Course Components
Each week, you will be responsible for reviewing one of the required readings (if there are any). Reviews are typically due Tuesday at midnight via the course HotCRP site (linked from Canvas) so discussion leads have time to read them before the Thursday class.
Except where otherwise noted, discussions will be led by one or two students. Everyone should read the required readings, but discussion leads should also read all of the on-time reviews (i.e., you are not responsible for reading anything submitted at the last minute) to be prepared to lead a discussion.
There will also be opportunities to participate during lectures, so be sure to attend class!
The final project will be an opportunity to explore additional topics in formal methods and/or usable security or propose your own research project in usable formal methods. More details will be posted soon.
Schedule
This a tentative course schedule. It may change over the course of the semester, so be sure to check back here before starting on any assigned readings. Some of the materials for this course have been borrowed and/or adapted from content developed by Professors Lorrie Cranor, Limin Jia, and Hanan Hibshi at Carnegie Mellon University.
This a tentative course schedule. It may change over the course of the semester, so be sure to check back here before starting on any assigned readings.
Unit 0: Course Intro
|
Date 58_57b77b-44> |
Topic 58_ab5b4e-42> |
Assignment 58_cd23dd-bc> |
|---|---|---|
|
Week 1 8/26 58_5cfa53-cd> |
Lecture Course Overview: Syllabus, classroom expectations, course motivation 58_511ea5-85> |
Required Readings:
No reviews due this week 58_9a1da1-b3> |
|
8/28 58_72025e-39> |
Discussion How to write a review and lead a discussion 58_dcf8c0-c0> |
Discussion lead: McKenna Bid on papers on HotCRP by midnight 8/29 (you’ll receive an invitation by email) 58_8882b2-2e> |
Unit 1: Security and Privacy
|
Date 58_c3295d-c0> |
Topic 58_fc3c03-e3> |
Assignment 58_499df6-1a> |
|---|---|---|
|
Week 2 9/2 58_6a286f-f0> |
Lecture Threats and Attackers: Threat modeling, STRIDE, hacking humans 58_eb615f-f5> |
Required Readings:
Review due 9/2 at midnight 58_d92cc2-aa> |
|
9/4 58_dff60d-96> |
Discussion Required readings, reviews 58_957959-cc> |
Discussion lead: Student(s) 58_41dd31-69> |
|
Week 3 9/9 58_6d211c-04> |
Lecture Security and Privacy Goals and Metrics: Information security properties, usable security metrics, side & covert channels 58_25bb58-c3> |
Required readings:
Optional readings:
Review due 9/9 at midnight 58_b05902-70> |
|
9/11 58_10a1b1-a1> |
Discussion Required readings, reviews 58_fbfa28-85> |
Discussion lead: Student(s) 58_0a6f42-0d> |
|
Week 4 9/16 58_e5787f-f5> |
Lecture Introduction to Cryptography and Security Protocols: Terminology, symmetric and public key algorithms 58_502fba-73> |
Optional readings:
No reviews due this week 58_d182d1-c5> |
|
9/18 58_c78c15-37> |
Lecture Introduction to Buffer Overflows: Vulnerabilities and mitigations Course Project overview 58_5fb355-02> | 58_bd1fc8-f5> |
Unit 2: Formal Methods
|
Date 58_8d4777-ce> |
Topic 58_5e8d11-91> |
Assignment 58_fd9539-14> |
|---|---|---|
|
Week 5 9/23 58_09edf1-ed> |
Lecture Introduction to Formal Methods: Static and dynamic analysis 58_aa7b6d-f1> |
Optional readings:
No reviews due this week 58_1e5225-e3> |
|
9/25 58_9feb8d-f8> |
Lecture Model Checking: Finite state machines, safety and liveness properties 58_74efc9-9a> |
Project proposals due 9/25 at midnight 58_9d867c-26> |
|
