The schedule will change as the course progresses, in part based on student interests. If you are particularly interested in some topic not covered here, send mail to the course staff.

Submit your answers (and questions) for each lecture via email to the course staff, with the email subject format: [CS8803-EMS MM-DD] YOUR_NAME Assignment where MM is the two digit month, and DD is the two digit day. For example, the instructors first homework subject would be: [CS8803-EMS 08-20] Paul Pearce Assignment for the first lecture.

Monday Tuesday Wednesday Thursday Friday
Aug 22
Semester Begins
Aug 23
Discussion 1: Course logistics, Topic Introduction
Preparation: Enroll.
Aug 24 Aug 25
Discussion 2: Classics: Denial of Service
Preparation: Inferring Internet Denial of Service Activity

Writeups begin next week

Aug 26
Last day to add
Aug 29 Aug 30
Discussion 3: Modern: Denial of Sevice
Preparation: Understanding the Mirai Botnet

Questions TBA.
Aug 31 Sep 1
Discussion 4: Classics: Traceback
Preparation: Practical Network Support for IP Traceback

Questions TBA.
Sep 2
Sep 5
Labor Day
Sep 6
No Class, Travel
Sep 7 Sep 8
Discussion 5: Classics: Intrusion Detection
Preparation: Bro: A System for Detecting Network Intruders in Real-Time

Questions TBA.
Sep 9
Sep 12 Sep 13
Discussion 6: Classics: Baserate
Preparation: The Base-Rate Fallacy and the Difficulty of Intrusion Detection

Questions TBA.
Sep 14 Sep 15
Discussion 7: Classics: Inferring Activity
Preparation: Timing Analysis of Keystrokes and Timing Attacks on SSH

Questions TBA.
Sep 16
Sep 19 Sep 20
Discussion 8: Internet Scanning
Preparation: ZMap: Fast Internet-Wide Scanning and its Security Applications

A Search Engine Backed by Internet-Wide Scanning

Questions TBA.
Sep 21 Sep 22
Discussion 9: Spam
Preparation: Spamalytics: An Empirical Analysis of Spam Marketing Conversion

Understanding the Network-Level Behavior of Spammers

Questions TBA.
Sep 23
Sep 26 Sep 27
Project Pre Proposal Presentations
Sep 28 Sep 29
Discussion 10: Botnets
Preparation: Your Botnet is My Botnet: Analysis of a Botnet Takeover

Questions TBA.
Sep 30
Oct 3 Oct 4
Discussion 11: The Underground Economy
Preparation: Click Trajectories: End-to-End Analysis of the Spam Value Chain

Questions TBA.
Oct 5 Oct 6
Discussion 12: Unwanted Software
Preparation: Framing Dependencies Introduced by Underground Commoditization

Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software

Questions TBA.
Oct 7
Oct 10 Oct 11
Project Proposals Day 1
Oct 12 Oct 13
Project Proposals Day 2
Oct 14
Oct 17
Fall Recess
Oct 18
Fall Recess
Oct 19 Oct 20
Discussion 13: Ethics and Legality
Preparation: Conducting Cybersecurity Research Legally and Ethically

Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests

Questions TBA.
Oct 21
Oct 24 Oct 25
No class, IMC 2022
Oct 26 Oct 27
No class, IMC 2022
Oct 28 Withdrawl deadline
Oct 31 Nov 1
Discussion 14: Real World Attacks
Preparation: The Spyware Used in Intimate Partner Violence

Questions TBA.
Nov 2 Nov 3
Discussion 15: Censorship
Preparation: SoK: Towards Grounding Censorship Circumvention in Empiricism

Optional: Augur: Internet-Wide Detection of Connectivity Disruptions

Questions TBA.
Nov 4
Nov 7 Nov 8
No class, CCS 2022
Nov 9 Nov 10
No class, CCS 2022
Nov 10
Nov 14 Nov 15
Discussion 16: Nation-States
Preparation: The Million Dollar Dissident.
Questions TBA.
Nov 16 Nov 17
Discussion 17: TLS/HTTPS
Preparation: Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice.
Questions TBA.
Nov 18
Nov 21 Nov 22
Discussion 18: Cyber-Physical / Internet of Things
Preparation: Comprehensive Experimental Analyses of Automotive Attack Surfaces.
Questions TBA.
Nov 23
Nov 24
Nov 25
Nov 28 Nov 28
Discussion 19: Usability
Preparation: Alice in Warningland: A Large-Scale Field Study of Browser Security.
Questions TBA.
Nov 30 Dec 1
Final Presentations, Day 1
Dec 2
Dec 5 Dec 6
Final Presentations, Day 2
Dec 7 Dec 8
Dec 9
Dec 12
Dec 13
Dec 14 Dec 15
Projects Due. End of course. Have a good break!
Dec 16