CS 578 :: Spring 2025 :: Cyber-Security



Textbooks

No required textbook. Reading materials will be provided on the course website and/or distributed in class.


Prerequisites

This course requires a basic understanding of computer systems and computer security. Please consider taking these courses first:

  • CS 312 :: Linux System Administration (must)
  • CS 370 :: Introduction to Security (must)
  • CS 344 :: Operating Systems I (recommended)
  • CS 434 :: Machine Learning and Data Mining (recommended)

Grading

Your final grade for this course will be based on the following scheme:

  • 30%: Written paper critiques [Details]
  • 10%: In-class paper presentation [Details]
  • 20%: Homeworks (HW 1-4) [Details]
  • 40%: Group project [Details]

  • [Bonus] ~10%: Extra point opportunities
    • +5%: Outstanding project work
    • +5%: Submitting term-project to workshops

Latest Announcements [Full List]


Schedule

[Note] This is a tentative schedule; subject to change depending on the progress.
Date Topics Notice Readings
Overview Security Principles
Mon.
03/31
Introduction
[Slides]
The Security Mindset
Why Information Security is Hard – An Economic Perspective
Part I: Cryptography and Network/Internet Security
Wed.
04/02
Preliminaries
[Slides]
[HW 1 Out] The First Few Milliseconds of an HTTPS Connection
Keyless SSL: The Nitty Gritty Technical Details
Mon.
04/07
Certificate Ecosystem
[Slides]
[Team-up!] Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed
A Tangled Mass: The Android Root Certificate Stores
Wed.
04/09
Crypto Failures in Practice
[Slides]
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices
The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software
Part II: Computer Systems Security
Mon.
04/14
Memory Attacks
[Slides]
[HW 2 Out] Smashing The Stack For Fun And Profit
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
Wed.
04/16
Modern Memory Attacks
[Slides]
[HW 1 Due] Return-into-libc without Function Calls (on the x86)
EXE: Automatically Generating Inputs of Death
Mon.
04/21
[No lecture] Checkpoint I Presentation Prep.
Wed.
04/23
Group Project Checkpoint Presentation I
Mon.
04/28
Memory Defenses
[Slides]
[HW 2 Due]
[HW 3 Out]
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
Control-Flow Integrity
Part III: (Hardware-level) Isolation and (Software-induced) Breaks
Wed.
04/30
Trusted Hardware
[Slides]
Komodo: Using Verification to Disentangle Secure-enclave Hardware from Software
Sanctum: Minimal Hardware Extensions for Strong Software Isolation
Mon.
05/05
Rowhammer
[Slides]
Flipping Bits in Memory Without Accessing Them
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds
Wed.
05/07
Side-Channels
[Slides]
FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack
Meltdown: Reading Kernel Memory from User Space
Spectre Attacks: Exploiting Speculative Execution
Part IV: Software/Web Security
Mon.
05/12
Malware
[Slides]
on Zoom
[HW 3 Due]
Sanghyun will be at IEEE S&P 2025.
Understanding the Mirai Botnet
Towards Automatic Generation of Vulnerability-Based Signatures
Continuous Learning for Android Malware Detection
Wed.
05/14
Web Security
[Slides]
on Zoom Sanghyun will be at IEEE S&P 2025.
Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites
All Your iFRAMEs Point to Us
Clickjacking: Attacks and Defenses
Mon.
05/19
[No lecture] Checkpoint II Presentation Prep.
Wed.
05/21
Group Project [HW 4 Out] Checkpoint Presentation II
Mon.
05/26
- [No lecture] Memorial Day
Part V: Trustworthy ML
Wed.
05/28
Attacks
[Slides]
SoK: Security and Privacy in Machine Learning
Towards Deep Learning Models Resistant to Adversarial Attacks
Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks
Membership Inference Attacks From First Principles
Mon.
06/02
Defenses
[Slides]
(Certified!!) Adversarial Robustness for Free!
Diffusion Denoising as a Certified Defense against Clean-label Poisoning
Deep Learning with Differential Privacy
Wed.
06/04
Group Project [HW 4 Due] Final Presentations (Showcases)
Finals Week (06/09 - 06/13)
Mon.
06/09
- [No Lecture] Final Exam & Submit your final project report.
Wed.
06/11
- [No Lecture]
[Final Exam]
Late submissions for HW 1-4.