Do not be scared if the list above seems a bit daunting: it is not likely that many of the enrolled students will have the "perfect" background in all of these topics. If you are missing a few of these skills, you should be able to learn them quickly, possibly with the assistance of our helpful TAs. You will need to learn things as you encounter them; this is a feature, not a bug. Most importantly, you should be eager to challenge yourself and learn!
This year, there will be only one required textbook for this course: Foundations of Security, Daswani, Kern, and Kesavan, ISBN 1-59059-784-2. This book should be available from the University bookstore and other retailers.
Note, however, that there will be other handouts and supplementary reading materials that will be posted on the class schedule. You will need to read these before each class. These articles will often have a research focus, which frequently means that you will need to spend more some time on each, perhaps marking them up as you read. Please refer to these helpful guides on how to read research papers critically: link-1, link-2, link-3.
Through these readings, you will be exposed to some topics that are "off the beaten path" and get more exposure to bleeding-edge research in computer security. We will also have some number of guest lectures throughout the course, to give you a different perspective on the topics we cover, often with a research focus.
As part of your class participation grade, you will be required to create summary videos that will be given at the top of the class. The goal of these is to summarize assigned papers for each class. Note that these are recorded videos. In other words, you are not going to be giving a talk, but we will play your videos at the top of the class.
Here are some examples of short 1-minute videos from the most recent Usenix Security conference. The links below are here to give you a broad range ideas on some of the different ways present research material and also provide some artistic inspiration for you. note that these are 1-minute movies. We expect class movies to be about 3-4 minutes long.
Even if you don't know or fully understand the underlying material, you will see that there is a lot of variation in terms of the visual style as well as whether you use voice-over as opposed to text. We encourage you to experiment! Talk to your friends at the art department, figure out how to use the latest tool for video production or cool modern presentation tools like Prezi, OfficeMix, or Videoscribe. Please visit their sites to learn about each individual tool and see which one(s) you like. You can use other tools or none at all.
You will be expected to create these videos and upload them to a drop site before the beginning of each class. Summary videos should be created in groups of two, with names of both participants clearly indicated on the first slide/image.
Tu/Th 11:00-12:20, Savery Hall 264
Thursday 1:30-2:20 Physics/Astronomy Auditorium (PAA) A110 and 2:30-3:20 Architecture Hall (ARC) G070.
Lectures will be held in Savery Hall 264; this is a building on the Quad housing the departments of Sociology. Here is a map link.
These are some useful papers for you to read. They are not mandatory, but may help you in solving homework problems, etc.Memory safety and all that jazz
Bring at least a few sheets of blank sheets of paper and two pens or pencils (two, in case one breaks or runs out of ink) to each class. The sheets of paper should be pre-separated leafs of paper (and, for example, not pages ripped from a spiral notebook).
We want to learn about your background to better match the course with your needs. Please fill out a first-day questionnaire found here: https://catalyst.uw.edu/webq/survey/livshits/247298.
To receive a non-zero grade in the course, you must sign the security and privacy course ethics form by 9/30/2014 5pm PST. The form is available online at: https://catalyst.uw.edu/webq/survey/livshits/247877.
Please pay careful attention to the due dates of the assignments. For most labs, and possibly other assignments (but not in-class activities), if you hand in the assignment late, we will take off 20% for each day it is late. When computing the number of days late, we will round up; so an assignment turned in 25 hours late will be downgraded 40%. Please note, however, that some assignments cannot be turned in late; we will clearly specify when this is the case, but do also ask if the policy seems unclear. We will not consider granting Incompletes.
The "Reasonable Person Principle" applies throughout this course. This principle simply states that a reasonable request made in a reasonable fashion shall be reasonably handled by reasonable persons. Let's all be "reasonable people" working on the same team to make this a great learning experience.
Collaboration is a very good thing. On the other hand, cheating is considered a very serious offense. Please don't do it! Concern about cheating creates an unpleasant environment for everyone. If you cheat, you risk losing your position as a student in the department and the college. The department's policy on cheating is to report any cases to the college cheating committee. What follows afterwards is not fun for anyone.
So how do you draw the line between collaboration and cheating? Here's a reasonable set of ground rules. Failure to understand and follow these rules will constitute cheating, and will be dealt with as per university guidelines.
This rule says that you are free to meet with fellow student(s) and discuss assignments with them. Writing on a board or shared piece of paper is acceptable during the meeting; however, you should not take any written (electronic or otherwise) record about the assignment away from the meeting. This applies when the assignment is supposed to be an individual effort or whenever two teams discuss common problems they are each encountering (inter-group collaboration). After the meeting, engage in a half hour of mind-numbing activity (like watching an episode of Gilligan's Island), before starting to work on the assignment. This will assure that you are able to reconstruct what you learned from the meeting, by yourself, using your own brain.
To assure that all interactions are on the level, you must always write the name(s) of who you talk with about your assignments (aside from course staff) on your assignment. These names should be listed in a prominent location at the top of the first page of your assignment.
Email Address, to reach all staff: firstname.lastname@example.org.
The class mailing list is email@example.com. We will use this list to make official class-related announcements. We will assume that all students in the class will be on this list, and furthermore, we will assume that everybody will be checking their mail regularly (at least once a day, during the week). It is conceivable that we will use the mailing list to announce assignments, or to make changes/fixes to assignments. Lastly, there is also a discussion forum for the class.
If you're enrolled in CSE 484 or CSE M 584, then your @u.washington.edu email address should be automatically subscribed. If you just enrolled, you may have to wait a day before the system is automatically updated. You can verify your enrollment or join the mailing list by going to this page: https://mailman1.u.washington.edu/mailman/listinfo/multi_cse484a_au14.
All email sent to the class list is archived here: https://mailman1.u.washington.edu/mailman/private/multi_cse484a_au14/.