Network Security

CS 254 - Winter 2025

OverviewSchedule/ReadingsAttack/Tool PresentationsCourse Project

Readings

Paper Response Guidelines

Write a ~400 word critical response and comments to each required paper. Focus on the following:

The more you write about B and C, the better. Your most important task is to demonstrate that you've read the paper and thought carefully about the topic. Feel free to give other original/creative thoughts that are not listed above (and do some research if possible to check their feasibility). No copy and paste of the original paper text --- if detected, lowest possible score will be given automatically!

Paper responses are due before each class (submit on ilearn). A response for each paper will be graded and returned back with a check-, check, or check+.

Be prepared to discuss in the lecture with your notes about what you find interesting and want to know more about (they can be questions, critics, etc.).

Use of AI (e.g., ChatGPT) is highly discouraged. It is okay to use it to help you paraphrase you wording, but the opinions and observations should come from you!

Discussion Lead and Extra Points

Please take a look at the papers in each session. If you are interested in leading the discussion of any session, you should sign up on the web sheet published through ilearn and get extra points for doing so. As a discussion lead, two tasks are expected: 1) You will summarize the papers in class (with or without slides) for 10-min each. 2) You should prepare yourself by reading the technical details carefully and coming up with a list of discussion points. The discussion points should be designed to engage students in critical and creative thinking. Think about the points ahead of time and be prepared to answer questions other students may throw at you. Email ahead of time your discussion points to instructor for feedback. Please allow 2 days to receive the feedback. This will be a good opportunity for you to learn to discuss ideas around a research topic and it generally helps your presentation and communication skills.

Reading List

Most papers should be publicly accessible. If any links are broken, please search for them. If any of them require paid subscription, you can access them for free when connecting on campus. For off-campus access, try UCR VPN.

Week 1

Monday, Jan 6

Wednesday, Jan 8 --- Where we started (one combined response)

 

Week 2 - meet instructor to pick projects - Initial idea due on Friday (by email)

Monday, Jan 13 --- Denial-of-Service (separate responses)

 

Wednesday, Jan 15 – TCP/IP (one combined response)

Week 3

Monday, Jan 20 – Holiday

       No readings!

Wednesday, Jan 22 – Reconnaissance (one combined response)

Week 4 - Proposal report due Friday

Monday, Jan 27 – Crypto Intro

       Lecture

Wednesday, Jan 29 – Proposal presentation

       No readings!

Week 5

Monday, Feb 3 – Guest lecture (TBD)

       Lecture

Wednesday, Feb 5 – Attack and Tool Presentation

       No readings!

Week 6

Monday, Feb 10 – Public key cryptography (SSL/TLS)

       No readings!

Wednesday, Feb 12 – Attack and Tool Presentation + SSL/TLS failures (Reading assigned but no response needed)

  • Attacks on SSL A Comprehensive Study of BEAST, CRIME, TIME, BREACH, LUCKY 13 & RC4 Biases, Sarkar and Fitzgerald. Tech report, 2013 (focus on BEAST and CRIME)
  • Week 7

    Monday, Feb 17 – Holiday

         No readings!

    Wednesday, Feb 19 – Anonimity and Email Security (separate responses)

    Week 8

    Monday, Feb 24 – Censorship (separate responses)

    Wednesday, Feb 26 – Internet Worm (one combined response)

    Week 9

    Monday, Mar 3 – Botnet (separate responses)

    Wednesday, Mar 5 – Internet-wide measurement

    Week 10

    Monday, Mar 10 – Underground economy

    Wednesday, Mar 12 – Network Intrusion Detection (separate responses)

    Week 11

    Date TBD – Project Presentation

    Date TBD, final project report due