Jan. 16 - May 07, Monday and Wednesday 06:15 PM - 07:40 PM, S2-337
Guanhua Yan
Office: Q11, Engineering Building
Email: ghyan (AT) binghamton.edu
Office hours: Monday 3-4PM
No TA is assigned for this course.
This course is aimed at building a scientific foundation for cybersecurity. Topics covered in this course include:
- Introduction: what are the scientific principles of cybersecurity?
- Taxonomy of cybersecurity: classification of cyber attacks and defenses
- Offensive cybersecurity: exploitation of software, network, system, hardware, and human vulnerabilities
- Cybersecurity metrics: quantitative measures relevant to cybersecurity
- Information flow: language-based information flow control and system-based information flow control
- Verification: formal verification of cybersecurity-related properties
- Obfuscation and deception: obfuscation techniques, moving target defenses, and cyber deception
- AI and game theory: applications of AI (Artificial Intelligence) and game theory to cybersecurity, adversarial machine learning
None required. Relevant papers or articles will be listed for students who want to acquire in-depth knowledge beyond course slides.
C/C++, Java, Python, etc.
Course slides will be posted in the myCourses system immediately after each lecture.
All assignments, which will be posted on the myCourses system, should be done individually. No assignment will be accepted after 48 hours from the deadline. Late assignments will be penalized 10% per day.
Final grade will be calculated over the entire class. The TA will grade assignments and the programming projects. If you have questions about the grading of assignments and the programming projects, please first contact the TA. This is used to ensure consistent grading. If the issue has not been resolved by the TA, then talk to the instructor, preferably during office hours. Questions regarding the projects, exams, and final grades should be addressed to the instructor.
All students should follow Student Academic Honesty Code. (if you have not already read it, please read it carefully). All forms of cheating will be treated with utmost seriousness. You may discuss the problems with other students, however, you must write your OWN codes and solutions. Discussing solutions to the problem is NOT acceptable. If you have any questions about whether an act of collaboration may be treated as academic dishonesty, please consult the instructor before you collaborate.
If you have a physical, psychological, or learning disability that may impact on your ability to carry out assigned course work, please contact the staff in the DSS. DSS will review your concerns and determine, with you, what accommodations are necessary and appropriate. All information and documentation of disability is confidential.