Instructor: 紀博文 Po-Wen Chi
Email: neokent@gapps.ntnu.edu.tw
Office: 514
Phone: 02-7749-6684
TA: 陳炫豪
Email: fayefayeder@gmail.com
Goals:
Make students be familiar with basic security technologies and how they are applied in the real world.
Provide backgrounds for further studying in cryptography and network security.
Scope:
Cryptographic primitives.
Network and system security in the real world.
William Stallings, Cryptography and Network Security: Principles and Practice (7th Edition).
The most popular information security textbook in Taiwan.
Dan Boneh and Victor Shoup, A Graduate Course in Applied Cryptography.
This is a good book for entering the crypto world.
Free, unfortunately not completed yet.
Victor Shoup, A Computational Introduction to Number Theory and Algebra.
Free. If you need math backgrounds about cryptography, this is a good book.
N. P. Smart, Cryptography, An Introduction
Free, unfortunately not maintained.
N. P. Smart, Cryptography Made Simple.
A good book but expensive.
But I find a pdf from its publisher.
W. Du, Computer & Internet Security: A Hands-on Approach, Second Edition
A good book for you to experience security in the real world.
Michael J. Evans and Jeffrey S. Rosenthal, Probability and Statistics - The Science of Uncertainty, 2nd edition.
Course Overview & Introduction.
資訊安全
(星期二) · 下午2:20 - 5:20
視訊通話連結:https://meet.google.com/vwz-jwfb-aqp
Homework: 40%
Writing assignment.
Labs.
Programming.
Midterm: 30%
Final Projects: 30%
Due: 2021.03.22 PM11:59
Due: 2021.04.12 PM11:59
Due: 2021.05.10 PM11:59
Due: 2021.05.31 PM11:59
Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies
Date: 2021.04.12
Schedule: https://docs.google.com/spreadsheets/d/1BscT2TXOQYmO1WirsQhqH00iasksQY0lF_NCP0IDnQA/edit?usp=sharing
Group project. (2-3 members)
You need to prepare a proposal after the midterm.
Proposal Due: 2021.05.02 PM 11:59
This proposal must includes your team members, your emails, your topic, your motivation and your reference works.
I will give you my comments about your proposal so that you can prepare your final project well.
Reference Suggestions:
Crypto, EuroCrypt, AsiaCrypt
PKC: International Conference on Practice and Theory of Public Key Cryptography
FC: Financial Cryptography
TCC: Theory of Cryptography Conference
ACNS: International Conference on Applied Cryptography and Network Security
ISC: The Information Security Conference
USENIX Security Symposium
CCS: ACM Conference on Computer and Communications Security
AsiaCCS: ACM ASIA Conference on Computer and Communications Security
S&P: IEEE Symposium on Security and Privacy
NDSS: ISOC Network and Distributed System Security Symposium
ACSAC: Annual Computer Security Applications Conference.
Of course, there are lots of conferences. After you make your decision, please give me a proposal.
Final Presentation: 2021.6.15, 16
The schedule is Here.
Each presentation is 30 minutes, including QA.
Everyone should ask at least one question to the following two talks.
You need to submit a report to the moodle.
In Chinese.
Use your own words to introduce the paper.
The most important part, your research idea about this topic.
Due: 2020.06.24 PM11:59
Because of COVID-19, I change the bonus task.
IoT Village is a place for #iot hacking, workshops, talks, and contests. You can see the presentation videos online.
https://www.youtube.com/watch?v=0G2g-tLMK70&list=PL-3JTc2q5aOrpPtRwr-rWuU-vf-vFWH8V
Please select two talks and write down the content of their talks. Do not forget to add your comments about their talks.
Bonus: 10 pts
Due: 2020.06.24 PM11:59