Instructor: |
Shuai Hao Email: shao -AT- odu.edu Office: 3111 E&CS Building |
Lecture time: | MW 3 pm - 4:15 pm |
Location: | BAL 2069 |
Office hours: | 2-4 pm Thursday |
Course website: https://shhaos.github.io/courses/CS872/netsec-spr24.html
This course is a research-oriented, graduate-level course, centering around both classic and state-of-the-art techniques on various aspects of compter and network security. The course involves both reading/discussing research papers and a term project/final report. The course aims to provide a thorough grounding on the computer and network security for the students who are interested in conducting research in this area, as well as a comprehensive background for those generally interested in networking or security. See below the completed paper list for the topics covered in the course.
The papers will be presented as a seminar-style presentation in of ~1 hour talk plus 15 mins questions/discussions. (Note: You should consider the audience who are not expert in the relevant topic and provide a comprehensive and thorough technical background for the presented paper, which may require you adopt some materials not included in the paper.) The sequence of presentations aim to somehow provide prerequisites for the following papers. Keeping the sequence is suggested. The adjustment is possible but need receive instructor approval.
Date/Topic | Papers/Notes |
---|---|
1/8 | Lecture: Course Introduction [slides] |
1/10 | Lecture: Network and Internet Security 1 |
1/15 | No Class: Martin Luther King Jr. Holiday |
1/17 | Lecture: Network and Internet Security 2 [slides] |
1/22 | Lecture: Foundations of Cryptography 1 |
1/24 | Lecture: Foundations of Cryptography 2 [slides] |
1/29 | Lecture: Web and Browser Security 1: Web Security |
1/31 | Lecture: Web and Browser Security 2: Vulnerabilities [slides] |
2/5 DNS Security | Paper: All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records, ACM CCS'16 [slides] |
2/7 DNS Security | Paper: EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis, NDSS'11 |
2/12 Botnet | Paper: Understanding the Mirai Botnet, USENIX Security'17 |
2/14 PKI/DNSSEC | Paper: A Longitudinal, End-to-End View of the DNSSEC Ecosystem, USENIX Security'17 |
2/19 2/21 | No Class: Instructor TravelingDue: Paper Selection for Presention |
2/26 PKI/RPKI | Paper: Are We There Yet? On RPKI’s Deployment and Security, NDSS'17 |
2/28 Censorship | Paper: Understanding the Practices of Global Censorship through Accurate, End-to-End Measurements, ACM SIGMETRICS'22 |
3/4 3/6 | No Class: Spring HolidayDue: Final Report Topic Selection |
The schedule will be updated as the course progresses. |
Each student will give one full paper presentation selected from above pool. The slides used to present the paper in the class must be created by the presenters. Using materials from original authors or others is allowed but needs to be properly cited.
The slides should be sent to the instructor 2-3 days ahead of the presentation (a draft version will be fine), so the instructor can review the technical part and provide feedback, as well as arrange additional lecture for providing background if necessary.
Each student is required to write two paper reviews. The Final report is either a research-oriented technical report or a survey paper for a specific topic within the scope of the course. Details and instruction will be given in the lecture and post later.
Network Security: Private Communication in a Public World, 3rd Edition, by Charlie Kaufman, Radia Perlman, Mike Speciner, and Ray Perlner
Computer Security: A Hands-on Approach, by Wenliang Du
The suggested textbooks are not required.