01/21-05/05 Tuesday and Thursday 01:15 PM - 02:40 PM, EB R15
Guanhua Yan
Office: Q11, Engineering Building
Email: ghyan (AT) binghamton.edu
Office hours: Monday & Tuesday 3-4PM
Zhan Shu
Office: N00, Engineering Building
Email: zshu1 (AT) binghamton.edu
Office hours: Wednesday & Thursday 1-2:30PM
This course is aimed at building a scientific foundation for cybersecurity. Topics covered in this course include:
- Introduction: what are the scientific principles of cybersecurity?
- Taxonomy of cybersecurity: basic cybersecurity terminology, classification of cyber attacks and defenses
- Offense-based cybersecurity: exploitation of software, network, system, hardware, and human vulnerabilities
- Detection-based cybersecurity: signature-based detection, anomaly detection, machine learning for cybersecurity, adversarial machine learning
- Prevention-based cybersecurity: verification, information flow, symbolic/concolic execution, software fault isolation, control flow integrity
- Deception-based cybersecurity: art of deception, honey things, software diversity, network agility
- Cybersecurity dynamics: game theory, adversarial reasoning
Matt Bishop, Computer Security: Art and Science, Second edition.
C/C++, Java, Python, etc.
Course slides will be posted in the myCourses system immediately after each lecture.
All assignments, which will be posted on the myCourses system, should be done individually. No assignment will be accepted after 48 hours from the deadline. Late submissions will be penalized 10% per day.
There are four individual projects involved in this course. Each student should work independently on a specific cybersecurity problem, including demonstration of a cyber attack in a controlled environment and development of three different types of defense mechanisms against this cyber attack.
In-class quizzes: 15% Project assignment for offense-based cybersecurity: 15% Project assignment for detection-based cybersecurity: 15% Project assignment for prevention-based cybersecurity: 15% Project assignment for deception-based cybersecurity: 15% Presentation: 10% Final report and demo: 15%
All students should follow Student Academic Honesty Code. (if you have not already read it, please read it carefully). All forms of cheating will be treated with utmost seriousness. You may discuss the problems with other students or use publicly available tools for your projects. However, you must write your OWN report. If you have any questions about whether a specific act may be treated as academic dishonesty, please consult the instructor before you collaborate.
If you have a physical, psychological, or learning disability that may impact on your ability to carry out assigned course work, please contact the staff in the DSS. DSS will review your concerns and determine, with you, what accommodations are necessary and appropriate. All information and documentation of disability is confidential.