The newsgroup is for questions/discussion on homeworks and programming assignments. But do not post solutions (code or write-up) to the newsgroup! Use email only when you cannot use the newsgroup, e.g., for urgent/personal questions.
Chris Novakovic
Teaching Assistant
Email:cxn626
Office: see notice on 117
Hours: Mon, Tue: 4pm-6pm
Joe Gardiner
Teaching Assistant
Email:j.gardiner
Office: see notice on UG41
Hours: Wed: 10am-12pm, Thu: 4pm-6pm
This is a module for graduate and advanced undergraduate students interested in network security and privacy. A student completing this course with top marks will be able to reason and engineer practical secure networked systems, critically review existing designs, read and understand technical papers in the area of anonymous communications, privacy preserving technologies, private social networks and learn to apply the privacy-by-design methodology. The course outline containing all necessary information is available here.
A basic network programming course is a prerequisite. An equivalent
course in Operating Systems or Networking is also acceptable with the
approval of the instructor. Knowledge of prior security courses is
desirable but not essential.
Final exam 50%
Project 50% (20% design and coding, 25% analysis, and 5% presentation)
| Topic | Lecture material | Reading | |
|---|---|---|---|
| L0 | Course outline | Slides | |
| L1 | Introduction | Slides, Extra slides: Introduction to Cryptography | See slides |
| L2 | Class activity: The problem of routing | ||
| L3 | Class activity: Routing challenges | ||
| L4 | Internet Protocol vulnerabilities: BGP and OSPF | Slides | See slides |
| L5 | Internet Protocol vulnerabilities: DNS | Slides | See slides |
| L6 | Decentralised networks -- unstructured topologies | Slides | Gnutella, see slides |
| L7 | Decentralised networks -- structured topologies | Slides | Chord , see slides |
| L8 | Routing attacks and defenses: active and passive topology attacks | Slides | Topology attacks |
| L9 | Routing attacks and defenses: Misbehaviour defenses | Slides | Suicide |
| L10 | Sybil attacks | ||
| L11 | Sybil defenses | ||
| L12 13/02/2013 | Cloud Security by Prof. Mark Ryan | ||
| L13 13/02/2013 | Email Security by Prof. Mark Ryan | ||
| L14 | Malware 1 | ||
| L15 | Malware 2 | Slides | See slides |
| L16 26/02/2013 | Project demonstrations (Mandatory attendance) | ||
| L17 26/02/2013 | Project demonstrations (Mandatory attendance) | ||
| L18 | Security protocol design failures I | ScatterChat | ScatterChat design |
| L19 | Security protocol design failures II | WEP | The insecurity of 802.11 |
| L20 | |||
| L21 | |||
| L22 |