Week 6 9/30 58_42ebdb-76> |
Lecture Type Systems and Program Semantics: Noninterference, information flow control 58_c24449-80> |
Required readings:
Optional readings:
Review due 9/30 at midnight 58_7fe3f1-6d> |
|
10/2 58_a3fc1e-65> |
Discussion Required readings, reviews 58_674808-eb> |
Discussion lead: Student(s) 58_e1b038-74> |
Unit 3: Usable Security
|
Date 58_bfb14b-41> |
Topic 58_59b208-cf> |
Assignment 58_d80463-e9> |
|---|---|---|
|
Week 7 10/7 58_7ba5cf-63> |
Lecture Introduction to Usable Security: What is “usable”?, parts of a usable security study 58_1f63e0-17> |
Required Readings:
Optional reading:
Review due 10/7 at midnight 58_0bb4ba-89> |
|
10/9 58_d0842a-48> |
Discussion Required readings, reviews 58_ed4e0f-b2> |
Discussion lead: Student(s) 58_01a1d5-e0> |
|
Week 8 10/14 58_f3210b-25> |
Lecture Surveys and Interviews: Pros, cons, and development 58_5afc27-50> |
Required readings:
Optional readings:
Reviews due 10/14 at midnight 58_361ce9-b7> |
|
10/16 58_733c9b-6d> |
Discussion Required readings, reviews 58_c1acf1-2e> |
Discussion lead(s): Students 58_7b241c-f5> |
|
Week 9 10/21 58_570bae-e3> |
Lecture Quantitative & Qualitative Analysis: Goals, null hypotheses, how to choose a statistic 58_f46dcc-93> |
Required readings:
Optional readings:
Review due 10/21 at midnight 58_075ae4-2c> |
|
10/23 58_d8e8f8-a4> |
Discussion Required readings, reviews 58_b10c03-64> |
Discussion lead(s): Students 58_4ae5f7-4e> |
Unit 4: Usability in Formal Methods
|
Date 58_6f08aa-6a> |
Topic 58_138966-1a> |
Assignment 58_851398-fe> |
|---|---|---|
|
Week 10 10/28 58_5718c0-95> |
Lecture Smart Homes 58_ab6ea7-47> |
Required readings:
Optional readings:
Review due 10/28 at midnight 58_e534d2-7f> |
|
10/30 58_1167e3-32> |
Discussion Required readings, reviews 58_b51117-ab> |
Discussion lead: Student(s) Project check-in 1 due 10/30 at midnight 58_5cd0b3-19> |
|
Week 11 11/4 58_08d3e3-98> |
Lecture Information Flows on the Web 58_60d007-bd> |
Required readings:
Review due 11/4 at midnight 58_78e3c3-01> |
|
11/6 58_aa56a2-44> |
Discussion Required readings, reviews 58_56e56a-c2> |
Discussion lead: Student(s) 58_8b3419-0f> |
Unit 5: Research Ethics and Limitations
|
Date 58_8366da-22> |
Topic 58_d3da74-6f> |
Assignment 58_5602ba-2a> |
|---|---|---|
|
Week 12 11/11 58_a7e969-6c> |
Guest Lecture Lorrie Cranor 58_21a4bb-8c> | 58_c11610-85> |
|
11/13 58_4967ed-c1> |
McKenna traveling No class 58_bceeb2-14> | 58_bd6033-06> |
|
Week 13 11/18 58_17f788-ce> |
Lecture What is (Ethical) Human Subjects Research?: IRBs, research ethics 58_d38cf7-15> |
Required readings:
Optional readings:
Review due 11/18 at midnight 58_3dd680-11> |
|
11/20 58_0378ec-f4> |
Discussion Research ethics, required readings, reviews 58_da8621-a1> |
Discussion lead: McKenna Project check-in 2 due 11/21 at midnight 58_754520-b9> |
|
Week 14 11/25 58_b8ae99-61> |
Fall recess No class 58_0a281b-a1> | 58_168803-d5> |
|
Week 15 12/2 58_8b6da2-f5> |
Lecture Limitations of Formal Methods and Usable Security: Revisiting attacker models and side channels, assumptions, and generalizability 58_0501de-f2> |
Required readings:
Review due 12/2 at midnight 58_b89769-7f> |
|
12/4 58_ed6f2e-b0> |
Discussion Required readings, reviews 58_c617be-67> |
Discussion lead: McKenna 58_105e3c-9d> |
Final Projects and Reports
|
Date 58_f1c3aa-60> |
Topic 58_5b4322-7e> |
Assignment 58_9ebf74-6a> |
|---|---|---|
|
Week 16 12/9-12/11 58_9d2e13-63> |
Final project presentations 58_9fcba3-fe> |
Final reports due 12/12 at midnight 58_9c3460-f8> |