|
|
|
|
Homework (General)
All submissions must be typed and submitted as PDF files; handwritten assignments and non-PDF files will not be accepted.
Unless otherwise specified, submit homeworks online at the following URL: https://catalyst.uw.edu/collectit/dropbox/kohno/20970.
At the top of your assignment, please
be sure to write your
name, email address, UWNetID,
the homework assignment number (e.g. "Homework 1"),
due date, any references that you used (besides the course texts and assigned
readings), and the names of any people that you discussed the assignment with.
Please note that the future schedule is for approximate planning purposes only. The future schedule is subject to change based on our progress and other factors.
Non-graded Immediate Tasks (Start of Quarter)
- Join class mailing list
Due: March 26.
- Sign ethics form
Due: April 4 (at the end of class). (Must be on time, late policy does not apply.)
- Sign up for coffee/tea (encouraged, but not required). Signup with the sheet at the CSE reception desk by March 30).
Due: April 4.
Textbook-Style Homeworks
- Homework 1
Here: hw1.pdf
Out: April 18
Due: May 1, 5pm
- Homework 2
Here: hw2.pdf
Out: May 18
Due: May 30, 5pm
- Homework 3
Here: hw3.pdf
Out: May 30
Due: June 11, 7pm
The Context for Security
- Current Event Reflection (#1). Details here.
Due: April 27, 2pm. (Must be on time, late policy does not apply.)
- Security Review (#1). Details here.
Due: April 27, 2pm. (Must be on time, late policy does not apply.)
- Current Event Reflection (#2). Details here.
Due: June 1, 2pm. (Must be on time, late policy does not apply.)
- Security Review (#2). Details here.
Due: June 1, 2pm. (Must be on time, late policy does not apply.)
CSE M 584 Research Component
If you are enrolled in CSE M 584, then you must also read the following papers
and submit written reviews by the specified deadline. Late submissions will
not be accepted. Your evaluations should have the following form:
- Your name.
- Paper title and author(s).
- What problem does the paper address?
- Two (or more) most important new ideas in the paper, and why.
- What is the approach used to solve the problem?
- How does the paper support or otherwise justify its arguments and conclusions?
- Two ways the paper could be improved, and why.
- Two important, open research questions on the topic, and why they matter.
You must submit evaluations as a PDF file. You should upload the
evaluations to the online Catalyst system: https://catalyst.uw.edu/collectit/dropbox/kohno/20970.
Your evaluation for each reading must be less than one page
long, be single-spaced, use 12pt font, and have at least 1 inch
margins; We expect for most paper evaluations to be approximately 1/2
to 3/4 pages long.
You are welcome to, and in fact encouraged to, discuss the papers with
other students in the class. However, you must write the evaluations on your
own.
- Due March 30, 7pm. Comprehensive Experimental Analyses of Automotive Attack Surfaces.
Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno. In Usenix Security 2011.
- Due April 24, 7pm. The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86). Hovav Shacham. In CCS 2007. (Read the published version, not the full version. You may need to be on campus in order to be able to download the paper.)
- Due May 8, 7pm. Detecting and Defending Against Third-Party Tracking on the Web. Franziska Roesner, Tadayoshi Kohno, and David Wetherall. In NSDI 2012.
- Due May 17, 7pm. Re: CAPTCHAs -- Understanding CAPTCHA-Solving Services in an Economic Context. Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage. In USENIX Security 2010.
|
|