EE515/IS523: Security 101: Think Like an Adversary

Every scientific research starts from finding new problems. Likewise, the most important step in security research is to discover new attacks. Today, media is filled with attacks on various systems: Web servers, DNS, Internet banking, e-voting systems, cellular networks, social networks, mobile phones, nuclear power plants, and implantable medical devices. These attacks are originated from various vulnerabilities, such as user interface design, ignorance or security by obscurity, deployment mistakes, and physical exposure. The main objective of this course is to learn how to think like an adversary. In other words, we will look at various ingenuous attacks and discuss why and how such attacks were possible. This is the first crucial step to design and deploy systems robust against various attacks.

10/2 R1 is assigned to students if their student ID is odd (e.g., xxxxxxx1), and R2 is assigned to the others (e.g., xxxxxxx2).
9/19 The calendar is updated.
9/13 The calendar is updated.
9/12 Presenters for each paper have been chosen according to the result of the presentation survey.
9/8 R1 is assigned to students if the 3rd digit of their student ID is odd (e.g., xxxxx1xx), and R2 is assigned to the others (e.g., xxxxx2xx).
9/7 The calendar is updated. Please check out.
8/30 Previous class homepage is available from here ('12), here ('13), here ('14), and here ('15).
8/30 Welcome to EE515/IS523

Basic Information

Lecture: Tue/Thu 10:30 AM - 12:00 PM, Room 113 N1 (IT Convergence Building)

Instructor: Yongdae Kim
Email: yongdaek (at)
Office: Room 201 N26 (CHiPs Building)
Office hours: TBD (also possible by sending me an e-mail and Google/Facebook Chat)

EE TA: Yunmok Son (yunmok00 (at)
GSIS TA: Eunsoo Kim (hahah (at)
Office hours: by appointment only