Course Project
You are encouraged to form a group of 2 to 3 students and work on an important and interesting security-related project, although individual project is allowed with justifications. You are encouraged to work on a project that can tie to your own research area if security is not your main area.
Please form your group by Thursday, April 11 and sign up in the sign-up sheet in Canvas.
Styles of research projects
Typically, you will be choosing one of the three research styles:
- Analyze an existing system (e.g., an operating system componenet/feature, an application, or a network protocol) to identify security risks and weaknesses. Ideally, you will be able to demonstrate real or potential flaws.
- Propose a new solution against a class of attacks or vulnerabilities. Typically this requires a deep understanding of the root causes of a problem. Ideally the solution should be based on an insight and a solid theoretical foundation.
- Measure the current status/impact of a known security threat or security solution. The purpose is to gain insight from empircal evidence, e.g., to understand the technical and non-technical barriers for adopting a security solution, or to raise awareness of certain security threats.
Pre-Proposal Presentation – In Class (April 25)
An in-class 10-min presentation with 5 min Q&A is scheduled on April 25. A representative of each group will talk about their proposed project and get feedback from the class. During the presentation, please focus on:- What problems you plan to work on? Why is it important and interesting?
- Discuss the most important related work in the field.
- Your tentative approach to solve the problem.
Written Proposal – Due Friday, May 3 (Submission via Canvas Assignments)
A 3-page proposal is due on May 3. Please elaborate each of the following points:- Group: Group member names and netID.
- Title: What would you call the eventual paper or product?
- Problem: A description of the problem you will address and why it is important.
- Context: A survey of related work and past approaches to the problem.
- Approach: How you will address the problem and how your approach differs from past work.
- Evaluation: How you will test how well your approach works (e.g., experimental measurements).
- Results: What results do you plan to include at the end of the quarter?
- Timeline: What are subtasks of the project and their expected delivery time?
Project Presentation – In Class, Week 10
Following the conference-style presentation, each presentation is 20-min long, with 5 min Q&A. Content of the talk will include all points mentioned above.1st Annual UCI CS Security Symposium
Tuesday, June 4
- 2:00Security Analysis of Multi-Sensor Fusion
based Localization in Autonomous Vehicles.
Shen, and Won. - 2:25<Title anonymized for paper submission>.
Lee, and Park.
Session 1: IoT/CPS Security
- 2:50<Title anonymized for paper submission>.
Sato.
Session 2: Machine Learning Security
Thursday, June 6
- 2:00<Title anonymized for paper submission>.
MJ. - 2:25Automated Firmware Analysis System.
Lin, Padurean, and Schwarz.
Session 3: Vunerability Discovery & Analysis
Written Project Report – Due June 14 (Submission via Canvas Assignments)
The final report should be written in the style of a conference paper and not exceed 10-page long (including text, figures, references, and appendix if applicable). You can refer to any of the papers we read during the quarter.A minimum structure that should be followed is: Abstract, Introduction, Related Work, Methodology, Evaluation, Future Work, and References.
The text must be formatted in two columns, using 10 point Times Roman font on 12 point leading, following the USENIX template files. You are strongly encouraged to use LaTeX for typesetting. Here is short guide of Latext.
Other Checkpoints
- From class start to pre-proposal presentation, you are required to discuss your plans with me during office hours (or make appointments).
- From after written proposal to final presentation, you are required to schedule an appointment with me to discuss your progress with me, either during office hours or appointments.
- Tips: If any of your projects happen to be related to the topic of a discussion session, try to seize the opportunity to drive the discussion towards your project so more brains think about it.