CSE509: System Security
Instructor |
Amir Rahmati |
Office Hours |
By Appointment |
Class Location |
CS 2120 |
Class Time |
Tue/Thu 5:30 – 6:50 |
Prerequisites |
Mature understanding of Computer Architecture, Networks, and OS |
TA |
TBD |
TA Office Hours |
TBD |
TA Office Hour Location |
TBD |
Grading
Paper Responses |
20% |
Research Project |
30% |
Midterm Exam |
25% |
Final Exam |
25% |
Class Calendar
Links
Ed
Ethics, Law, and University Policies
To defend a system, you need to be able to think like an attacker, and that includes understanding techniques that can be used to compromise security. However, using those techniques in the real world may violate the law or the university’s rules, and it may be unethical. Under some circumstances, even probing for weaknesses may result in severe penalties, up to and including expulsion, civil fines, and jail time. Our policy in the class is that you must respect the privacy and property rights of others at all times, or else you will fail the course.
Acting lawfully and ethically is your responsibility. Carefully read the Computer Fraud and Abuse Act (CFAA), a federal statute that broadly criminalizes computer intrusion. This is one of several laws that govern “hacking.” Understand what the law prohibits — you don’t want to end up like this guy. The EFF provides helpful advice on vulnerability reporting and other legal matters. If in doubt, we can refer you to an attorney.
Please review the Divison of Information Technology policies on responsible use of technology resources, as well as the code of student responsibility. As members of the university, you are required to abide by these policies.