Spring EE693F Syllabus: Computer and Network Security, 3 credits
Course Description: We will study basic security theory, current practices, and emerging research issues in this class. The course consists of two parts. The first part covers the fundamentals of computer and network security, and the second part focuses on research projects on the state-of-art computer and network security issues and challenges.
Prerequisites: Please talk to the instructor. Basic understanding of computer systems and programming languages.
Class Format: Lectures are combined with discussions and, if applicable, student presentations and discussions of advanced topics. Students are expected to be active participants, by studying the relevant chapters and/or research papers, and participating at in-class discussions.
Class Time and Location:
MWF 1230-0120p at Holmes Hall 389.
Instructor: Yingfei Dong
Contacts: edu or 956-3448 by phone. Your comments are welcome.
Office Hours: Holmes Hall 442, one hour after the class, or by email appointment.
Textbook: (required) Cryptography and Network Security, 5th Edition, William Stallings, ISBN: 0136097049, Prentice Hall, Copyright: Jan. 2010.
Handouts/Notes and Supplemental Text: will be available on-line or distributed in classes.
Please check the class web site frequently at
Part.1 Fundamentals: (1) Basics of cryptography: symmetric and public-key encryption, certificates, cryptographic hash functions. (2) Authentication and key establishment. (3) Current Security Protocols and Applications: IP security (IPsec), Transport Layer Security (SSL/TLS), openssl.
Part.2 State-of-Art Research Projects: (1) Host Vulnerability (2) Denial of service attacks, (3) Malware: Internet worms, viruses, (4) Botnets, (5) Spam. (6) Firewalls and intrusion detection systems.
Homework (work in pairs), Quizzes
Paper Survey and Presentation
Participation (contribution in discussions and questions)
Project (work in teams)
Paper Reading on distributed architecture and systems
Projects (work in teams of 1 or 2 students): A list of project suggestions is provided. Each team creates a Web page presenting the progress and the results of their projects. A team will give a presentation of their projects. Projects are subject to approval by the end of Oct. More details will be provided later on the class web site. You can propose your own project subject to approval. Sample Projects: 1) TPM remote attestation; 2) synchronized network; 3) host security evaluation; etc. We will determine the projects based on students background.
Advice on Professional Presentation:
Homework: will be available on-line or distributed in classes. Please choose homework partner(s). You are encouraged to discuss your homework with your partner, but you must write your answer alone.
Academic dishonesty will not be tolerated in any form. The integrity of our program depends on the integrity of the work done by each student. The University expects a student to maintain a high standard of individual honor in his/her scholastic work. Please refer to UH Student Conduct Code at http://www.catalog.hawaii.edu/reference/appendix02.htm for Academic Honesty, Cheating, Plagiarism, Disciplinary Action, etc.
Specifically, you must do your homework and examinations yourself, on your own, unless specifically stated otherwise in the assignment. You may discuss the homework with anyone, and use any reference material, provided you do not copy any other person's work, either in whole or in part. You may discuss assignments in general terms, but you are not allowed to share any details of actual algorithms or of program code. You may help someone else debug their program as long as you do not substitute in your own code when there are problems. Turning in a copy of someone else's program, even a copy with extensive changes made to it, is a very serious offense in this course. Penalties will be severe and automatic. (Minimum penalty: F grade for the course.)
What is plagiarism? "In short, to plagiarize is to give the impression that you have written or thought something that you have in fact borrowed from another." W. S. Achtert and J. Gibaldi, The MLA Style Manual, New York, Modern Language Association of America, 1985, p. 4.
You are a class of diverse talents, diverse backgrounds, and diverse learning styles. Because not all students learn the same way, the instructor will try a variety of teaching styles to present the material. Some you will like, others you will not. Please be aware, what works for you may not necessarily work for others in the class and vice versa. Therefore, you are expected to actively participate in your own education to make the best of all situations whether you like them or not. Please contact me directly if you have any comments about the class.