Schedule

The schedule will change as the course progresses, in part based on student interests. If you are particularly interested in some topic not covered here, send mail to the course staff.

Submit your answers (and questions) for each lecture via email to the course staff, with the email subject format: [CS8803-EMS MM-DD] YOUR_NAME Assignment where MM is the two digit month, and DD is the two digit day. For example, the instructors first homework subject would be: [CS8803-EMS 08-22] Paul Pearce Assignment for the first lecture.

Monday Tuesday Wednesday Thursday Friday
Aug 18
Discussion 1: Course logistics, Topic Introduction
Preparation: Enroll.
Aug 19
Aug 20
Discussion 2: Classics: Denial of Service
Preparation: Inferring Internet Denial of Service Activity

Writeups begin next week

Aug 21
Aug 22
Aug 25
Discussion 3: Modern: Denial of Service
Preparation: Understanding the Mirai Botnet

Questions TBA.
Aug 26
Aug 27
Discussion 4: Classics: Traceback
Preparation: Practical Network Support for IP Traceback

Questions TBA.
Aug 28
Aug 29

Last day to add
Sep 01

Labor Day
Sep 02
Sep 03
Discussion 5: Classics: Inferring Activity
Preparation: Timing Analysis of Keystrokes and Timing Attacks on SSH

Questions TBA.
Sep 04
Sep 05
Sep 08
Discussion 6: Classics: Intrusion Detection
Preparation: Bro: A System for Detecting Network Intruders in Real-Time

Questions TBA.
Sep 09
Sep 10
Discussion 7: Classics: Baserate
Preparation: The Base-Rate Fallacy and the Difficulty of Intrusion Detection

Questions TBA.
Sep 11
Sep 12
Sep 15
Discussion 8: Spam
Preparation: Spamalytics: An Empirical Analysis of Spam Marketing Conversion

Understanding the Network-Level Behavior of Spammers

Questions TBA.
Sep 16
Sep 17
Discussion 9: Botnets
Preparation: Your Botnet is My Botnet: Analysis of a Botnet Takeover

Questions TBA.
Sep 18
Sep 19
Sep 22
Discussion 10: Internet Scanning
Preparation: ZMap: Fast Internet-Wide Scanning and its Security Applications

A Search Engine Backed by Internet-Wide Scanning

Questions TBA.
Sep 23
Sep 24
Project Pre Proposal Presentations 1
Sep 25
Sep 26
Sep 29

No Class
Sep 30
Oct 01
Discussion 11: The Underground Economy
Preparation: Click Trajectories: End-to-End Analysis of the Spam Value Chain

Questions TBA.
Oct 02
Oct 03
Oct 06

Fall Recess
Oct 07

Fall Recess
Oct 08
Discussion 12: Unwanted Software
Preparation: Framing Dependencies Introduced by Underground Commoditization

Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software

Questions TBA.
Oct 09
Oct 10
Oct 13
Discussion 13: Ethics and Legality
Preparation: Conducting Cybersecurity Research Legally and Ethically

Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests

Questions TBA.
Oct 14
Oct 15
Project Proposals Day 1
Oct 16
Oct 17
Oct 20
Project Proposals Day 2
Oct 21
Oct 22
Discussion 14: Real World Attacks
Preparation: The Spyware Used in Intimate Partner Violence

Questions TBA.
Oct 23
Oct 24

Last day to withdraw
Oct 27
Discussion 15: Censorship
Preparation: SoK: Towards Grounding Censorship Circumvention in Empiricism

Optional: Augur: Internet-Wide Detection of Connectivity Disruptions

Questions TBA.
Oct 28
Oct 29

No Class (IMC 2025)
Oct 30
Oct 31
Nov 03
Discussion 16: Nation-States
Preparation: The Million Dollar Dissident.
Questions TBA.
Nov 04
Nov 05
Discussion 17: TLS/HTTPS
Preparation: Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice.
Questions TBA.
Nov 06
Nov 07
Nov 10
Discussion 18: Cyber-Physical / Internet of Things
Preparation: Comprehensive Experimental Analyses of Automotive Attack Surfaces.
Questions TBA.
Nov 11
Nov 12
Discussion 19: Usability
Preparation: Alice in Warningland: A Large-Scale Field Study of Browser Security.
Questions TBA.
Nov 13
Nov 14
Nov 17
Final Presentations Day 1
Nov 18
Nov 19
Final Presentations Day 2
Nov 20
Nov 21
Nov 24
Project Office Hours
Nov 25
Nov 26

Thanksgiving
Nov 27

Thanksgiving
Nov 28

Thanksgiving
Dec 01

Last day of class, Project Office Hours
Dec 02
Dec 03
Dec 04
Dec 05
Dec 08
Dec 09
Dec 10
Dec 11

Projects due
Dec 12