101 ACM Queue: http://queue.acm.org/index.cfm http://queue.acm.org/index.cfm –E.g.: ”Why Is It Taking So Long to Secure Internet Routing?” by Sharon Goldberg, Sep. 11, 2014.Why Is It Taking So Long to Secure Internet Routing?

10 Academic Papers Conferences: –USENIX Security Symposium –IEEE Symposium on Security & Privacy –ACM CCS, AsiaCCS –Crypto, EuroCrypt, AsiaCrypt –… Journals: –ACM TISSEC: http://tissec.acm.org/http://tissec.acm.org/ –Journal of Cryptology: http://www.springeronline.com/journal/00145/abo ut http://www.springeronline.com/journal/00145/abo ut –…

11 Submission Due: after midterm (Nov. 24, 2014) Please submit to our homework submission site Your proposal is included in the final score, and is subject to reviews and possible suggestions on changes

12 Tentative Schedule for Presentation The last 3 weeks in this semester (Dec. 29, Jan. 5, and Jan. 12) –A 20-minute time slot will be allocated to each team for presentation and system demo –Please be sure to focus on the most important part in your system/survey –Presentation is allowed only within the scheduled time slots Project Report : (Due: Jan. 19, 2015 ) –After presentation, each team is required to submit the final report for term project –Including: presentation slides, source codes, executable files, and documents for installation/configuration/execution instructions

13 Any Questions or Comments?


Download ppt "Proposal for Term Project Information Security, Fall 2014 J. H. Wang Sep. 25, 2014."

Similar presentations


Ads by Google