This course aims to engage in critical discussion around key research topics in threat detection and forensics analysis. This course will cover: system auditing, vulnerability management, ML-based threat detection, forensic investigation via data provenance techniques, threat alert triage, and incident response. Students will be required to study published research papers from top-tier academic venues in computer security and cyber forensics. Why take this course?: You are interested in learning the fundamental principles of audit logging, threat detection, vulnerability finding/defense, cyber attack triage, and forensic analysis. You want to read cutting-edge research publications on these topics. There is ample scope to publish in this area. This course can prepare you to conduct research in threat detection and cyber attack forensics.
Professors |
Wajih Ul Hassan (hassan@virginia.edu) Office hours: Monday 3:30PM – 4:30PM and by appointment Office: Rice Hall 522 |
TA |
Faysal Hossain Shezan (fs5ve@virginia.edu) Office hours: Thursday 2:00PM - 3:00 pm over Zoom (link). |
Lectures |
Mon/Wed: 2:00pm – 3:15pm Olsson Hall 005 |
Prerequisites | No formal prerequisites. Some background in computer security and operating systems (e.g., equivalence of CS4630 and CS4414) will be helpful. |
Communications |
We will make use of the following communication methods during this course: |
Schedule/Paper Signup | Link |
Class Participation | 10% | You will read two research papers for each class. After paper presentation, we will discuss the strengths, weaknesses, scope, and future research areas related to the paper. Please try to attend the class discussions and be prepared to make substantive intellectual contributions. Participation on Piazza discussions will also be considered towards this grade. |
Paper Reviews | 10% | We will read two papers per class. You are required to submit one review per class read at the beginning of class. You can email me paper reviews at hassan@virginia.edu . Please include the subject line [CS6501] in the email. |
Paper Presentations | 20% | Students will present research papers and lead the ensuing class discussion. The number of presentations required will be determined by the number of student enrolled in the course. |
Course Project | 60% | Students will conduct a major research project in the area of system security, with the chief deliverable being a conference-style paper at the end of the semester. Project topics will be discussed in class after the introductory material is completed. Projects teams may include groups of up to 2 students; however, groups of greater size will be expected to make greater progress. The instructors will advise each team/individual independently as needed. The project grade will be a combination of grades received for a number of milestone artifacts and the final conference-quality report. |
Your course project should address an important, interesting open problem related to system security. I'm happy to discuss your project ideas individually and help you refine them.
Give a 7 minutes presentation explaining the problem you want to work on, the most important related work, and your tentative approach. This will be an early opportunity to get feedback from the class. You should use this template for presentation (link).
Your proposal should consist of a 2–3 page description of your project that includes the following:
Upload your proposal to Collab.
Each group will give an in-class presentation about the status of their project. You'll have 7 minutes to speak. This presentation includes:
Each group will give an in-class presentation about the status of their project, in the style of a brief conference talk. These will be rapid fire talks; you'll have 12 minutes to speak. This presentation includes:
Your group's final project report should be written in the style of a workshop or conference submission, like most of the papers we have read this semester. Please include at least the following:
See also: Advice on writing technical articles.
The length of your report should not exceed 6 typeset pages, excluding bibliography and well-marked appendices. There is no limit on the length of appendices, but graders are not required to read them. The text must be formatted in two columns, using 10 point Times Roman type on 12 point leading, in a text block of 6.5” by 9”. I strongly encourage you to use LaTeX and the USENIX template files, and Overleaf might be a helpful collaboration platform.
Students are expected to be familiar with the university honor code, including the section on academic fraud (http://honor.virginia.edu/academic-fraud).
The University of Virginia strives to provide accessibility to all students. If
you anticipate or experience any barriers to learning in this course, please
feel welcome to discuss your concerns with us.
If you require an accommodation to fully access this course, please
contact the Student Disability Access Center (SDAC) at (434) 243-5180 or
sdac@virginia.edu. If you are unsure if you require an accommodation, to
request official accommodations, or to learn more about their services, you
may contact the SDAC at the number above or by visiting their website at
http://sdac.studenthealth.virginia.edu.
If you have already been approved for accommodations through SDAC,
please make sure to send us your accommodation letter and meet with us
so we can develop an implementation plan together
Students who wish to request academic accommodation for a religious observance should submit their request to the instructors by email as far in advance as possible. If you have questions or concerns about your request, you can contact the University's Office for Equal Opportunity and Civil Rights (EOCR) at UVAEOCR@virginia.edu or 434-924-3200. Accommodations do not relieve you of the responsibility for completion of any part of the coursework you miss as the result of a religious observance.
The University of Virginia is dedicated to providing a safe and equitable learning environment for all students. To that end, it is vital that you know two values that the University and I hold as critically important:
This course includes topics related to computer security and privacy. As part of this investigation, we may cover technologies whose abuse could infringe on the rights of others. As computer scientists, we rely on the ethical use of these technologies. Unethical use includes circumvention of an existing security or privacy mechanisms for any purpose, or the dissemination, promotion, or exploitation of vulnerabilities of these services. Any activity outside the letter or spirit of these guidelines will be reported to the proper authorities and may result in dismissal from the class and possibly more severe academic and legal sanctions.
I trust every student in this course to fully comply with all of the provisions of the University’s Honor Code. By enrolling in this course, you have agreed to abide by and uphold the Honor System of the University of Virginia, as well as the following policies specific to this course.