Security for Large-Scale Systems
Course Description
This course provides an in-depth examination of the security issues in large-scale systems, such as cloud, data centers, enterprises, and Internet of Thigns (IoT). This class will discuss the design and implementation of secure design for systems. We will learn both classic and modern approaches to security attacks and defenses. Topics in this course will include access control, information flow control, system auditing, privilege separation, security policies, host-based intrusion detection among many others. We will study the challenges in building these security solutions in large systems. Students will study recent research works on the aforementioned topics, and will work with the instructor to complete a research project in large-scale system security. This course assumes prior knowledge of basic computer security and operating system concepts.
Organization
- Course number: COMPSCI 690G
- Class hours: Tuesday and Thursday 11:30AM - 12:45PM
- Class location: Hasbrouck Laboratory room 137
- Instructor:
Pubali Datta
- Office Hours: By appointment
- E-mail: pdatta@umass.edu
- Office Location: CSL E365
- TA: Jenish Bajracharya
- Office Hours: Thursday 2:15PM - 3:15PM
- E-mail: jbajracharya@umass.edu
- Office Location: CSL E211
- Class communications: Canvas (Note: Please include COMPSCI 690G in your email subject line for class related stuff!)
Prerequisites
None. Note: Undergraduate degree in computer science, or CS377 or equivalent. Programming knowledge & principles of computer systems design knowledge is expected.
Learning Objectives
- Understand the security models and mechanisms of modern computer systems.
- Learn about vulnerabilities, attacks and defenses in host systems.
- Apply security concepts in modern large-scale platforms like cloud, data centers, IoT and enterprises.
- Learn about current research trends in securing large-scale systems.
- Acquire programming skills to solve practical system security problems.
- Able to independently conduct systems security research.
Requirements
Participate
Students will attend every class and actively participate in class discussions.
Read Literature
Students will read all of the assigned papers in advance of each class.
Present and Discuss Paper
Each student will present a research paper in security (assigned by the instructor) in class, and lead the discussion afterwards.
Writing Assignments
Students will prepare summaries for the assigned readings and submit them on
Canvas. Details about paper review expectations will be discussed in the
first class as part of the introductory material.
Complete a Term Project
Students will conduct a major reserch project in system security, with the chief
deliverable being a conference-style paper at the end of the semester. Project
topics will be discussed in introductory class material.
As part of the term project, there will be milestones throughout the semester (e.g., project proposals) that will
be graded as homework assignment. Projects teams may include groups of up to 2 students; however, groups of
greater size will be expected to make greater progress. The instructor will
advise each team/individual independently as needed. The project grade will be a
combination of grades received for a number of milestone artifacts and the final
conference-quality report.
| Grading Item | Weight |
|---|---|
| Paper Presentation | 20% |
| Writing Assignments | 30% |
| Project | 45% |
| Participation | 5% |
| Bonus (Working code and demo during final presentation) | 10% |
Attendance Policy
Students are expected to attend the class in person. If there are certain reasonable circumstances (for example, job interview, attending conference etc.) that require you to miss a few sessions, you should contact the instructors before class. Failure to attending more than three classes can lead to failing the class.
Collaboration Policy
Instructors support discussing the assignments with fellow classmates to learn from each other. However, all of the content students submit need to be produced independently, in their own words and based on their understanding of the solution. Copying of assignment solutions is not permitted.
Additional University Policies
University policies regarding Accommodations, Academic Honesty, and Title IX, apply to all courses. The policies can be found
here.
Note that I am a Non-Responsible Employee under the Title IX definition.