������� ��� �������� �������������� �������� � � ������� ��� �������� �������� ������ ���������� �� �������� ������� ��� ����������� ������������ ����� ��������������������� ���� �� CSE598d - Topics in Applied System Security: Introduction Patrick McDaniel Fall 2010 1 CSE598i - Web 2.0 Security Page
This course • This course is focused on the processes of getting published in security conferences. We will be focusing our energy on developing top quality publishable works over the course of the semester. • You will need to: Do some reading ‣ Do a lot of writing ‣ Do a lot of research ‣ Do reviews of papers ‣ Revise your paper based on reviews ‣ Go through the process of submitting your work ‣ 2 CSE598i - Web 2.0 Security Page
Process • Everything will be run through Workday/Subversion Get a WD login, add course milestones to project page ‣ ‣ Create repository for project, create latex documents Setup team meeting to discuss project efforts ‣ • Select one paper about your project to discuss in class, except Devin. • Deadlines: IEEE S&P - Nov 19th (Oakland, CA) ‣ WWW - Oct 29th (Hyderabad, India) ‣ SACMAT - Jan 7th (Innsbruck, Austria) ‣ • Plan on working on nothing but this for the last two days before submission. 3 CSE598i - Web 2.0 Security Page
Teams • Teams/Projects Code analysis: Damien, Will [S&P] ‣ ‣ Web security: Tom, Jil [WWW?] Provenance: Devin [S&P] ‣ Flatline: Steve [S&P] ‣ Smartgrid: Dmitry, Adam, Sergei [???] ‣ • Others: Phil? • NOW: signup sheet for mail list 4 CSE598i - Web 2.0 Security Page
For next week • Abstract • Project plan including (document or slides) Project “idea” ‣ Project methodology ‣ Experimental ‣ ‣ Ghant chart (with assignments) • Todo: Mail to group list, so people ‣ We will critique each other’s proposals. ‣ 5 CSE598i - Web 2.0 Security Page
Abstract • One sentence each for: ‣ Area • Topic of work ‣ Problem • What’s the issue? ‣ Solution • How do you propose to address the problem? ‣ Methodology • What’s the experiment? ‣ Results • What did you find? ‣ Take Away: Lesson 6 CSE543 - Introduction to Computer and Network Security Page
Recommend
More recommend