Overview

  • Title: Special Topics on Computer Security
  • Provided by: Dept. of Computer Engineering, Myongji University
  • Lead by: Minho Shin (mhshin@mju.ac.kr, Rm5736)
  • Period: Fall semester, 2022
  • Location: 5441/5701 at 5th Engineering Building
  • Time: Mondays, 12pm to 3pm
  • Type: Graduate Seminar
  • Goal of the class
    • This class aims to familiarize students with current research topics in Computer Security & Privacy area
    • This class also aims to train students with their communication skills including oral presentation, discussion, writing, and collaboration
  • Resources for researchers from Publishing Campus of Elsevier

Participants

# Name Dept Advisor Mobile Phone Email Address
1 Eunseong Kim CE Minkyoung Cho
2 Jimin Son CE Minho Shin
3 Somon CE Sangwon Hyun
4 Suwon Park CE Minho Shin
5 Hoguk Lee CE Minho Shin
6 Soyoung Ji CE Minho Shin

Agenda

Date Name Topic Slides Minutes
9/14 Minho Ice-breaking
9/21 Sam debreach_mitigating_compression_side_channels_via.pdf debreach.pptx
Eun ai_스피커의_보안성_평가_및_대응방안_연구.pdf
slide
ai_스피커의_보안성_평가_및_대응방안_연구.pptx
9/28 No Class
10/5 No Class
10/12 Jimin 블록체인_기반의_scada.pdf 블록체인_기반의_scada_시스템_보안.pptx
Suwon arp_공격_시그니처_정보에_기반한_스푸핑_공격_탐지_및_차단_모델.pdf spoofing_attack_detection_and_blocking_model.pptx
10/17 3pm Soyoung 웹_기밀성_및_무결성의_보안성_검증_방법.pdf 1.웹기밀성및무결성의보안성검증방법.pptx
Hoguk securing_medical_records_of_covid-19_patients_using_elliptic_curve_digital_-_signature_algorithm_ecdsa_in_blockchain.pdf securing_medical_records.pptx
10/19 Sam htb_a_very_effective_method_to_protect_web_servers.pdf heal_the_breach_abdusamatov_somon_.pptx
Eun ai_사이버보안_체계를_위한_블록체인_기반의.pdf ai_사이버보안_체계를_위한_블록체인_기반의_data-preserviing.pptx
10/26 Jimin 클라이언트_환경에서_보안_소켓_레이어의_트래픽_복호화.pdf 클라이언트_환경에서_보안_소켓_레이어의_트래픽_복호화.pptx
Suwon applsci-12-07655-v2.pdf sgxdump.pptx
10/31 3pm Soyoung 웹모니터링기반암호화웹트래픽공격탐지시스템.pdf 2.웹모니터링기반암호화웹트래픽공격탐지시스템.pptx
Hoguk on_the_security_of_networked_control_systems_in.pdf on_the_security_of_networked_control_systems-in_smart_vehicle_and_its_adaptive_cruise_control.pptx
11/2 Sam privacy-preserving_computing_in_the_blockchain_era.pdf privacy-preserving_in_the_blockchain_era_abdusamatov_somon_.pptx
Eun 자율_운항_선박의_인공지능_잠재적_사이버_위협과_보안.pdf 자율_운항_선박의_인공지능.pptx
11/9 Jimin 자율_주행_자동차_보안_위협_및_기술_동향.pdf 자율_주행_자동차_보안_위협_및_기술_동향.pptx
Suwon 1-s2.0-s0167404821004053-main.pdf automated-analysis-of-malicious-microsoft-office-documents.pptx
11/16 No Class
11/21 3pm Soyoung 수정_가능한_블록체인_기반_권한_변경.pdf 3.수정가능한블록체인기반권한변경및접근제어시스템.pptx
Hoguk detection-of-cybersecurity-spoofing-attacks-in-vehicular-networks-with-recurrence-quantification-analysis.pdf detection-of-cybersecurity-spoofing-attacks-in-vehicular-networks-with-recurrence-quantification-analysis.pptx
11/23 Sam targeted-deanonymization-via-the-cache-side-channel-attacks-and-defenses.pdf targeted_deanonymization_via_the_cache_side_channel_abdusamatov_somon_.pptx
Eun 인공지능기술의_iot_통합보안관제를_위한_데이터모델링.pdf 인공지능기술의_iot_통합보안관제를_위한_데이터모델링.pptx
11/30 Jimin sdn에서의_보안_시스템_부하_감소_기법.pdf sdn에서의_보안_시스템_부하_감소_기법.pptx
Suwon 1-s2.0-s0167404822001407-main.pdf wasmati.pptx
12/7 Soyoung 4.보안_메시징_프로토콜_mls에서_관리자에_메시지_노출에_관한_연구.pdf
Hoguk cyberphysical-security-of-powertrain-systems-in-modern-electric-vehicles-vulnerabilities-challenges-and-future-visions.pdf cyberphysical_security_of_powertrain_systems_80221115_이호국.pptx
9/21 Zhong Perfectly Privacy-Preserving AI,
A Survey on Collaborative Deep Learning
and Privacy-Preserving
Privacy-Preserving AI

Class Information

  • Rules for the class
    • We have 15 presentations in total by three students
    • Each present 5 presentations throughout the semester
    • One presentation per day
    • The presenter announces the paper to present at least one week ahead
    • The presenter prepares a powerpoint slides for 30-60min talk
    • The other students submit a review article (1-2 pages) before class
    • The presentation should contain:
      • (Motivation) What are the motivations for this particular problem? What is the backgrounds for understanding the problem? Why is this important?
      • (Problem) What is, on earth, the exact problem the authors aim to address, and why on earth, is the problem important?
      • (Related work) What has been done by other researchers to address the same or similar problem on the table? Why the existing work is not enough to call done?
      • (Method) What is their main methodology to address the problem? How did they actually solve the problem in detail?
      • (Evaluation) What are the evidences for their success found in the paper? What is missing in their evaluation?
      • (Contribution) What is the contribution of the paper and what is not their contributions? Are there any limitations in their result? How would you evaluate the value of the paper?
      • (Future work) What is the remaining problems that were only partially addressed or never covered by the paper? What will be a possible approach to the problem?
    • A review article contains
      • The same content as described for the presenter
      • But in a succinctly written words form
      • Not exceeding two pages
      • Submit in Word/PDF by email
    • Evaluation
      • As a Presenter (10 points each)
        • Slide Quality
        • Talk Quality
        • Knowledge Level
      • As a reviewer (5 points each)
        • Clarity of the review
        • Understanding level

Reading List on Privacy

List: privacy-preserving_ai-2020.4.1.pdf

SAMPLE:

Privacy-preserving for AI applications:

Privacy-preserving approach using machine learning:

Others:

Reading List Security

Reading List on Blockchain

General

Survey

Blockchain Technology

Blockchain Security & Privacy

Hyperledger (Permissioned Blockchain)

Applications: Security & Privacy

Applications: Medical

Applications: IoT

Applications: Business

Applications: Government

Applications: Smart City

Applications: Energy

Applications: Others

 
class/gradcompsec2022.txt · Last modified: 2022/12/07 12:51 by jimin1708 · [Old revisions]
Recent changes RSS feed Powered by PHP Valid XHTML 1.0 Valid CSS Driven by DokuWiki