Instructor
Email: dvotipka@cs.tufts.edu
Office Hours:
Tu/Th 10:45-11:45am, in Cummings Center rm 361, on Zoom, or by appointment at 196 Boston Ave rm 4005 (4th floor)
TA
Email: James.Mattei@tufts.edu
Office Hours:
M 2:00-3:00pm, in Miner Hall rm 110, Tu 2:00-3:00pm in Paige Hall rm 007, or on Zoom
TA
Email: Jiahao.Xu@tufts.edu
Office Hours:
M/W 11:00-12:00pm, in Halligan Hall rm 127, or on Zoom
Who:
Look left.
What:
See below.
Where:
This class will
take place on Tuesdays and Thursdays from 12:00-1:15pm
in Eaton rm 206. Students who are unable to attend course in person may also join via Zoom (link posted on the course Piazza). Zoom streams of the class will be recorded and posted to the course Box folder after class.
This class will also have an online presence.
Students are expected (read: required) to participate in online
discussions on Piazza.
Prerequisites:
CS-15 or graduate standing
This course introduces students to network security. By examining case studies and reading seminal research papers, students will learn about network attacks and vulnerabilities as well as current defenses. Topics covered include cryptography, confidentiality and authentication protocols, botnets, firewalls, intrusion detection systems, and communication privacy and anonymity.
Prerequisites: CS-15 or graduate standing
This introductory course will impart a broad understanding of the underpinnings of security techniques, security best practices, and computer security research. The course should help students to understand the mindsets of attackers (the bad guys and gals who do malicious things on the network) and system designers and defenders (the good guys and gals who try to stop the attackers). The course should prepare students to understand and assess security threats, become familiar with security engineering best practices, and write better software, protocols, and systems.
This class covers both offensive and defensive computer and network security techniques. Enrollment in this class does not constitute a waiver of Tufts' Network Use Policy. Students are expected and required to obey all University policies. Talk to the instructor before conducting any network experiments.
The strongly suggested textbook for this class is Introduction to Computer Security by Michael Goodrich and Roberto Tamassia. All book readings, listed below, are optional. Non-book assignments (that is, the links to articles) are mandatory.
Reading 1:
Book, sec 1.1
Reading 1:
End-to-end Arguments in System Design
Reading 2:
Book, chapter 5
Reading 1:
Book, sections 1.3, 8.1
Reading 2:
Socket Programming HOWTO
Homework 0 [instructions]:
Due by 11:59pm
Reading 1:
Book, sec 8.3
Reading 1:
Book, sections 8.2, 8.4
Homework 1, part 1 [instructions]:
Due by 11:59pm
Reading 1:
Book, section 7.1.2
Reading 1:
Security Problems in the TCP/IP Protocol Suite
Homework 1, part 2 [instructions]:
Due by 11:59pm
Reading 1:
Book, section 6.1
Reading 1:
Book, section 6.5
Reading 2:
Security Flaws in 802.11 Data Link Protocols
Reading 1:
Tor: The second-generation onion router
Homework 1, part 3 [instructions]:
Due by 11:59pm
Reading 1:
Book, sections 6.2 and 6.3
No Class
Kevin Bock, University of Maryland
Reading 1:
Book, sections 6.2 and 6.3
Josiah Dykstra, NSA Cybersecurity Technical Fellow
Reading 1:
Book, section 7.0 - 7.3
Reading 1:
Click Trajectories
Reading 1:
Design and Evaluation of a Data-Driven Password Meter
Homework 2 [instructions]:
Due by 11:59pm
Homework 3 [instructions]:
Due by 11:59pm