Lecture 1 - intro
Lecture 1 - intro
Introduction
Jan 6, 2025
1
Outline
Welcome!
Goals of this course
Exercises
Grading
Self intro
Zhiyun Qian
CSE Prof.
Web: https://www.cs.ucr.edu/~zhiyunq
Course webpage:
https://www.cs.ucr.edu/~zhiyunq/teaching/cs254/
iLearn for announcements and materials
CVE-2016-5969
Server
Client
Attacker
Past research – TCP remote hijack
https://youtu.be/S4Ns5wla9DY
Past research – DNS cache poisoning
www.bank.com?
www.bank.com?
Attacker
5.5.5.5
Hacking competitions
Goals of this course
Broaden your knowledge about cyber
What can possibly go wrong in networked systems?
Gain hands-on experience (not just theory)
Evaluatingsecurity of networked systems
Break and fix things
=
=
Bugs
Vulnerabilities
14
What is security research?
Play Games vs. Research Security
vs.
vs.
• Detection
After – Long history! Misuse vs. Anomaly
attacks – Cat and Mouse
happen • Recovery
– Generic is hard. Domain-specific. Reactive
Grading
Paper response and class participation: 25%
Attack and tool presentation: 25%
Project: 50%
No exams!
Paper response & class participation – 25%
Generalization
Does the solution cover the entire problem space? If not, what can be
done to cover the more general space?
Can the idea/insight be applied to other problems?
Paper response & class participation – 25%
Alternative solutions
Would another solution achieve the same or better results?
What are the tradeoff space and why is the proposed solution in
the “sweet spot” compared to alternatives?
Paper response and discussion
31
Either
Choose one attack/exploit/vulnerability (avoid overlap)
Explain the attack/vulnerability (demo)
or
Pick
a security tool (preferably new and popular)
Demo it and explain how it works roughly
Research project – 50%
A list will be given or you can choose your own
2 students form a group (individual is also fine)
Grading based on contribution percentage
General goals
Analyze a system to identify weaknesses
Propose a new defense / Re-implement or adapt a known work
Aim for a publishable workshop paper (or something you can brag about)
Sample projects
Improve a censorship evasion tool
(re-)Implement a small measurement tool
(re-)Implement an attack against SSL/TLS
design a network CTF question
Research project – 50%
Timeline
Topic discussion during office hours (also in class)
Week 2: Initial idea on project due
Week 4: 8-min pre-proposal presentation due
End of Week 4: 3-page proposal due
Week 10: final presentation, Week 11: 10-page final report due