ECE 424/ CS 463: Computer Security II

ECE 424/ CS 463: Computer Security II

Home | Schedule | Campuswire | Office Hours


InstructorVarun Chandrasekaran (varunc@illinois.edu)
TAsDaniel Hsu (chhsu5@illinois.edu)
Sujithra Rajan (rajan11@illinois.edu)
Time/LocationBG/ BU Section: Tuesday & Thursday (11:30 AM - 12:50 PM). Electrical & Computer Eng Bldg - Room 2013
DSO Section: online and asynchronous via Coursera
SyllabusLink to Syllabus

Announcement

8/26/2024: [First week of class] Enrolled students will be added/invited to ECE 424/ CS 463 Campuswire before the first week of the class. If you registered during/after the first week and did not get the Campuswire invitation, please email the instructor (varunc@illinois.edu) for the invitation code.

MPs will be released (and submitted) via Github. If you have not done so, please create a Github account. For students who have already enrolled, We will provide detailed tutorials and instructions on how to sign up with class repo and check out MPs. We use Campuswire for Q&A and discussions. You will be added to campuswire by the course staff.


Class Description

The course focuses on various aspects of data-centric security and privacy. Topics include applied cryptography, trusted base, privacy, anonymity, non-interference, information flow, intrusion detection, machine learning and security, password security, policy composition and analysis, formal approaches to specification and verification of secure systems, and security and privacy of emerging systems. Course Information: 3 undergraduate hours. 3 or 4 graduate hours. Prerequisites: CS 225. Additional prerequisites or corequisites may be specified each term.

Learning Goals: Identify and address privacy issues in online social networks; Apply machine learning to security and address adversarial machine learning; Use crypto constructs (homomorphic encryption, multi-party computation, etc.); Identify and address issues with de-identification; Use hardware designed to support trusted computing; Reason about information flow, computational security for encryption; Recognize threats and design mitigations for security in key sectors (e.g., healthcare); Understand architecture and recognize threats for smartphone security; Recognize issues with web privacy (especially tracking and advertising); Analyze human factors as they affect privacy and security; Recognize and reason about password security;

Important Note: The course assumes a basic knowledge of programming, computer systems, and statistics. The class will expect the ability to program in Python (primary), and Java (secondary)


Final Exam Schedule

  • In-person Session:

    Date: Friday, December 13, 2024
    Location: ECEB 2013
    Time: 8:00 AM - 11:00 AM

  • Online Session:

    Dates:

    • Friday, December 13, 2024 (or)
    • Sunday, December 15, 2024 (or)
    • Monday, December 16, 2024

    Location: Remotely, proctored by ProctorU
    Time: Any 3-hour time slot on these 3 days

For more details or doubts, please check the Campuswire.


Expected Work

  • Participation: Students are expected to attend all the lectures, participate in discussions, and attend (some) office hours (online/ offline). Please inform the instructor via email if you cannot make it to the class due to travel or sickness.

  • Machine Problems (MP): Students are expected to work on 5 MPs throughout the semester (individual effort only). The problems will involve hands-on programming and data analysis, covering various topics that complement the lecture topics. Example topics include tracking user location based on social network data, interacting with Bitcoin APIs, multi-party computation without directly exchanging data. All deadlines are 11:59 PM (CT) of the specific date.


Course Materials

WEEKSTUDY MATERIAL
Week 1Course Plan
Introduction
Week 2Social Networks
De-Identification
Week 3Machine Learning 1
Machine Learning 2
Week 4Basic Crypto
Crypto Construct
Week 5Trusted Computing 1
Trusted Computing 2
Week 6Bitcoin
Information Flow
Week 7Healthcare
Week 8Smartphones 1
Smartphones 2
Week 9Crypto Models 1
Crypto Models 2
Week 10Web Privacy
Deep Fake
Week 11Automobile
Automobile AML
Week 12Password Security
Side Channel Attack

Policies

Late Policy: Please see the individual assignment instruction

Academic Integrity: For detailed information on our plagiarism guidelines and consequences, please refer to the Plagiarism Policy.

Special Accommodations: If you need special accommodations because of a disability, please contact the instructor in the first week of classes.

Diminished Mental Health: Diminished mental health, including significant stress, mood changes, excessive worry, substance/alcohol abuse, or problems with eating and/or sleeping can interfere with optimal academic performance, social development, and emotional wellbeing. The University of Illinois offers a variety of confidential services including individual and group counseling, crisis intervention, psychiatric services, and specialized screenings at no additional cost. If you or someone you know experiences any of the above mental health concerns, it is strongly encouraged to contact or visit any of the University’s resources provided below. Getting help is a smart and courageous thing to do – for yourself and for those who care about you.

  • Counseling Center: 217-333-3704, 610 East John Street Champaign, IL 61820
  • McKinley Health Center: 217-333-2700, 1109 South Lincoln Avenue, Urbana, Illinois 61801

Statement on CS CARES and CS Values and Code of Conduct

All members of the Illinois Computer Science department - faculty, staff, and students - are expected to adhere to the CS Values and Code of Conduct. The CS CARES Committee is available to serve as a resource to help people who are concerned about or experience a potential violation of the Code. If you experience such issues, please contact the CS CARES Committee. The instructors of this course are also available for issues related to this class.

Varun Chandrasekaran
Varun Chandrasekaran
Assistant Professor