CS 558 -- Network Security

Summary

This course will cover a wide variety of computer security topics, with a focus on real, deployed protocols. Our first unit will cover vulnerabilities in critical internet protocols that could be exploited by an attacker to redirect or decrypt internet traffic or launch denial of service attacks. Our second unit will focus on privacy on the web, including a deep dive into Tor and secure messaging protocols. Finally, we will finish the course by covering the basics of emerging technologies like trusted execution environments and secure multiparty computation.

Why Take This Course

This class will give you a good look at the state of network security today, covering both the challenges to and techniques for achieving a secure and private internet. Over the course of the class, students will gain a deep understanding of adversarial thinking and gain an intuition for how to both attack and secure protocols. If you like to break things or enjoy seeing what happens when expert protocol designers make mistakes, this course should be a lot of fun. Additionally, we will be spending significant time discussing censorship resistance and secure messaging, which are fundamental tools to protocol freedom of expression and promote human rights. If you are passionate about privacy as it relates to protecting human rights, you will find the techniques covered in this class to be well motivated.

Who Should Take This Course

  • Upper level undergraduate students or graduate students passionate about security and privacy
  • We will assume that students already have a working knowledge of the fundamentals of cryptography. This should include symmetric key cryptography, public key cryptography, digital signatures, pseudorandomness, and hash functions. CS357, CS538, CS548, CS568 or equivalent required.
  • We will also assume that students have been exposed to thinking adversarially, for instance in one of the courses listed above

Syllabus

The syllabus for this class is available here. Syllabus contents may change over the semester as needed.

Resources

We won't be using a textbook this semester. There are lots of great resources that you might want to look at for reference or for deeper learning.

Cryptography

There are lots of great books and sets of lecture notes for cryptography. While we will not be doing anything too complicated, having these resources to refer to can be helpful. Heres a few to kick start your collection

Computer Networks

  • Computer Networking A Top-Down Approach, by Jim Kurose. Lectures for the 8th edition of the book are available on Youtube, and links are available here.