Welcome to CS 5435
This course is a broad overview of modern computer security and digital privacy. It aims to impart technical and social understanding of how and why security and privacy matter, how to think adversarially, and how (and how not) to design secure systems and products. Topics include authentication, Web and mobile security, network, OS, and low-level software security, elements of applied cryptography, privacy protection technologies, censorship resistance, and security and privacy of emerging platforms, illustrated by studying real-world systems and attacks. Key learning objectives include understanding the role of threat modeling in the design and evaluation of modern computing systems, how exploitation of computing systems works, and approaches to finding and remediating vulnerabilities.
Attendance
The course will have two weekly sessions: Tuesday and Thursday, 10:10-11:25a ET in Bloomberg Center Room 131.
Canvas
We will use Canvas to distribute all assignments.
Slack
Please use Slack for all interactions regarding the class.
Course Staff
Vitaly Shmatikov (Instructor)
email: shmat@cs.cornell.edu
Office hours: message me on Slack
Collin Zhang (TA)
email: rz454@cornell.edu
Office hours: Wednesdays 1p. Bloomberg 260.
Rishi Jha (TA)
email: rjha@cs.cornell.edu
Office hours: Thursdays 3-4p. Bloomberg 305 (or Zoom if announced on Slack).
Academic integrity
The utmost level of academic integrity is expected of all students.
Under no circumstances may you submit work done with or by someone else under your own name. However, general questions regarding the class are permissible. If you are unsure post on Piazza privately.
You must acknowledge by name anyone whom you consulted. You may not give nor receive assistance from anyone else during an exam or midterm. You may not give any hints or post any material that might be part of a solution publicly on Piazza. If your question necessarily includes such material, post privately.
If you are unsure about what is permissible and what is not, please ask.
Academic Integrity Resources: