EE515/IS523: Security 101: Think Like an Adversary


Reading Report

  • Due: 9:00 AM on the due date (any late submission will score zero point.)
  • Format: pure text (only .txt is acceptable. no html, no pdf, no word, and no hwp)
  • Content: every reading report should be organized as follows:
    • Title
    • Your name, student ID
    • Summary: summary should include
      • Target system & service
      • Vulnerability
      • Exploitation (attacks)
      • Evaluation and experimental method
      • Defense (potential solutions for the attacks)
    • Future work (e.g., other systems that can be easily attacked in a similar way, other potential vulnerabilities, etc.)
  • Samples