EE 515/IS 523: Security 101: Think Like an Adversary
SyllabusTextbook
Class Homepage: http://security101.kr Read this document very carefully, as it defines what is required to perform effectively in this class. Every scientific research starts from finding new problems. Likewise, the most important step in security research is to discover new attacks. Today, media is filled with attacks on various systems: Web servers, DNS, Internet banking, e-voting systems, cellular networks, social networks, mobile phones, nuclear power plants, and implantable medical devices. These attacks are originated from various vulnerabilities, such as user interface design, ignorance or security by obscurity, deployment mistakes, and physical exposure. The main objective of this course is to learn how to think like an adversary. In other words, we will look at various ingenuous attacks and discuss why and how such attacks were possible. This is first crucial step to design and deploy systems robust against various attacks. Instructor: Yongdae Kim Email: yongdaek(at)ee.kaist.ac.kr Office: Room 910 N1 IT Convergence Building, 291 Daehangno, Yuseong-gu, Daejeon, 305-701, Republic of Korea Lecture: MW 2:30PM - 3:45PM, N1 113 Office hours: TBD (Also possible by sending me an e-mail) Course content : Security Fundamentals, Frequent Failures from user interface/data mining/software engineering, Case studies of various attacks on Peer-to-peer system, Social Networks, Cellular Networks, Botnets, Cloud Computing, Internet Control Plane, Medical devices, Automobiles, Crypto implementation, Hardware, etc. Evaluation: The
following rules
will be strictly
enforced. Incompletes will in general not be
given. These
options will
be considered only when a provably serious family or personal emergency
arises, proof is presented, and the student has already
completed all but a small portion of the work. |