Difference between revisions of "Adaptive Security (Fall 2020)"

From Soma-notes
Jump to navigation Jump to search
Line 87: Line 87:
* [https://homeostasis.scs.carleton.ca/~soma/adapsec/readings/carver2016.pdf Carver, "Establishing a baseline for measuring advancement in the science of security: an analysis of the 2015 IEEE security & privacy proceedings."] (HotSoS 2016)
* [https://homeostasis.scs.carleton.ca/~soma/adapsec/readings/carver2016.pdf Carver, "Establishing a baseline for measuring advancement in the science of security: an analysis of the 2015 IEEE security & privacy proceedings."] (HotSoS 2016)
* [https://homeostasis.scs.carleton.ca/~soma/adapsec/readings/burcham2017.pdf Burcham, "Characterizing scientific reporting in security literature: An analysis of ACM CCS and IEEE S&P papers."] (HotSoS 2017)
* [https://homeostasis.scs.carleton.ca/~soma/adapsec/readings/burcham2017.pdf Burcham, "Characterizing scientific reporting in security literature: An analysis of ACM CCS and IEEE S&P papers."] (HotSoS 2017)
===November 19, 2020===
* [https://homeostasis.scs.carleton.ca/~soma/id-2007w/readings/tan-why6.pdf Tan & Maxion, "'Why 6?': Defining the Operational Limits of stide, an Anomaly-Based Intrusion Detector."] (Oakland 2002)
* [https://homeostasis.scs.carleton.ca/~soma/id-2007w/readings/sekar-automaton.pdf Sekar,"A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors."] (Oakland 2001)


===December 8, 2020===
===December 8, 2020===

Revision as of 18:31, 17 November 2020

Course Outline

The outline for the Fall 2020 run of Adaptive Security is available here.

Zoom link info is in cuLearn. If you can't access it, please email anilsomayaji at cunet.carleton.ca!

Research Journal

Your research journal is due by 9 PM the night before class. If you need more time please message me (on Teams) that you are running late. Entries are graded out of 4. Make sure to date stamp your entries. You may have multiple entries between classes; I will look at all entries since the last class.

For instructions on reviewing papers, see here.

Literature Review

To help you write a literature review or the background of a research paper, read the following:

Class Schedule

September 10, 2020

Introduction

September 15, 2020

Adaptive Security 2020F Lecture 3|September 17, 2020

September 22, 2020

September 24, 2020

September 29, 2020

October 1, 2020

October 6, 2020

October 8, 2020

October 13, 15, & 20, 2020

Review two papers per class following this template. Post your reviews on the Readings Wiki on Teams (in the Readings channel).

October 22, 2020

November 3, 2020

Look at the papers in the USENIX Security 2000 and USENIX Security 2010 as compared to the papers in USENIX Security 2020.

  • How have the kinds of papers changed over the years?
  • How has the ratio of attack to defence papers changed?
  • Has the "practicality" of papers changed?

November 17, 2020

November 19, 2020

December 8, 2020

Presentations 1

December 10, 2020

Presentations 2

Project Milestones

  • September 18, 2020: Areas of interest
  • September 29, 2020: Elevator Pitch
  • October 23, 2020 November 2, 2020: Literature Review
  • November 17, 2020: Tests/Preliminary Work

Other Readings

Here are some optional readings, most with a more biological bent:


Note that some of the content of this course came from a previous course, Biological Approaches to Computer Security:

The focus of this class will be on designing and building actual defenses so we won't cover many of these readings. However, you may want to take a look at them for inspiration.