CS 463 - Computer Security II

Spring 2024

TitleRubricSectionCRNTypeHoursTimesDaysLocationInstructor
Computer Security IICS463DSO49056ONL4 -    Gang Wang
Carl Gunter
Computer Security IICS463P348205ONL3 -    Gang Wang
Carl Gunter
Computer Security IICS463P448206ONL4 -    Gang Wang
Carl Gunter
Computer Security IICS463PG49413ONL3 -    Carl Gunter
Gang Wang
Computer Security IIECE424DSO49719ONL4 -    Gang Wang
Carl Gunter
Computer Security IIECE424ON249718ONL3 -    
Computer Security IIECE424P348207ONL3 -    Gang Wang
Carl Gunter
Computer Security IIECE424P448208ONL4 -    Gang Wang
Carl Gunter

Official Description

Program security, trusted base, privacy, anonymity, non-interference, information flow, confinement, advanced auditing, forensics, intrusion detection, key management and distribution, policy composition and analysis, formal approaches to specification and verification of secure systems and protocols, and topics in applied cryptography. Course Information: Same as ECE 424. 3 undergraduate hours. 3 or 4 graduate hours. Prerequisite: CS 461. Recommended: CS 475.

Course Director

Text(s)

Varies by semester.

Learning Goals

  • Identify and address privacy issues in social networks (1)(2)(6)
  • Apply machine learning to security and address adversarial machine learning (1)(2)(6)
  • Use crypto constructs (homomorphic encryption, multi-party computation, etc.) (1)(2)(6)
  • Identify and address issues with de-identification (1)(2)(6)
  • Use hardware designed to support trusted computing (1)(2)(6)
  • Reason about information flow, computational security for encryption (1)(2)(6)
  • Recognize threats and design mitigations for security in key sectors (healthcare, power grid, transportation, etc.) (1)(2)(6)
  • Understand architecture and recognize threats for smartphone security
  • Recognize issues with web privacy (especially cookies and advertising) (1)(2)(6)
  • Analyze human factors (1)(2)(6)
  • Recognize and mitigate insider threats (1)(2)(6)
  • Understand architecture and recognize threats for security in the Internet of Things (IoT) (1)(2)(6)
  • Recognize drivers and tactics in cyber warfare, and other topics of emerging interest in security and privacy (1)(2)(6)

Topic List

  • Privacy issues in social networks
  • Machine learning applications in security and adversarial machine learning
  • Crypto constructs (homomorphic encryption, multi-party computation, etc.)
  • De-identification
  • Hardware for trusted computing
  • Information flow, computational security for encryption
  • Security in key sectors (healthcare, power grid, transportation, etc.)
  • Smartphone security, web privacy
  • Human factors
  • Insider threats
  • Internet of Things (IoT) security
  • Cyber warfare, and other topics of emerging interest in security and privacy

Required, Elective, or Selected Elective

Selected Elective.

Last updated

2/17/2019by Carl Gunter