Computer & Network Security

EECS 588 – Winter 2023

OverviewReadingsCourse Project

Readings

Paper Response Guidelines

Write a ~400 word critical response to each required paper.

Your most important task is to demonstrate that you've read the paper and thought carefully about the topic.

Paper responses are due before the start of class via the online submission system. After you upload your work, the system will ask you to assess two responses written by your peers. We'll combine peer feedback and our own evaluation when determining your grade.

Reading List

Please expect updates until mid-August

Welcome / Ethics

 

Thursday, January 5 — Welcome / Ethics

Network Security

Tuesday, January 10 — TCP/IP

Thursday, January 12 — DNS

Botnets and Denial of Service Attacks

Tuesday, January 17 — Botnets

  • Understanding the Mirai Botnet. Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric et al. Usenix Security, 2017.

Thursday, January 19 — DoS

Online Freedom

Tuesday, January 24 — Anonymity

Thursday, January 26 — Censorship Resistance

Human Factors

Tuesday, January 31 — Authentication

Thursday, February 2 — Usable In Security

Privacy

Tuesday, February 7 — Privacy

Thursday, February 9 — Pre-proposal presentations

Real World Crypto

Tuesday, February 14 — Crypto

  • DROWN: Breaking TLS using SSLv2. Aviram, Nimrod, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta et al. Usenix Security, 2016.

Thursday, February 16 — Certificates

  • Tracking Certificate Misissuance in the Wild. Deepak Kumar, Zhengping Wang, Matthew Hyder, Joseph Dickinson, Gabrielle Beck, David Adrian, Joshua Mason, Zakir Durumeric, J. Alex Halderman, and Michael Bailey. Oakland, 2018.

Critical Systems

Tuesday, February 21 — IOT Security

Thursday, February 23 — Automotive Security

Spring Break

Tuesday, February 28 — No class

Thursday, March 2 — No class

Nation State Attacks and Data Provenance

Tuesday, March 7 — Nation State Attacks

Thursday, March 9 — Data Provenance

Embedded Devices Security

Tuesday, March 14 — No class

Thursday, March 16 — Embedded Security and Medical Devices

Software Security

Tuesday, March 21 — No class

Thursday, March 23 — Malware

Hardware Security and Machine Learning

Tuesday, March 28 — Hardware Attacks

Thursday, March 30 — Machine Learning

Election Security

Tuesday, April 4 — Election Security

Thursday, April 6 — Final Project Presentations

Final project presentations

Tuesday, April 11 — Final Project Presentations

Thursday, April 13 — Final Project Presentations