Network Security

CS 254 - Spring 2022

OverviewSchedule/ReadingsAttack/Tool PresentationsCourse Project

Professor: Zhiyun Qian, zhiyunq@cs.ucr.edu
Credits: 4
Prerequisites:  Undergraduate Networking – CS 164
Lectures: TuTh: 3:30–4:50PM, Location: online (see details in ilearn)
Forum: iLearn for class materials and Piazza for discussions
Office hours:
TBD

This intensive research seminar covers foundational work and current topics in network security. We will read research papers and discuss classic/emerging network-level attacks and defenses,  vulnerabilities in network protocols at various layers, and special topics such as Internet measurement and censorship. Students will gain a solid understanding of the fundamentals in network security.

Tentative Topic List

There will be many opportunities to tailor the course to your backgrounds and interests. The tentative list of topics below should give you an idea of what to expect. See the schedule and reading list for details (check back often). Please get in touch if you have questions or suggestions.

Grading

There will be no exams. Instead, your grade will be based on the following:

Paper Summary and Class Participation (25%) – You will read no more than two papers each class. You are required to write a short summary and offer critical comments for each paper. I'll look for evidence that you read the paper and thought carefully about the topic. The summaries are due at the beginning of class.

Attack and Tool Presentation (25%) – Choose an attack/vulnerability/exploit and a tool from the provided list and explain it and/or demo it in class. In a 10-15 minute presentation, explain the basic background, how the attack works, demo it (when possible), relate it to our daily life, and discuss possible defense/solution.  Introduce a tool to show what it can do and how the tool works behind the scene. Give a demo on how to use the tool. Presentations will take place throughout the semester per the course schedule.

Research Project (50%) – You will conduct a research project during the quarter, with the goal of writing a publishable workshop paper. Students are encouraged to work in a small group of size 2 to 3. However, individual project is allowed and the output will be considered corresponding to that. Typical project topics involve analyzing the security of a system, developing a new security mechanism, or re-implementing or adapting an existing attack/defense.

Ethics, Law, and University Policies

Please respect the rights and privacy of others. Be aware that Federal and state laws criminalize computer intrusion and wiretapping. You can be expelled by the university and arrested if you violate the policies and laws. When in doubt, consult me or a lawyer.

Computer Fraud and Abuse Act (CFAA)
Electronic Communications Privacy Act (ECPA)
University of California Electronic Communications Policy