1 / 18

CS 858 – Hot Topics in Computer and Communications Security

CS 858 – Hot Topics in Computer and Communications Security. Fall 2010 Introduction. Overview. Goals Organization Survey of Topics. Goals. Research wise Introduce current research problems in computer and communications security Study proposed solutions

Download Presentation

CS 858 – Hot Topics in Computer and Communications Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CS 858 – Hot Topics in Computer and Communications Security Fall 2010 Introduction

  2. Overview • Goals • Organization • Survey of Topics CS 858 - HoTCCS

  3. Goals • Research wise • Introduce current research problems in computer and communications security • Study proposed solutions • Hopefully come up with new solutions • Research project • Grad-student skills • Reviewing papers • Giving presentations CS 858 - HoTCCS

  4. Overview • Goals • Organization • Survey of Topics CS 858 - HoTCCS

  5. Meetings • Time: TTh 2:30-3:50pm • Location: MC 2036A • Office hour: Wednesdays 3:30-4:30pm (except for 2nd Wednesday each month, which conflicts with School Council meeting) or by appointment CS 858 - HoTCCS

  6. Prerequisites • No formal prerequisites • Basic knowledge of computer systems and networks helpful • Wide range of papers • Systems, databases, probability, hardware, usability, economics,… CS 858 - HoTCCS

  7. Lectures • First five lectures given by former CS 858 students and me • Short introduction to cryptography and security • Advice on giving talks • Sample course projects • Some previous course projects • Following lectures: Two students will each present and lead a discussion on a research paper • See course website for reading list and schedule CS 858 - HoTCCS

  8. Grading • Paper presentations: 25% • Paper reviews: 15% • Class participation: 10% • Includes presentation feedback • Research project : 50% CS 858 - HoTCCS

  9. Paper Review • Goal: learn what makes a good paper • So that you can write your own good papers  • Every student should read one of the two mandatory papers before each lecture • See course website for papers • Every student should submit a review for this paper before class • Using submission system, see later • You will see each others’ (anonymized) reviews CS 858 - HoTCCS

  10. Paper Presentation • Goal: practice your presentation skills • Every student should present two research papers during term • Workshop/conference-style presentation • Present work as it is your own • Carefully prepare your slides • Will give some advice on Thursday • About 25 minutes • Send me your slides before the lecture CS 858 - HoTCCS

  11. Paper Discussion • Discussion follows presentation • Presenter of paper gives his/her opinion about paper • Presenter comes up with interesting questions and leads a discussion • About 15 minutes CS 858 - HoTCCS

  12. Presentation Feedback • Feedback is essential for training speaking skills • Every student should submit a review for each presentation by 5pm the day after a presentation • Using submission system, see later • Look at review form in system before preparing your presentation • Presenter will see (anonymized) feedback CS 858 - HoTCCS

  13. Submission System • We will use a conference review system for gathering and distributing paper and presentation reviews • Accessible from course website • I will create your accounts, using the email address from which you send me your paper preferences (see later) • Once I have assigned papers, go to the submission system, enter your email address, and click on “Mail me my password” CS 858 - HoTCCS

  14. Submission System (cont.) • For papers, you are a PC member, since PC members can see each others’ (anonymized) reviews • Click on “PC Members” and “Review the papers” • When done reviewing, choose “Finalize, I am done editing” • Now you can see other students’ finalized reviews • You need to review only one of the two mandatory papers. For the second one, set the review type to “dummy” and finalize CS 858 - HoTCCS

  15. Submission System (cont.) • For presentations, you are a reviewer. Reviewer cannot see each others’ reviews, only the presenter can • Click on “Reviewer”, instead of “PC Members” • If you are a presenter, click on “Author” to see the (anonymized) finalized reviews for your presentation CS 858 - HoTCCS

  16. Paper Selection Due Sep 19 • Reading list is available on course website • Please look at it and start thinking about your paper choices • Details of assignment process will be announced in class on Thursday • Please (un)register in Quest by Wednesday evening so that I know number of people in class CS 858 - HoTCCS

  17. Project • Goal: novel research in the area of security, cryptography, or privacy • Might lead to workshop/conference submission • Free to choose your topic • Instructor will present sample topics • In groups of two • Proposal: Oct 22 • Presentation: Nov 30 and Dec 2 (tentative) • Write-up: Dec 15 (tentative) CS 858 - HoTCCS

  18. Overview • Goals • Organization • Survey of Topics CS 858 - HoTCCS

More Related