Security for Large-Scale Systems
Course Description
This course provides an in-depth examination of the issues in system security. This class will discuss the design and implementation of secure computer systems. We will learn the classic approaches to security attacks and defenses from the perspective of a single host system. Topics in this course will include access control, information flow control, system auditing, privilege separation, security policies, host-based intrusion detection etc. Then we will study how these classic mechanisms are expanded and adapted to modern distributed system platforms such as cloud platforms, Internet of Things platforms, and large enterprises. Student will study recent research works on the aforementioned topics, and will work with the instructor to complete a research project in system security. This course assumes prior knowledge of operating system concepts.
Organization
- Course number: COMPSCI 690G
- Class hours: Tuesday and Thursday 11:30AM - 12:45PM
- Class location: Computer Science Building Room 142
- Instructor:
Pubali Datta
- Office Hours: Tuesday 9AM - 10AM and by appointment
- E-mail: pdatta@umass.edu
- Office Location: CS 344
- TA: Weiqi Feng
- Office Hours: Thursday 2PM - 3PM
- E-mail: weiqifeng@cs.umass.edu
- Office Location: TBD
- Class communications: Canvas (Note: Please include COMPSCI 690G in your email subject line for class related stuff!)
Prerequisites
None. Note: Undergraduate degree in computer science, or CS377 or equivalent. Programming knowledge & principles of computer systems design knowledge is expected.
Learning Objectives
- Understand the security models and mechanisms of modern computer systems.
- Learn about vulnerabilities, attacks and defenses in a host system.
- Apply security concepts in modern real-world platforms like cloud, IoT and enterprises.
- Learn about current research trends in system security.
- Acquire programming skills to solve practical system security problems.
- Able to independently conduct systems security research.
Requirements
Participate
Students will attend every class and actively participate in class discussions.
Read Literature
Students will read all of the assigned papers in advance of each class.
Present and Discuss Paper
Each student will present a research paper in security (assigned by the instructor) in class, and lead the discussion afterwards.
Paper Review Assignments
Students will prepare summaries for the assigned readings and submit them on
Canvas. These summaries will be submitted prior to the start of the class and
graded by the
instructional team. Details about paper review expectations will be discussed in the
first class as part of the introductory material.
Complete a Term Project
Students will conduct a major reserch project in system security, with the chief
deliverable being a conference-style paper at the end of the semester. Project
topics will be discussed in introductory class material.
As part of the term project, there will be milestones throughout the semester (e.g., project proposals) that will
be graded as homework assignment. Projects teams may include groups of up to 2 students; however, groups of
greater size will be expected to make greater progress. The instructor will
advise each team/individual independently as needed. The project grade will be a
combination of grades received for a number of milestone artifacts and the final
conference-quality report.
Grading Item | Weight |
---|---|
Paper Presentation | 20% |
Paper Reviews | 30% |
Project | 45% |
Participation | 5% |
Attendance Policy
Students are expected to attend the class in person. If there are certain reasonable circumstances (for example, job interview, attending conference etc.) that require you to miss a few sessions, you should contact the instructors before class. Failure to attending more than three classes can lead to failing the class.
Collaboration Policy
Instructors support discussing the assignments with fellow classmates to learn from each other. However, all of the content students submit need to be produced independently, in their own words and based on their understanding of the solution. Copying of assignment solutions is not permitted.
Additional University Policies
University policies regarding Accommodations, Academic Honesty, and Title IX, apply to all courses. The policies can be found
here.
Note that I am a Non-Responsible Employee
under the Title IX definition.