skip to main content

Course Websites

CS 463 - Computer Security II

Spring 2021

Official Description

Program security, trusted base, privacy, anonymity, non-interference, information flow, confinement, advanced auditing, forensics, intrusion detection, key management and distribution, policy composition and analysis, formal approaches to specification and verification of secure systems and protocols, and topics in applied cryptography. Course Information: Same as ECE 424. 3 undergraduate hours. 3 or 4 graduate hours. Prerequisite: CS 461. Recommended: CS 475.

Related Faculty

Course Director

Text(s)

Varies by semester.

Learning Goals

  • Identify and address privacy issues in social networks (1)(2)(6)
  • Apply machine learning to security and address adversarial machine learning (1)(2)(6)
  • Use crypto constructs (homomorphic encryption, multi-party computation, etc.) (1)(2)(6)
  • Identify and address issues with de-identification (1)(2)(6)
  • Use hardware designed to support trusted computing (1)(2)(6)
  • Reason about information flow, computational security for encryption (1)(2)(6)
  • Recognize threats and design mitigations for security in key sectors (healthcare, power grid, transportation, etc.) (1)(2)(6)
  • Understand architecture and recognize threats for smartphone security
  • Recognize issues with web privacy (especially cookies and advertising) (1)(2)(6)
  • Analyze human factors (1)(2)(6)
  • Recognize and mitigate insider threats (1)(2)(6)
  • Understand architecture and recognize threats for security in the Internet of Things (IoT) (1)(2)(6)
  • Recognize drivers and tactics in cyber warfare, and other topics of emerging interest in security and privacy (1)(2)(6)

Topic List

  • Privacy issues in social networks
  • Machine learning applications in security and adversarial machine learning
  • Crypto constructs (homomorphic encryption, multi-party computation, etc.)
  • De-identification
  • Hardware for trusted computing
  • Information flow, computational security for encryption
  • Security in key sectors (healthcare, power grid, transportation, etc.)
  • Smartphone security, web privacy
  • Human factors
  • Insider threats
  • Internet of Things (IoT) security
  • Cyber warfare, and other topics of emerging interest in security and privacy

Required, Elective, or Selected Elective

Selected Elective.

TitleSectionCRNTypeHoursTimesDaysLocationInstructor
Computer Security IIP348205ONL31100 - 1215 T R    Gang Wang
Computer Security IIP448206ONL41100 - 1215 T R    Gang Wang