CS 463 - Computer Security II

Fall 2022

TitleRubricSectionCRNTypeHoursTimesDaysLocationInstructor
Computer Security IICS463BG49551OLC3 -    Gang Wang
Computer Security IICS463BU49550OLC3 -    Gang Wang
Computer Security IICS463DSO77849ONL4 -    Gang Wang
Computer Security IIECE424BG49553OLC3 -    Gang Wang
Computer Security IIECE424BU49552OLC3 -    Gang Wang

Official Description

Program security, trusted base, privacy, anonymity, non-interference, information flow, confinement, advanced auditing, forensics, intrusion detection, key management and distribution, policy composition and analysis, formal approaches to specification and verification of secure systems and protocols, and topics in applied cryptography. Course Information: Same as ECE 424. 3 undergraduate hours. 3 or 4 graduate hours. Prerequisite: CS 461. Recommended: CS 475.

Course Director

Text(s)

Varies by semester.

Learning Goals

  • Identify and address privacy issues in social networks (1)(2)(6)
  • Apply machine learning to security and address adversarial machine learning (1)(2)(6)
  • Use crypto constructs (homomorphic encryption, multi-party computation, etc.) (1)(2)(6)
  • Identify and address issues with de-identification (1)(2)(6)
  • Use hardware designed to support trusted computing (1)(2)(6)
  • Reason about information flow, computational security for encryption (1)(2)(6)
  • Recognize threats and design mitigations for security in key sectors (healthcare, power grid, transportation, etc.) (1)(2)(6)
  • Understand architecture and recognize threats for smartphone security
  • Recognize issues with web privacy (especially cookies and advertising) (1)(2)(6)
  • Analyze human factors (1)(2)(6)
  • Recognize and mitigate insider threats (1)(2)(6)
  • Understand architecture and recognize threats for security in the Internet of Things (IoT) (1)(2)(6)
  • Recognize drivers and tactics in cyber warfare, and other topics of emerging interest in security and privacy (1)(2)(6)

Topic List

  • Privacy issues in social networks
  • Machine learning applications in security and adversarial machine learning
  • Crypto constructs (homomorphic encryption, multi-party computation, etc.)
  • De-identification
  • Hardware for trusted computing
  • Information flow, computational security for encryption
  • Security in key sectors (healthcare, power grid, transportation, etc.)
  • Smartphone security, web privacy
  • Human factors
  • Insider threats
  • Internet of Things (IoT) security
  • Cyber warfare, and other topics of emerging interest in security and privacy

Required, Elective, or Selected Elective

Selected Elective.

Last updated

2/17/2019by Carl Gunter