||Welcome to the Computer Security class CS498CAG
|08/31/05||There is a computer security reading group that meets Tuesdays at 3pm. The course number is CS598RHC; see the https://www.crhc.uiuc.edu/~shinrich/cgi-bin/view/Reading/WebHome for more details.|
|09/08/05||Lecture videos will be password protected beginning September 12, 2005. All CS students will have access to the lecture content.|
|09/23/05||TA's office hour is changed from 9:50-10:50am on Mondays to 11am-12pm on Mondays|
|10/05/05||Siebel Center Simulator: http://seclab.cs.uiuc.edu/janus/javadoc/|
|10/31/05||Midterm distribution can be found from here|
|11/15/05||You can download a trial version of HyperCam from http://www.hyperionics.com/, which can help you to creats AVI files.|
|12/8/05||The final exam is posted here. It is due by 4:30pm on Tuesday, December 13th.|
Prerequisites: Basic background in security such as knowledge of public and secret keys.
Venue: 1310 DCL
Time: 11am to 12:15pm on Tuesdays and Thursdays
Description: This is a course on Computer Security aimed at graduate students. It is also appropriate for advanced undergraduates and I2CS students with some background in security. The course is an instance of CS463, which is part of the overall security offerings at UIUC, but this course numbering is awaiting approval; see the Security Roadmap for an overall survey.
Topics in CS498CAG will include: foundations of access control, security policies, non-interference, key management, identities and anonymity, access control mechanisms, information flow, confinement, formal specifications and verification of security policies and protocols, vulnerability analysis, intrusion detection, and program security. Reading related to these topic will be drawn from Computer Security Art and Science by Matt Bishop chapters 3,7,8,10,14,15,16,17,19,20,23,25,29 and supplementary papers. Please follow the link to the errata pages for this book. The course is designed and the lectures taught by Carl A. Gunter and Nikita Borisov. The material will cover both practical and theoretical aspects of computer security. Assessment will consist of two midterms, a final exam, and a project.
Grading Policy (tentatively):