CS 600.443: Security and Privacy in Computing

Required Textbook:

White-Hat Security Arsenal: Tackling the Threats
by Aviel Rubin
Paperback - 384 pages (June, 2001)
Addison-Wesley ISBN: 0-201-71114-1

Grading policy

Grades will be determined as follows: The project description is available here.

Homeworks must be done individually, without any collaboration with others in the class. The project may be done in groups of 2 to 4. Everybody within each group will receive the same grade on the project. In cases where some members of the group feel that a group member did not participate enough, please report this to the professor, who will deal with this on a case by case basis.

Howeworks and projects are due at the beginning of class, 9:00 a.m. on the stated due date. Late homeworks will be penalized 5 points per weekday. Late projects will not be accepted, barring very serious circumstances. Each phase of the project will build on previous phases, and some will depend on work done by other groups, so they must be turned in on time.

There is no collaboration allowed on exams. You must do only your own work. There are no textbooks, notes, or computers allowed during exams. Exams will be based on any material presented in lecture and any material in the assigned readings. Lecture slides and notes will not generally be available, so please come to class and make sure to take notes.

Course Mailing List

All students must sign up for the class mailing list. Send mail to majordomo@cs.jhu.edu with "subscribe cs443" in the message body. Then, to send mail to the class, send it to cs443 at cs.jhu.edu. Important announcements will be maid via the mailing list, and students will be responsible for any information posted to the list.

Office Hours

I will hold my scheduled office hours at 326 NEB after class on Thursdays, 10:15 a.m. to 12:00 p.m. When needed, I will have hours there on Fridays as well. My office is at 416 Wyman Park, and we can meet there by appointment.

TA

The TA for our class is David Friedman, dkf@jhu.edu. You can meet with the TA by appointment.

Group Reports

David Friedman has put together a page containing all of the group reports for the project.

Week 1

Assigned reading:

1/30

Introduction to the course
Lecture topic: Introduction to cryptography

1/31

Discussion of project
Lecture topic: Introduction to Crypto (cont.)

Week 2

Assigned reading: Project:

2/6

Lecture topic: Wireless security

2/7

Lecture topic: Alternative authentication technologies

Week 3

Assigned reading: Project:

2/13

Discussion of project
Lecture topic: Voting systems and requirements

2/14

Lecture topic: Voting systems and requirements (cont.)

Week 4

Assigned reading: Project:

2/20

In class: presentation of part 1 by each group
- Turn in part 1 of project
- Part 2 of project assigned

2/21

- Discussion of part 2 of project
Lecture topic: Guest lecture by Lorrie Cranor
- Homework #1 assigned, due 2/28 9:00 a.m.

Week 5

Assigned reading:

2/27

Lecture topic: Network security

2/28

-Turn in Homework #1
Lecture topic: Web Security

Week 6

Assigned reading: Project:

3/6

In class: Presentation of part 2 by each group
- Turn in part 2 of project
- Discuss part 3 of project

3/7

Lecture topic: viruses & worms
- Homework #2 assigned, due 3/21 9:00 a.m.

Week 7

SPRING BREAK

Week 8

Assigned reading: Project:

3/20

Lecture topic: Crypto (cont.), Viruses & Worms
- Turn in part 3 of project

3/21

Lecture topic: Secure Programming, guest lecturer, Gary McGraw
- Turn in homework #2

Week 9

3/27

Lecture catchup and Midterm review

3/28

Midterm exam

Week 10

4/3

Lecture topic: Intellectual Property protection, guest lecturer Randy Sabbet

4/4

Lecture topic: Privacy

Week 11

Assigned reading: none, work on your projects

Project:

4/10

Guest lecture by Ari Schwartz Associate Director of the Center for Democracy and Technology - Turn in progress report

4/11

Lecture topic: P3P
- Homework #3 assigned, due 4/25 9:00 a.m.

Week 12

4/17

Passover, no lecture

4/18

Passover, no lecture

Week 13

Assigned readings:

4/24

Lecture topic: Anonymity technologies

4/25

- Turn in homework #3 Lecture topic: Anonymity technologies (cont.)

Week 14

5/1

- Turn in final project report
Project presentation & demos

5/2

Project presentation & demos

Final exam: May 15 9:00 a.m.




Computer Science Department Academic Integrity Code

The strength of the university depends on academic and personal integrity. In your studies, you must be honest and truthful. Ethical violations include cheating on exams, plagiarism, reuse of assignments, improper use of the Internet and electronic devices, unauthorized collaboration, alteration of graded assignments, forgery and falsification, lying, facilitating academic dishonesty, and unfair competition.

Academic honesty is required in all work you submit to be graded. Except where the instructor specifies group work, you must solve all homework and programming assignments without the help of others. For example, you must not look at any other solutions (including program code) to your homework problems or similar problems. However, you may discuss assignment specifications with others to be sure you understand what is required by the assignment.

*If* your instructor permits using fragments of source code from outside sources, such as your textbook or on-line resources, you must properly cite the source. Not citing it constitutes plagiarism. Similarly, your group projects must list everyone who participated.

Falsifying program output or results is prohibited.

Your instructor is free to override parts of this policy for particular assignments. To protect yourself: (1) Ask the instructor if you are not sure what is permissible. (2) Seek help from the instructor or TA, as you are always encouraged to do, rather than from other students. (3) Cite any questionable sources of help you may have received.

Students who cheat will suffer a serious course grade penalty in addition to being reported to university officials. You must abide by JHU's Ethics Code: Report any violations you witness to the instructor. You may consult the associate dean of students and/or the chairman of the Ethics Board beforehand. For more information, see the guide on Academic Ethics for Undergraduates (http://www.advising.jhu.edu/ethics.html) and the Ethics Board web site (http://ethics.jhu.edu).