The course will cover topics related to IoT security and safety, with a focus on smart buildings (homes, offices, and campus deployments). In the process, students will also get acquainted with the relevant aspects of network security, authentication, security protocol design and analysis, security modeling, key management, program safety, intrusion detection, DDoS detection and mitigation, and operating systems security. A detailed list of lecture by lecture contents, assignments, and due dates (subject to change as semester evolves) is available on the course schedule.
There are no formal prerequisites for this class.
Informal: You need to have a basic understanding of (1) IP networks, (2) modern operating systems (e.g., Windows, Linux), (3) discrete mathematics, (4) basics of systems theory and implementation (e.g., file systems, distributed systems, networking, operating systems, etc.). If you have questions regarding these prerequisites, please contact the instructor.
By the end of this course, students will be able to:
The course will involve paper presentations, class discussions, and a semester-long course project. The outcome of the project will be a conference-style research paper, ie., wherein students will select, define, plan, conduct, and communicate their original security research project, and in process develop or refine their research skills.
There will be no final exam.
The final letter grade will be based on the final percentage as follows:
A >= 95% > A- >= 90% > B+ >= 85% > B >= 80% > B- >= 75% > C+ >= 70% > C >= 65% > C- >= 60% > D+ >= 55% > D >= 50% > D- >= 45% > F
The grades may be interpreted according to W&M’s grading policies.
Course Project (45 points): The course project requires that students execute research in systems or software security, with a focus on IoT. The result of the project will be a conference-style paper. Project topics will be discussed in class after the introductory material is completed. Be realistic about what can be accomplished in a single semester. However, the work should reflect real thought and effort - projects executed in the closing days of the semester are unlikely to be well received. The grade will be based on the following factors: novelty, depth, correctness, clarity of presentation, and effort. See the Project for more details.
Reading Bug bounty (10 points): The assigned readings are futile unless done in depth. As reading 20+ papers in depth in the span of a semester is burdensome, this class pursues an alternative: read few papers, provided you read them in-depth, and think critically about them.
To this end, each student owes the instructor 2 non-trivial bugs/mistakes/impractical assumptions made in the peer-reviewed security papers assigned as readings, each worth 5 points on the class grade, by the last day of class. There are three conditions for a bug to be valid: (1) you must be the first in class to report it (hence, report privately to the instructor, ideally via email), (2) it must be non-trivial, e.g., an unsatisfiable assumption or logical error that impacts the claims made in the paper (i.e., minor spelling/grammar errors, or minor calculation errors that do not affect the claims made in the paper, do not count), and (3) you must be able to reason about it, i.e., explain why it is a bug. The instructor reserves the right to adjudicate the validity of a reported bug.
Paper Presentations (20 points): Students will present a select set of recent conference papers on IoT security and safety. Each presentation must be at most 30 mins, and must end with 3 insightful questions to kick-start the class discussion. These presentations will be graded for content, clarity, and the 3 questions.
Paper Reviews (10 points): Students will write conference-style paper reviews for each paper presented in class. Reviews will be submitted at the beginning of the class, and will ensure that students (1) can evaluate research in IoT security, and that they (2) know enough to participate in class discussions.
Rules for reviews:
Class Participation and Discussion (15 points): This is a discussion-based class, as opposed to one relying on lectures. Each class will begin with a 20-30 minute presentation, whether by the instructor or students, followed by 50-60 minute of discussion. To do well in this course, students must take active and regular roles in discussion and demonstrate comprehension of the reading and lecture themes. This will be closely monitored by the instructor, thereby making a student’s ability to demonstrate their comprehension of papers essential to a receiving a passing grade. A really insightful, lively, discussion is likely to motivate the instructor to take the class out for coffee right after.
This is a research-based class, and has no formal textbook. The course readings will come from online book chapters, seminal papers, and other informative sources.
Here are some useful online books that provide additional information:
Project deadlines will be hard. Late assignments will be accepted within 24 hours with a 25% reduction in grade. Milestones submitted after 24 hours will have a 100% penalty. Students with legitimate reasons who contact the professor before the deadline may apply for an extension.
The instructor will not take any formal attendance for class meetings. However, as stated above, a portion of the grade is based on class participation. Additionally, exam material includes anything in the readings, slides, and topics discussed in class. Students missing class should consult classmates on missed material.
The university policy on excused absences will be observed (see this). The students are responsible for discussing makeup exams if they miss exams due to excused absence. The instructor will choose a mutually agreed date and time for the makeup exam. Late submission of homework assignments due to excused absences is not subject to the policies on late assignments.
This semester, the world will enter its third year with COVID. As an academic community based on faculty and students convening, Spring 2022 courses will largely consist of in-person instruction. All of us will follow W&M requirements - vaccinations and boosters, indoor masking, as well as quarantine and isolation when ill. That last is really important: for those who have tested positive, W&M’s requirements must be fulfilled before class can be attended in person, and, out of an abundance of caution, anyone with symptoms consistent with COVID- even if they don’t have a positive test- should not come to class.–>
The instructor will treat COVID-related absences as excused absences, and follow the attendance policy outlined previously. The instructor will also release slides, and hold additional office hours if required, to assist students facing COVID-related absences.
Please note that testing positive for COVID or any other temporary illness is not considered a disability as defined by ADA guidelines and is not under the purview of W&M’s Student Accessibility Services (SAS). Thus, any questions should be addressed via email to the instructor.
The university, college, and department policies against academic dishonesty will be strictly enforced. You may obtain copies of the W&M Student Code from the following URL: http://www.wm.edu/offices/deanofstudents/services/studentconduct/studenthandbook/student_code_of_conduct/index.php
The instructor expects honesty in the completion of test and assignments. The instructor has a zero tolerance policy for violations of academic integrity. The instructor carefully monitors for instances of offenses such as plagiarism and illegal collaboration, so it is very important that students use their best possible judgement in meeting this policy. The instructor will not entertain any discussion on the discovery of an offense, and will assign the ‘F’ grade and refer the student to the appropriate University bodies for possible further action. It is the understanding and expectation of instructor that the student’s signature on any test or assignment means that the student neither gave nor received unauthorized aid.
Note that students are explicitly forbidden to copy anything off the Internet (e.g., source code, text) for the purposes of completing an assignment or the final project. Also, students are forbidden from discussing or collaborating on any assignment except were explicitly allowed in writing by the instructor.
This course considers topics involving personal and public privacy and security. As part of this investigation we will cover technologies whose abuse may infringe on the rights of others. As an instructor, I rely on the ethical use of these technologies. Unethical use may include circumvention of existing security or privacy measurements for any purpose, or the dissemination, promotion, or exploitation of vulnerabilities of these services. Exceptions to these guidelines may occur in the process of reporting vulnerabilities through public and authoritative channels. Any activity outside the letter or spirit of these guidelines will be reported to the proper authorities and may result in dismissal from the class.
When in doubt, please contact the course professor for advice. Do not undertake any action which could be perceived as technology misuse anywhere and/or under any circumstances unless you have received explicit permission from the instructor.
Students have to provide their own transportation for any and all class related trips.
This course does not require activities that pose physical risk to students.