The tentative list of topics below should give you an idea of what to expect. The security mindset, thinking like an attacker, reasoning about risk, research ethics Symmetric ciphers, hash functions, message authentication codes, pseudorandom generators Key exchange, public-key cryptography, key management, the SSL protocol Exploitable bugs: buffer overflows and other common vulnerabilities – attacks and defenses Malware: viruses, spyware, rootkits – operation and detection Automated security testing and tools for writing secure code Virtualization, sandboxing, and OS-level defenses The browser security model Web site attacks and defenses: cross-site scripting, SQL injection, cross-site reference forgery Internet crime: spam, phishing, botnets – technical and nontechnical responses Network protocols security: TCP and DNS – attacks and defenses Policing packets: Firewalls, VPNs, intrusion detection Denial of service attacks and defenses Wireless and mobile device security Data privacy, anonymity, censorship, surveillance Hardware security – attacks and defenses Trusted computing and digital rights management Electronic voting – vulnerabilities, cryptographic voting protocols Physical security – locks and safes There will be no exams.
Instead, your grade will be based on the following components: Class Participation (5%) — I will assign one or two research papers as required reading for each class. Paper Responses (15%) — Unless otherwise noted on the reading list, you are required to write a short reaction to each paper.
Students will be prepared for research in computer security and for security-related research in other subfields, and they will gain hands-on experience designing and evaluating secure systems.
There will be many opportunities to tailor the course to your backgrounds and interests.
They are distributed at the conference and are included in all major online databases.
The 15th edition of the conference will be held in Milan, Italy on November 14-16, 2016.But more importantly, the technology that developed rapidly was that of Internet and computer networks .Personal computer interconnected via Internet provides significant computing facility to users. The size of these computing devices got further reduced with the advent of mobile computing.This course covers foundational work and current topics in computer systems security.We will read research papers and discuss attacks and defenses against operating systems, client-side software, web applications, and IP networks. The physical size of both processors and storage got reduced.In personal computers, we subsequently observed the amalgamation of parallel processing concepts with the development of multicore chips.The International Conference on Cryptology and Network Security (CANS) is a recognized annual conference, focusing on all aspects of cryptology, and of data, network, and computer security, attracting cutting-edge results from world-renowned scientists in the area.Proceedings of CANS are published in the Lecture Notes in Computer Science series of Springer.Carefully read the Computer Fraud and Abuse Act (CFAA), a federal statute that broadly criminalizes computer intrusions.This is just one of several laws that govern hacking.