School of Computer Science

Module 06-27822 (2019)

Security Research Seminar

Level 4/M

Tom Chothia Semester 2 10 credits
Co-ordinator: Tom Chothia
Reviewer: Dan Ghica

The Module Description is a strict subset of this Syllabus Page.


The module consists of student-led presentations on current research in the field of computer security.


The aims of this module are to:

  • Provide students with the opportunity to study current research in depth
  • Train students in research skills and presention skills
  • Introduce a variety of topics in computer security, cryptography and related fields

Learning Outcomes

On successful completion of this module, the student should be able to:

  1. give an in-depth explanation of a current research topic in Computer Security.
  2. make effective oral and written presentations to colleagues.
  3. understand and be able to discuss current research in a variety of topics in computer security, cryptography and related fields


  • Note 1 There is a limit on the number of students allowed to take this module.

Teaching methods

Supervision, student presentations 1. A list of papers is specified by the module provider (typically after receiving expressions of interest from the students). The module provider. 2. Each student prepares a (2-page) report and delivers a seminar on one the subject of one of the papers. The scope of the topic for examination purposes is defined by the module provider and the research papers, not by the content of the seminar. 3. The students read each paper in their own time. The presentation should introduce the material to the other students, however their primary understand of of the work should come from reading the papers. 4. Each week the module provider will set some written questions on the papers presented (possibly with input from the student presenting the particular papers). Typical questions might be along the lines of "This paper finds three faults in the VoIP protocol. Which is the most serious fault and why?" or "The checking method discribed in this paper is said to be complete but not sound. Describe a scenario in which the analysis may give the incorrect results. Is the analysis method useful in practice?".

Contact Hours:



Sessional: continuous assessment (presentation) (30%), continuous assessment (report) (30%), continuous assessment (40%)

Supplementary (where allowed): continuous assessment (presentation) (50%), continuous assessment (report) (50%), done over the summer.

Detailed Syllabus

Not applicable

Programmes containing this module