cs 683 security and privacy spring 2018
play

CS 683 - Security and Privacy Spring 2018 Instructor: Karim - PowerPoint PPT Presentation

CS 683 - Security and Privacy Spring 2018 Instructor: Karim Eldefrawy University of San Francisco http://www.cs.usfca.edu/~keldefrawy/teaching /spring2018/cs683/cs683_main.htm (https://goo.gl/t396Fw) 1 Class Project 2 Pu Purpose Learn


  1. CS 683 - Security and Privacy Spring 2018 Instructor: Karim Eldefrawy University of San Francisco http://www.cs.usfca.edu/~keldefrawy/teaching /spring2018/cs683/cs683_main.htm (https://goo.gl/t396Fw) 1

  2. Class Project 2

  3. Pu Purpose • Learn and analyze a distributed system from a security (and cryptography) perspective • Will focus on blockchain-based systems, e.g., platforms for cryptocurrencies and smart-contracts • Learn to write a report about technical security- relevant aspects of a system • Learn to give a short (15min) technical talk about technical security-relevant aspects of a system 3

  4. Wh What you need to do • Choose one of the selected blockchain-based (or consensus-based) systems and cryptocurrencies and study its technical details • Write a 7 page report (details next) • Give a 20 minute presentation (present for 15min and answer questions for 5min) about the system (details next) 4

  5. Sy Syst stems that you could consider • Bitcoin, Bitcoin Cash, and Litecoin (all together as one project, two students can work together as a team on this) • Ethereum and Ethereum Classic (both together as one project, two students can work together as a team on this) • Ripple (single student) • Cardano (single student) • NEO (single student) • Dash (single student) 5

  6. Wh What sh shou ould ld yo your report co cover? • Executive Summary: Short overview of the system and its use cases (1 page) • Advantages: Purpose of the system, e.g., what shortcomings of other systems it addresses, what new features it introduces (1 page) • Usage: Use cases for the system (1 page) • Technical Details (4 pages) • System architecture (P2P, centralized, or hybrid) • Consensus approach (POW, POS, byzantine agreement/other consensus … etc.) • Cryptographic primitives used (hash functions, encryption, signatures … etc.) • Other special features (e.g., anonymity, smart-contracts … etc.) 6

  7. Wh What sh shou ould ld yo your presentation co cover? • Executive Summary: Short overview of the system and its use cases (2 slides) • Advantages: Purpose of the system, e.g., what shortcomings of other systems it addresses, what new features it introduces (2 slides) • Usage: Use cases for the system (2-3 slides) • Technical Details (9-10) • System architecture (P2P, centralized, or hybrid) • Consensus approach (POW, POS, byzantine agreement/other consensus … etc.) • Cryptographic primitives used (hash functions, encryption, signatures … etc.) • Other special features (e.g., anonymity, smart-contracts … etc.) 7

Recommend


More recommend