Meeting Times |
Thursdays & Fridays, 1 - 2:15 pm, Wyman Park Conference rm.
Description |
This course focuses on selected research topics in communications security. The course is structured as a research seminar where students present research papers to their peers. Topics may include
Prerequisites of 600.424 and 600.449 (or equivalent) are strongly advised. In addition, familiarity with basic cryptographic primitives will be necessary to understand the details of some of the assigned papers.
Course Project |
Your course project will entail submitting (to me) a workshop quality research paper outlining novel ideas. This project can involve application of concepts learned from other research papers, but MUST depict original ideas. There will be some checkpoints throughout the semester and will include a short survey paper on work related to your topic. The course project constitutes 60% of your final grade. You are required to use LaTeX when preparing your final report.
Readings and Presentations |
Students are required to read all papers assigned during the semester and be able to competently discuss the material in class. Each student will be responsible for presenting one lecture (depending on the class size) -- that lecture will be based on the assigned paper for the week including as much relevant related work as necessary to distill the work presented in the paper. The speaker should try to present a comprehensive view of the topic suitable for a 1 hour talk. Additionally, each student is responsible for submitting a summary of the paper, which includes (1) at least two thought-provoking questions on the assigned paper (2) a discussion of any strengths and weaknesses (3) two possible directions for extensions on the ideas / topic presented in the paper. Your questions should critically evaluate the paper (eg, questioning the assumptions, questioning whether the experiments are lacking (and why), flaws in the analysis, etc). This summary will be turned in to the moderator (and me) on the Thursday session.
The moderator is responsible for recapping the ideas for the previous day (15 mins max) and presenting any supplimentary material not covered by the presenter. The moderator will lead the general discussions on Friday. Notes on the week's discussion must also be compiled by the moderator, and submitted to me no later than 1 week after the lecture. These notes will be made publicly available (via the website) to rest of the class.
Office Hours |
Tuesday 1 - 3 pm or by appointment.
Mailing List |
send email to majordomo (at) cs.jhu.edu with subscribe cs624 in the message body
Grading |
This is intended to be an interactive class, and as such, class participation will play a significant role in my grading criteria. Students will be graded on the presentation of their assigned paper, their participation in discussions and questions, the assignment and course project. Weights are as follows:
Deliverable | Grade |
Presentations | 25% |
Project | 60% |
Class participation | 15% |
Date |
Topic | Presenter (Thursday) |
Moderator  (Friday) |
Feb. 2nd |
Course Introduction, selection of presenters, project discussion.
|
||
Feb. 9/10 |
Practical Techniques for Searches on Encrypted Data
D. Song, D. Wagner and A. Perrig related readings:
|
Lucas |
Seny/Fabian |
Feb. 16/17 |
Modeling Botnet Propagation Using Time Zones
D. Dagon, C. Zou, and W. Lee related readings:
|
Jay |
Fabian/Moheeb |
Feb. 23/24 |
Scott |
Charles |
|
March 2/3 |
Keyboard Acoustics Emanations Revisited
L. Zhuang, F. Zhou and J.D. Tygar related readings:
|
Dan slides |
Razvan |
March 9/10 |
On the Effectiveness of Instruction set randomization
N. Sovarel, D. Evans, and N. Paul related readings:
|
(no class) |
Kevin (presenter) |
March 16/17 |
Payload Attribution via Hierarchical Bloom Filters
K. Shanmugashundaram, H. Bronnimann, N. Memon related readings:
|
Jacob slides |
Raluca |
March 20-26 Spring Break | |||
March 30/31 | No Class -- away at PC meeting | ||
Apr. 6/7 |
Tracking Anonymous Peer-to-Peer VoIP Calls on the Internet
X.Wang, S.Chen, and S. Jajodia related readings:
|
Amos slides |
Scott
|
Apr. 13/14 |
Robust TCP Stream Reassembly in the presence of adversaries
S. Dharmapurikar and V. Paxson related readings:
|
Razvan |
Amos
|
April 20/21 |
Distillation Codes and Applications to DoS Resistant Multicast Authentication
C. Karlof, N. Sastry, Y. Li, A. Perrig, J.D. Tygar. related readings:
|
Ryan slides |
Kevin part 1 part 2 |
Apr. 27/28 |
Churn as Shelter
T. Condie, V. Kacholia, S. Sankararaman, K. Hellerstein, P. Maniatis. related readings:
|
Jay slides |
Dan slides
|
May 4/5 |
Aggregated Path Authentication for Efficient BGP Security
M. Zhao, S. Smith and D. Nicol related readings:
|
Raluca |
In Class Presentations
|
Reading Week | |||
Thursday May 18th | Final Projects due by 10pm. NO EXCEPTIONS |