HEART: Computer Security and Privacy for the Modern World
Fall 2021
Course Instructor: Tushar Jois
Can we build reliable, secure computer systems that ensure user privacy?
We'll look at three key areas of cutting-edge research -- censorship
resistance, the Internet-of-Things, and electronic voting -- and see if we
can start to answer this question! Every class, lecture material will be
accompanied by a hands-on component designed to provide first-hand
experience in computer security and privacy. (No prerequisites, 1 credit, S/U grading)
🧡️ EN.600.111(26) meets Wednesdays from 4 - 5:15p
in Krieger 309. |
💙 EN.600.111(33) meets Thursdays from 4 - 5:15p
in Krieger 309. |
Course Goals
By the end of this course, students...
- Should understand the basics of computer security and
privacy, including, but not limited to, data confidentiality,
data authenticity, and secure systems design.
- Should have a high-level understanding of how to perform threat modeling in modern application domains, such
as
censorship resistance, secure messaging, smartphones, the Internet-of-Things, and electronic voting.
- Should have an appreciation for the societal, cultural, and
political implications of security, privacy, and cryptography.
- Should have the tools and requisite background necessary to join as undergraduate researchers
in computer security labs, if they so choose.
Course Work and Expectations
- There will be a weekly reading assignment that must be completed before each class.
- There will be an end-of-class presentation on a security topic of
your choosing, executed in groups of 3. The presentation will be
conducted in Ignite format, wherein every group member has 20 slides,
which automatically advance every 15 seconds. This results in 5 minutes
per person, and 15 minutes total. The slide
template here includes more information. Each member is expected to
contribute to the out-of-class preparation for the final presentation.
- There will be discussion activities interspersed throughout the course. Students are expected to actively
listen to and encourage their classmates, and to contribute to discussions in a positive way.
- There will be an “exit ticket” handed out at the end of every
class meeting. Students are expected to use the exit ticket to
provide feedback as to the effectiveness of the lesson, and to ask
any remaining questions on the topic directly to the
Instructor.
This course is subject to the Academic Integrity
Code of the Department of Computer Science.
Course Schedule
There are 10 class meetings during the semester; the first meeting will be held the week of September 9. The last
meeting will be held the week of November 17. Note that this means the two sections do not have the same content
in a calendar week – please double check the schedule for your section’s reading.
Reading is mandatory, and is typically introductory-level. Try your best to understand these.
Optional reading is not mandatory, and typically consists of research papers in the field. They may be
more difficult to read. Every session will have some kind of interactive, in-class activity -- make
sure to bring your computer to class! Slides will be posted here after both class meetings.
Schedule last updated Thu Oct 28 3:00 PM EDT 2021.
- Introduction
'); DROP TABLE Syllabus; --
(slides)
- It's a Unix system! I know this! (slides)
- Better living through cryptography (slides)
- Trust? In my hardware? It's more likely than you think. (slides)
- Wait, I thought this was about security and privacy? (slides)
- The Signal in the noise (slides)
- Sherlock Phones: Forensics and privacy in smartphones (slides)
- The “S” in “IoT” stands for “Security” (slides)
- Technology at the ballot box (slides)
- Group presentations
- Meeting: 🧡️ Wed Nov 17, 💙 Thu Nov 11
- Reading: Reflections on
Trusting Trust (yes, again!)
- Presentation slides due today! Template here.
- Topics: Students can select from the following.
- Speculative execution (Spectre) attacks
- Perceptual hashing (NeuralHash, PhotoDNA)
- Privacy in machine learning
- Supply chain vulnerabilities (SolarWinds) and solutions
- Medical device security
- Web security: SQL injection and XSS
- Student choice (must confirm with Instructor)