CSCI 8260 - Computer Network Attacks and DefensesSpring 2016 |
This is the course calendar
for the Fall 2014 semester. Please notice that the schedule
is not definitive and will be updated as the course
progresses. Students are responsible for visiting this page
often to stay informed on the latest reading assignments and
other information. Of course, I will also inform you of
significant changes during the lectures, but this page is
the one place you should refer to for all the details. |
Date |
Topic |
Lecture / Reading Assignments |
Other Assignments |
1/11 |
Syllabus |
CSCI-8260
Syllabus [slides] |
|
1/12 |
AMICO
- Malware Detection |
|
|
1/14 |
Intro |
Introduction
to Computer and Network Security |
|
1/19 |
Intro |
Introduction to Computer and Network Security | Choose 3 papers from the TBD
list below by 1/25 (send titles and rank via email) |
1/21 |
Topics | Introduction
to Computer and Network Security [slides] |
|
1/25 |
Topics |
Overview of Research Topics | |
1/26 |
Topics |
Overview of Research Topics | |
1/28 |
Topics |
Overview of Research Topics
[slides] |
|
2/1 |
Networks |
Networking concepts (HTTP) |
|
2/2 |
Networks |
Networking concepts (SMTP,
DNS) [slides] |
|
2/4 |
Networks | Networking concepts (DNS) | |
2/8 |
ML | Networking concepts (DNS) | |
2/9 |
ML | Research presentation by
Prof. Perdisci |
|
2/11 |
Guest Lecture |
Prof. Kyu Hyung Lee |
|
2/15 |
ML | Brief introduction to Pattern Recognition/Machine Learning concepts [slides] | |
2/16 |
ML |
Brief introduction to Pattern Recognition/Machine Learning concepts | |
2/18 |
Projects | Student research project presentations. | |
2/22 |
Guest lecture |
||
2/23 |
Guest lecture | ||
2/25 |
Guest lecture | ||
2/29 |
DNS-based malware detection |
Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee, David Dagon. "From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware". USENIX Security Symposium, 2012. Prof. Perdisci [slides] | |
3/1 |
Botnet takedown |
B. Stone-Gross, M. Cova, L.
Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C.
Kruegel, G. Vigna. Your botnet is my botnet: analysis of a botnet takeover. CCS '09: Proceedings of the 16th ACM conference on Computer and communications security. PRESENTER: Mostafa |
|
3/3 |
Systems security |
C. Cowan, P. Wagle, C. Pu,
S. Beattie, J. Walpole. Buffer overflows: attacks and defenses for the vulnerability of the decade. Foundations of Intrusion Tolerant Systems, 2003 PRESENTER: Pranav |
|
3/14 |
Android security |
Adrienne Porter Felt et al. Android Permissions Demystified ACM conference on Computer and communications security, 2011 PRESENTER : Xingzi |
Write Paper Review - review
one of the papers presented between 3/3 and 3/17. Deadline:
3/28. Use this review
template. |
3/15 |
Passwords |
Joseph Bonneau, Cormac
Herley, Paul C. van Oorschot, Frank Stajano The quest to replace passwords: a framework for comparative evaluation of Web authentication schemes IEEE Symposium on Security and Privacy 2012 |
Chose 3 papers out of this list by 3/18. |
3/17 | Spam |
K. Levchenko et al. Click Trajectories: End-to-End Analysis of the Spam Value Chain IEEE Symposium on Security and Privacy 2011 PRESENTER: Luis |
|
3/21 |
Student research project presentations (progress report). | ||
3/22 |
Botnets |
Y.
Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I.
Osipkov. Spamming Botnets: Signatures and Characteristics. SIGCOMM'08. PRESENTER: Nicholas |
|
3/24 |
Data privacy |
R. Geambasu, T. Kohno, A.
Levy, H. M. Levy. Vanish: Increasing Data Privacy with Self-Destructing Data. In Proceedings of the USENIX Security Symposium 2009. PRESENTER: Karthika |
Write Paper Review - review one of the papers presented between 3/22 and 3/24. Deadline: 3/31. Use this review template. |
3/28 |
Android Malware |
Yajin Zhou, Xuxian Jiang Dissecting Android Malware: Characterization and Evolution IEEE Symposium on Security and Privacy 2012 PRESENTER: Lovina |
|
3/29 |
Android Security |
What the
App is That? Deception and Countermeasures in the Android
User Interface PRESENTER: Pranav |
|
3/31 |
DNS Security |
Connection-Oriented DNS to Improve
Privacy and Security PRESENTER: Michael |
Write Paper Review - review one of the papers presented between 3/28 and 3/31. Deadline: 4/7. Use this review template. |
4/4 |
Android Security |
Cookies Lack Integrity: Real-World
Implications PRESENTER : Luis |
|
4/5 |
Web Security |
ZigZag:
Automatically Hardening Web Applications Against
Client-side Validation Vulnerabilities PRESENTER: Nicholas |
|
4/7 |
App Security |
Finding
Unknown Malice in 10 Seconds: Mass Vetting for New Threats
at the Google-Play Scale PRESENTER : Xingzi |
Write Paper Review - review one of the papers presented between 4/4 and 4/7. Deadline: 4/14. Use this review template. |
4/11 |
Browser Security |
Trends and Lessons from
Three Years Fighting Malicious Extensions PRESENTER : Lovina |
|
4/12 |
Web Security |
The SICILIAN Defense:
Signature-based Whitelisting of Web JavaScript PRESENTER : Karthika |
|
4/14 |
Web Security |
The Unexpected Dangers of Dynamic
JavaScript PRESENTER: Michael |
Write Paper Review - review one of the papers presented between 4/11 and 4/14. Deadline: 4/21. Use this review template. |
4/18 |
Email |
Security by Any Other
Name: On the Effectiveness of Provider Based Email
Security PRESENTER : Lovina |
|
4/19 |
Web Security |
Meerkat: Detecting
Website Defacements through Image-based Object Recognition PRESENTER: Pranav |
|
4/21 |
DDoS |
Bohatei: Flexible
and Elastic DDoS Defense PRESENTER: Nicholas |
Write Paper Review - review one of the papers presented between 4/18 and 4/21. Deadline: 5/28. Use this review template. |
4/25 |
Attack Prediction |
Vulnerability Disclosure
in the Age of Social Media: Exploiting Twitter for
Predicting Real-World Exploits PRESENTER : Karthika |
|
4/26 |
Vulnerabilities and Botnets |
The Attack of the Clones:
A Study of the Impact of Shared Code on Vulnerability
Patching PRESENTER : Xingzi Post-Mortem of a Zombie: Conficker Cleanup After Six Years PRESENTER : Luis |
Write Paper Review - review one of the papers presented between 4/25 and 4/26. Deadline: 5/5. Use this review template. |
4/28 |
Final Student Research
Project Presentations |
||
5/2 |
Final Student Research Project Presentations | Submit final research paper
by 11:59pm on May 9, 2016. Important: Use LaTeX! Remember to submit a PDF copy of the paper, a zip file containing the LaTeX sources, and a zip archive containing the source code of your project. |
|
Participate to Student Course Evaluations |