Prerequisites of 600.424 and 600.449 (or equivalent) are strongly advised. In addition, familiarity with basic cryptographic primitives will be necessary to understand the details of some of the assigned papers.
Assignment: There will be one team assignment. Students will be tasked with inferring the network topology of a closed network, as well as discovering all hosts on the network. The network will be reconfigured during the discovery phase of the assignment, and the goal is to perform network tomography with as minimal traffic as possible. Experiments will take place in a isolated lab comprising of a series of switches and routers donated by Cisco. This assignment will be worth 25% of your final grade.
Course project:Your course project will entail submitting (to me) a workshop quality research paper outlining novel ideas. This project can involve application of concepts learned from other research papers, but MUST depict original ideas. The course project constitutes 50% of your final grade. Students are encouraged to work in groups. You are required to use LaTeX when preparing your final report.
Readings and Presentations:Students are required to read all papers assigned during the semester and be able to competently discuss the material in class. Each student will be responsible for presenting one lecture (depending on the class size) -- that lecture will be based on the assigned paper for the week including as much relevant related work as necessary to distill the work presented in the paper. The speaker should try to present a comprehensive view of the topic suitable for a 1 hour talk. Additionally, each student is responsible for submitting a summary of the paper, which includes (1) at least two thought-provoking questions on the assigned paper (2) a discussion of any strengths and weaknesses (3) one direction for an extension on the ideas / topic presented in the paper. Your questions should critically evaluate the paper (eg, questioning the assumptions, questioning whether the experiments are lacking (and why), flaws in the analysis, etc). This summary will be turned in to the moderator (and me) on the Thursday session.
The moderator is responsible for recapping the ideas for the previous day (10 mins max) and presenting any supplimentary material not covered by the presenter. The moderator will lead the general discussions on Friday. Notes on the week's discussion must also be compiled by the moderator, and submitted to me no later than 1 week after the lecture. These notes will be made publicly available (via the website) to rest of the class.
Office Hours
Tuesday 1 - 3 pm or by appointment.
Mailing list
send email to majordomo (at) cs.jhu.edu with subscribe cs624 in the message body
Grading
This is intended to be an interactive class, and as such, class participation will play a significant role in my grading criteria. Students will be graded on the presentation of their assigned paper, their participation in discussions and questions, the assignment and course project. Weights are as follows:
Deliverable | Grade | Assignment | 25% | Presentations | 25% | Project | 50% |
Reading List
Date |
Topic | Presenter (Thursday) |
Moderator  (Friday) |
Feb. 3/4 |
Course Introduction, selection of presenters, project discussion.
|
||
Feb. 10/11 |
Seny |
Lucas |
|
Feb. 17/18 |
IP Covert Timing Channels: An Initial Exploration
S. Cabuk, C. Brodley, R. Forte, C. Shields related readings:
|
Sam |
Josh |
Feb. 24/25 |
Building an Encrypted and Searchable Audit Log
B.Waters, D. Balfanz, G. Durfee, and D.K. Smetters related readings:
|
Matt |
Steve |
March 3/4 |
Reza |
||
Mar 10/11 |
Lucas (+ Josh)
|
Sam |
|
March 14-20 Spring Break | |||
Mar 24/25 |
Michael Peck |
Joann |
|
March 31/April 1st |
Lab Exercise --- Network Tomography
|
Team 1 |
Team 2 |
Apr 7th/8th |
Towards Distributed Blackhole Placement
E. Cooke, M. Bailey, Z Mao and D. McPerson Roaming Honeypots for Mitigating Server-level Denial of Service Attacks S. Khattab et al. In Proceedings of ICDCS, 2004
|
Chris
|
Moheeb |
Apr 14/15 |
Secret Sharing and Visual Cryptography Schemes. Stinson Visual Cryptography.Moni Naor and Adi Shamir.
|
Sujata |
Michael |
Apr 21/22 |
Privacy-Preserving Data Mining
R. Agrawal and R. Srikant related readings:
|
Moheeb |
No class |
Apr 28/29 |
Secure and efficient Metering
M. Noar and B. Pinkas, related readings:
|
Joann |
Sujata |
May 5/6 |
Akpose + Steve |
In-class project presentations. |
|
Reading Week | |||
Friday May 20th | Final Projects due by 10pm. NO EXCEPTIONS |