General Information
Instructor
Overview
A computing and networking system is considered emerging if it recently started getting deployed in the real-world or is deemed promising for wide-scale deployment in the near future. The security issues surrounding such emerging systems, however, may prevent end-users from utilizing their full potential, or, even worse, may rule out the chances of their deployment in the future. Currently, these emerging systems range from Internet of Things (IoT) and deep-learning systems to edge and 5G/Next-G systems. In this seminar course, we will discuss some of the latest work in the area of securing emerging computing and networking systems, including emerging network technologies and security (NFV, SDN, Edge, 5G/Next-G, etc.), IoT security and privacy (smart home, voice assistant platforms - Amazon Alexa and Google Assistant, etc.), and machine learning for security and privacy (adversarial attacks and defenses on deep learning, backdoor attacks and defenses on deep learning, etc.).
The main goal of the seminar is to help students understand the state of the art in a variety of security topics in emerging computing and networking systems. As a secondary goal, students will learn how to read research papers and how to communicate technical material effectively.
The seminar is suitable for students who have strong interest in network and system security and intent to pursue a career in the area, e.g., PhD students already working in cybersecurity or MS students interested in pursuing a PhD or doing research in the field (in the form of independent studies and/or MS Thesis). One of the goals of this seminar is to identify, by the end of the semester, a set of open research problems on which students can work during the next semester, e.g., in the form of independent studies.
Tentative Schedule
Week | Date | Topic | Papers | Notes |
---|---|---|---|---|
1 | Feb 3 | Class Overview | N/A | |
2 | Feb 10 | SDN/NFV Secuirty Overview | N/A | |
3 | Feb 17 | IoT Security Overview | N/A | |
4 | Feb 24 | Mobile Platform Secuirty Overview | N/A | |
5 | March 3 | IoT System Security |
|
Invited Talk from Zhengxiong Li |
6 | March 10 | Network Security Function Virtualization |
|
Invited Talk from Hongda Li |
7 | March 17 | Smart Home Physical Interaction Control |
|
Invited Talk from Wenbo Ding |
8 | March 24 | Image Privacy Control |
|
Invited Talk from Nishant Vishwamitra |
9 | March 31 | Smart Home Security | Md Armanuzzaman | |
10 | April 7 | Security in Voice Assistant Platforms | Yunnan Yu Reviews #1 and #2 Due |
|
11 | April 14 | Adversarial Attacks and Defenses in Deep Neural Networks |
|
Nishant Vishwamitra |
12 | April 21 | Backdoor Attacks and Defenses in Deep Neural Networks | Shashank Priya |
|
13 | April 28 | Deep Learning-based Network Intrusion Detection | Xi Tan Review #3 Due |
|
14 | May 5 | Web Security | Shiyu Lu | |
15 | May 12 | Project Demo | N/A |
Seminar Structure and Assignments
I will present material during the first 4 classes, followed by 4 invited talks. Students then present selected papers during the remaining classes. A list of papers from top security and networking conferences (IEEE S&P - Oakland, USENIX Security, ACM CCS, NDSS, SIGCOMM, NSDI, etc.) will be provided for each topic. One of the papers for each topic will be listed as mandatory paper and the remaining ones as related papers. All students are encouraged to read the mandatory papers, submit reviews for a subset of them, and participate in discussions in class.
The course includes the following assignments:
- Paper reading: if you are not familar with reading research papers, I recommend reading "How to Read a Paper" by S. Keshav.
- Paper presentation: each student will present around 2 research papers for one class. You can find a set of recommendations on how to give a good presentation here.
- Paper reviews: you will write reviews for 3 papers (you will choose which ones). The template of a review can be download here. You can find a set of recommendations on how to write a good reviews here.
- Class project: 3-credit student will finish a class project where you will reproduce the ideas of a discussed paper into practice and show your project demo at the end of the semester.
All dicussions through Piazza: http://piazza.com/buffalo/spring2021/cse707
Course Cridits
- You can take this seminar for either 1 credit or 3 credits. With 1 credit, your responsibility is to read papers, write reviews, and present papers to the class. With 3 credits, you will also finish a class project.
Tentative Grading
1 Credit- Paper presentation: 40%
- Paper reviews (3): 30%
- Class participation: 30%
- Paper presentation: 30%
- Paper reviews (3): 20%
- Class Project: 30%
- Class participation: 20%
Resources
ACM's Computing Research Repository
IEEE Symposium on Security and Privacy