. Literature survey :Write a survey paper on a topic of your choice such as Malware and fixes DDoS attack and defense techniques Elliptic curve cryptography inspired protocols/applications (e.g.,ECDSA) Differential privacy (e.g., centralized DP, distributed DP, local DP) Deep/machine learning security or privacyThe Literature Survey report should include the background, the state ofthe art (possibly comparing the current methods), and the future trend(preferably with your own opinion). The report should be at least 6 pages,12-pt font size, and single-column single-spaced. You can choose a different topic as shown in the pdf file. Project Description
If you are undergraduate student, you can team up (at most 2
students for 1 team) to finish your project. Each team member
needs to submit his/her report onto blackboard independently
(even with the same content).
If you are graduate student, you must finish your project by
yourself.
You will choose a topic from one of the following categories:
1. Literature survey
2. Technical paper review (If you choose this category, you must choose a
paper from the conferences or journals given below and within the specified
publication dates.)
3. Implementation
Sample topics of each category:
1. Literature survey (Undergraduate Students Only):
Write a survey paper on a topic of your choice such as
Malware and fixes
DDoS attack and defense techniques
Elliptic curve cryptography inspired protocols/applications (e.g.,
ECDSA)
Differential privacy (e.g., centralized DP, distributed DP, local DP)
Deep/machine learning security or privacy
The Literature Survey report should include the background, the state of
the art (possibly comparing the current methods), and the future trend
(preferably with your own opinion). The report should be at least 6 pages,
12-pt font size, and single-column single-spaced.
2. Technical paper review:
Review a security-related paper published between 2018 and now in any of
the following conferences or journals
IEEE Symposium on Security & Privacy (S&P, Oakland)
Network and Distributed System Security Symposium (NDSS)
ACM Computer and Communications Security (CCS)
USENIX Security Symposium
ACM Transactions on Information and System Security (TISSEC)
IEEE Transactions on Dependable and Secure Computing (TDSC)
IEEE Transactions on Information Forensics and Security (TIFS)
IEEE Journal on Selected Areas in Communications (JSAC)
(security/privacy related papers)
ACM SIGCOMM (security/privacy related papers)
AAAI Conference on Artificial Intelligence (AAAI, security and privacy
related papers)
Conference on Neural Information Processing Systems (NeurIPS,
security and privacy related papers)
International Conference on Machine Learning (ICML, security and
privacy related papers)
International Joint Conferences on Artificial Intelligence (IJCAI,
security and privacy related papers)
To download IEEE papers, go to www.ieeexplore.ieee.org and search for the
conference/journal proceedings.
To download ACM papers, go to http://portal.acm.org and search for the
conference proceedings/transactions.
To download NDSS papers, go to www.isoc.org/isoc/conferences/ndss and
search the proceedings. You may not be able to access these websites
outside UH.
The Technical Paper Review report should include the background, the
state of the art, discussions about technical details (e.g., contributions,
limitations, strengths, or weaknesses), discussions about performance
evaluation, and discussions about potential improvement (preferably with
your own opinion). The paper should be at least 5 pages, 12-pt font size, and
single-column single-spaced.
3. Implementation:
Measure and compare the time taken for encryption and decryption
using DES, 3DES and AES, with different input sizes. Analyze the
three algorithms and identify which component(s) made an algorithm
particularly fast/slow, weak/strong. You can implement your own
algorithms or use others’ implementation.
Implement the five modes (ECB, CBC, CFB, OFB, CNT) using any
block cipher of your choice (DES, AES, IDEA). Try to use repeated
message blocks in different input messages and see the resulting
ciphertext. Try also to swap the ciphertext blocks and see the
decrypted messages.
Reconstruct the simulations/experiments in a published prestigious
conference/journal research paper. The paper must be chosen from
the conferences or journals given above, i.e., conferences or journals
within the specified publication dates in Technical Paper Review
section.
You will write a report to show all your steps, results (you can copy screen),
analysis and conclusion. If you implement the algorithms on your own,
append your code to the report. If you use others’ implementation, cite the
sources.
The Implementation report should be at least 4 pages, 12-pt font size, and
single-column single-spaced (codes exclusive, i.e., codes are supposed to
be post as appendix, and cannot be accounted for the main body of the 4page report).
Your choice of topic is not limited to the sample topics I gave. You can
propose any topic that is related and interests you (subject to my approval)!
The deadline for submitting your final project is
11:59 PM Wednesday, May 5.