CS 2530: Computer and Network Security
[ Home ]
[ Policies ]
[ Lectures ]
[ Homework ]
[ Project ]
Prof. Adam J. Lee
Office: 6111 Sennott Square
Email: adamlee -at- cs.pitt.edu
Office hours: T 1-2:30, Th 11-12:30
Office: 6505 SENSQ
Email: duncanyung -at- cs.pitt.edu
Office hours: Th 3-4, 5-6; F 3-7
- TH 9:30 - 10:45 AM, 6516 SENSQ
Computer Security: Art and Science (eBook)
- [8/12] Welcome to CS 2530! Please check this web page at least 2-3 times per week for important announcements.
- [9/6] Homework #1 is posted, it will be due on Tuesday 9/13.
- [9/8] Dr. Lee's office hours for today will be held from 1:30-2:30 instead of the usual 11-12:30.
- [9/13] Homework #2 is posted, it will be due on Tuesday 9/20.
- [9/27] Homework #3 is posted, it will be due on Tuesday 10/11.
- [10/4] The class schedule has been updated to reflect our current pace. The midterm was also moved to 10/27 instead of 10/25 to give you more prep time.
- [10/11] Prof. Lee's office hours for Thursday 10/13 are canceled. Make-up office hours will be held on Wednesday 10/12 from 11:30 AM - 1 PM.
- [11/15] Homework #4 is posted, it will be due on Tuesday 11/28.
- [12/6] Dr. Lee's office hours on Thursday 12/8 will be held from 1-2:30 PM.
The goal of the proposed course is to provide our graduate students
the necessary background and hands on experience to do well in systems
research or advanced development with an emphasis on security.
Prerequisites: CS 1550 or consent of instructor
- 25% Midterm
- 15% Final exam
- 25% Homework
- 25% Project
- 10% Participation, etc.
- Introduction: CIA properties; vulnerabilities, threats, and attacks; design principles
- Policy Models: MAC/DAC; Bell-LaPadula, Biba, Clark/Wilson, Chinese Wall, etc.
- Cryptography: Symmetric key algorithms, public key cryptography, secret sharing and threshold cryptography
- Authentication: Protocols and mechanisms
- Authorization: Identity based, attribute based, etc.
- OS and Application Security: Integrity of mechanism, malicious logic
- Network Security: Attacking protocols, denial of service, intrusion detection
- Advanced Topics: Decided based upon student interest