Security for Large-Scale Systems

Course Description

This course provides an in-depth examination of the issues in system security. This class will discuss the design and implementation of secure computer systems. We will learn the classic approaches to security attacks and defenses from the perspective of a single host system. Topics in this course will include access control, information flow control, system auditing, privilege separation, security policies, host-based intrusion detection etc. Then we will study how these classic mechanisms are expanded and adapted to modern distributed system platforms such as cloud platforms, Internet of Things platforms, and large enterprises. Student will study recent research works on the aforementioned topics, and will work with the instructor to complete a research project in system security. This course assumes prior knowledge of operating system concepts.

Organization

  • Course number: COMPSCI 690G
  • Class hours: Tuesday and Thursday 11:30AM - 12:45PM
  • Class location: Computer Science Building Room 142
  • Instructor: Pubali Datta
    • Office Hours: Tuesday 9AM - 10AM and by appointment
    • E-mail: pdatta@umass.edu
    • Office Location: CS 344
  • TA: Weiqi Feng
  • Class communications: Canvas (Note: Please include COMPSCI 690G in your email subject line for class related stuff!)

Prerequisites

None. Note: Undergraduate degree in computer science, or CS377 or equivalent. Programming knowledge & principles of computer systems design knowledge is expected.

Learning Objectives

  • Understand the security models and mechanisms of modern computer systems.
  • Learn about vulnerabilities, attacks and defenses in a host system.
  • Apply security concepts in modern real-world platforms like cloud, IoT and enterprises.
  • Learn about current research trends in system security.
  • Acquire programming skills to solve practical system security problems.
  • Able to independently conduct systems security research.

Requirements

Participate
Students will attend every class and actively participate in class discussions.

Read Literature
Students will read all of the assigned papers in advance of each class.

Present and Discuss Paper
Each student will present a research paper in security (assigned by the instructor) in class, and lead the discussion afterwards.

Paper Review Assignments
Students will prepare summaries for the assigned readings and submit them on Canvas. These summaries will be submitted prior to the start of the class and graded by the instructional team. Details about paper review expectations will be discussed in the first class as part of the introductory material.

Complete a Term Project
Students will conduct a major reserch project in system security, with the chief deliverable being a conference-style paper at the end of the semester. Project topics will be discussed in introductory class material. As part of the term project, there will be milestones throughout the semester (e.g., project proposals) that will be graded as homework assignment. Projects teams may include groups of up to 2 students; however, groups of greater size will be expected to make greater progress. The instructor will advise each team/individual independently as needed. The project grade will be a combination of grades received for a number of milestone artifacts and the final conference-quality report.

Grading Item Weight
Paper Presentation 20%
Paper Reviews 30%
Project 45%
Participation 5%

Attendance Policy

Students are expected to attend the class in person. If there are certain reasonable circumstances (for example, job interview, attending conference etc.) that require you to miss a few sessions, you should contact the instructors before class. Failure to attending more than three classes can lead to failing the class.

Collaboration Policy

Instructors support discussing the assignments with fellow classmates to learn from each other. However, all of the content students submit need to be produced independently, in their own words and based on their understanding of the solution. Copying of assignment solutions is not permitted.

Additional University Policies

University policies regarding Accommodations, Academic Honesty, and Title IX, apply to all courses. The policies can be found here. Note that I am a Non-Responsible Employee under the Title IX definition.