I590/B649 Data-driven Security and Privacy
I590/B649 data-driven security and privacy studies the design and implementation of secure computer systems utilizing data-oriented security analysis. Lectures cover threat models, attacks that compromise security, and techniques for achieving security, based on recent data-driven security research papers. Topics include the elements of data process techniques (such as natural language processing, machine learning); The applications of data processing techniques to various security and privacy problems, and practical issues arising from them; Secure and privacy-preserving machine learning algorithms; Attacks on machine learning algorithms.
Course information |
Instructor: Xiaojing Liao (xliao@indiana.edu) |
Time: Monday, Wednesday 7:15 p.m. - 8:30 p.m. |
Place: Informatics West, Room 107 |
Office hours: by appointment |
Class Schedule |
8/20 Course Overview syllabus/slides 8/22 Machine learning 101 slides/reading 8/27 Applied ML for security slides/reading 8/29 DNN & its security and privacy slides/reading1/reading2 9/03 No Class (Labor Day) 9/05 Course project proposal day 9/10 Applied NLP for security slides/reading1/reading2 9/12 Applied Word2vec for security slides 9/17 Applied NER for security slides/reading 9/19 Cloud security slides 9/24 Cloud security 2 slides 9/26 Web security slides/reading1/reading2 10/1 Web security 2 slides 10/3 Mobile security slides/reading 10/8 PC meeting/paper discussion 10/10 PC meeting/paper discussion 10/15 No Class 10/17 No Class 10/22 10/24 10/29 10/31 11/05 11/07 11/12 11/14 11/19 No Class (Thanksgiving Break) 11/21 No Class (Thanksgiving Break) 11/26 11/28 12/03 12/05 |
Prerequisites |
There is no specific prerequisite course for this research topic class, however, a good understanding of basic computer security concepts, machine learning techniques and natural language processing techniques will be helpful. |
Textbook |
No textbook required: a fair number of research papers will be read. Below are two reference books: Hacking: The Art of Exploitation (2nd Edition) by Jon Erickson Security Engineering: A Guide to Building Dependable Distributed Systems (2nd Edition) by Ross J. Anderson |
Grading |
10% Class Participant 15% Paper review assignment 25% Paper presentation 50% Final project |