Instructor: |
Shuai Hao Email: shao -AT- odu.edu Office: 3111 E&CS Building |
Lecture time: | MW 3 pm - 4:15 pm |
Delivery: | Zoom |
Office hours: | 2-4 pm Thursday |
Course website: https://shhaos.github.io/courses/CS872/netsec-fall25.html
This course is a research-oriented, graduate-level course, centering around both classic and state-of-the-art techniques on various aspects of compter and network security. The course involves both reading/discussing research papers and a term project/final report. The course aims to provide a thorough grounding on the computer and network security for the students who are interested in conducting research in this area, as well as a comprehensive background for those generally interested in networking or security. See below the completed paper list for the topics covered in the course.
The papers will be presented as a seminar-style presentation in of 45 mins talk (including ~10 mins questions/discussions). (Note: You should consider the audience who are not expert in the relevant topic and provide a comprehensive and thorough technical background for the presented paper, which may require you adopt some materials not included in the paper.)
Date/Topic | Papers/Notes |
---|---|
8/25 | Lecture: Course Introduction [slides] |
8/27 | Lecture: Network and Internet Security 1 |
9/1 | No Class: Labor Day Holiday |
9/3 | Lecture: Network and Internet Security 2 [slides] |
9/8 | No Class: Instructor's Appointment |
9/15 | Lecture: Foundations of Cryptography 1 |
9/22 | Lecture: Foundations of Cryptography 2 [slides]Deadline: Paper Selection |
9/24 | Lecture: Web and Browser Security 1: Web Security |
9/29 | Lecture: Web and Browser Security 2: Web Vulnerabilities [slides] |
10/1 | Lecture: Cloud Computing & Paper presentation: All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records (Instructor) |
10/6 | Paper presentation: Are We There Yet? On RPKI’s Deployment and Security (Instructor) |
10/8 | Paper presentation: Who Touched My Browser Fingerprint? A Large-scale Measurement Study and Classification of Fingerprint Dynamics (Instructor) |
10/13 | No Class: Fall Holiday Deadline: Project Topics |
10/15 | Deep Entity Classification: Abusive Account Detection for Online Social Networks (J. Xu) |
10/20 | Cookies Lack Integrity: Real-World Implications (M. Robinson) |
10/22 | Exit from Hell? Reducing the Impact of Amplification DDoS Attacks (C. Larsen) |
10/27 | TextGuard: Provable Defense against Backdoor Attacks on Text Classification (M. Lin) |
10/29 | Understanding the Mirai Botnet (S. Alfred) |
11/3 | Adversarial Illusions in Multi-Modal Embeddings (J. Li) |
11/5 | Student Paper presentation |
11/10 | Paper presentation: Censorship - Quack and Augur (Instructor) |
11/12 | Paper presentation (Guest Speaker - tentative) |
11/17 | Final project presentation/discussion (10-15 min each) |
11/19 | Final project presentation/discussion (10-15 min each) |
11/24 11/26 | No Class: Thanksgiving Holiday and Final report writing |
12/1 | Course Summary |
12/3 | No Class: Final report writing |
The schedule will be updated as the course progresses. |
Each student will give one full paper presentation selected from above pool. The slides used to present the paper in the class must be created by the presenters. Using materials from original authors or others is allowed but needs to be properly cited.
The slides should be sent to the instructor 2-3 days ahead of the presentation (a draft version will be fine), so the instructor can review the technical part and provide feedback, as well as arrange additional lecture for providing background if necessary.
Each student is required to write two paper reviews. The Final report is either a research-oriented technical report or a survey paper for a specific topic within the scope of the course. Details and instruction will be given in the lecture and post later.
Network Security: Private Communication in a Public World, 3rd Edition, by Charlie Kaufman, Radia Perlman, Mike Speciner, and Ray Perlner
Computer Security: A Hands-on Approach, by Wenliang Du
The suggested textbooks are not required.