EE515/IS523: Security 101: Think Like an Adversary

Every scientific research starts from finding new problems. Likewise, the most important step in security research is to discover new attacks. Today, media is filled with attacks on various systems: Web servers, DNS, Internet banking, e-voting systems, cellular networks, social networks, mobile phones, nuclear power plants, and implantable medical devices. These attacks are originated from various vulnerabilities, such as user interface design, ignorance or security by obscurity, deployment mistakes, and physical exposure. The main objective of this course is to learn how to think like an adversary. In other words, we will look at various ingenuous attacks and discuss why and how such attacks were possible. This is first crucial step to design and deploy systems robust against various attacks.

9/21 Calendar is little bit more cleaned up. Students with odd ID submit R1s, and those with even ID submit R2s.
9/19 No office hour on 9/24.
9/12 You have to choose at least 3 papers among the paper list for your class presentation here.
9/10 You can also anonymously criticize instructor and TAs in KLMS.
9/10 You can also fine project partners in KLMS.
9/10 All news must be published in KLMS.
9/10 Please fill in survey questions here.
9/1 Welcome to EE515/IS523

Basic Information

Lecture: MW 4:00pm - 5:30pm, EE2217

Instructor: Yongdae Kim yongdaek(at)
Homepage: (Under construction, right now!)
Office: EE 1226
Office hours: MW 2:45 - 3:45 pm (Also possible by sending me an e-mail, and Google/Facebook Chat)

Senior TA: Jaeseong Jeong      jsjung(at)
Junior TA: Heeyoung Kim       aliggo(at)
Office hours: by appointment only