EEL5855/4853 Cross Layered System Security

Last Taught: First time for Prof McNair

More detailed course information is provided in the course Canvas site once the course begins.

Instructor

Janise McNair
Contact: After semester begins, use Canvas Inbox

Course Description

Develop an understanding of the principles of computer security, as it crosses layers of abstraction (application, operating system, hardware and network). Students will learn challenges of building secure computer systems with examples and hands-on assignments. Current research on these challenges will be discussed. Students will review and present conference papers. (3 credits)

EEL5855
Emphasizes course simulation and performance analysis studies, and critical review.
EEL4853
Emphasizes hands-on networking or network experience projects, and background studies.

Prerequisites

Programming knowledge & Principles of computer systems design knowledge (relaxed)
Helpful: Computer networking and/or communications knowledge

Required Textbooks and Software

Wenliang (Kevin) Du, Internet Security: A Hands-on Approach (Computer & Internet Security), Wenliang Du (independently published), 3rd edition, 2022.
ISBN number: ISBN-13: 978-1-7330039-4-0

Any textbook on security or computing can be outdated almost as soon as it is published. Feel free to supplement the readings with Internet, AI and LLM tools. The textbook has good fundamentals discussions. Recent IEEE and ACM articles and talks will be used to supplement. Article access is free @ UF Library.

Computer Requirements

  • UF Recommended Computer Specifications:
    https://it.ufl.edu/get-help/student-computer-recommendations/
  • HWCOE Computer Requirements:
    https://www.eng.ufl.edu/students/advising/fall-semester-checklist/computer-requirements/
  • EEL5855/4853 computing requirements:Open-source software will be used for lab assignments. Every student must have a computer where you can install and use the software.
    • Your computer must be able to support virtual machines to run labs. Support means sufficient memory to run labs in the downloaded virtual machine. (Some recently purchased MAC machines may not allow VMs. Please see the instructor for additional guidance in this case.)
    • Some labs may require use of the SEED system. https://seedsecuritylabs.org/
    • Homework quizzes will be given in class and may be on Canvas.

Topics (if time permits)

  • Fundamental security concepts
  • Network Security Basics
  • MAC Layer Attacks
    ARP Cache Poisoning, Man-in-the-Middle (MITM) using ARP
  • Internet Protocol Attacks
    MITM using ICMP
  • Packet Sniffing and Spoofing
  • UDP Protocols and Attacks
  • TCP Protocols and Attacks
  • Firewalls
  • VPNs
  • Research Topics
    • Software Defined Networks
    • Blockchain Security
    • Wireless Security, Random STS, Jamming, 5G vulnerabilities
    • Network Intrusion Detection, Anomaly Detection
    • Zero day attacks