Network Security Theory and Practice

College of Computer Science and Technology, Zhejiang University, Spring 2024
Monday 14:15 – 15:50, Wednesday 16:15 – 17:50, Room CW-103
Monday 16:15 – 17:50, Room CW-503

Requirements

1.  Proposal
    Browse the programs of recent S&P/SEC/CCS/NDSS/OSDI/SOSP/SIGCOMM/ISCA/MICRO/HPCA/ASPLOS conferences in the area of (network) security;
    Find a research topic on (network) security you are interested in;
    Read state-of-the-art papers as well as recent related papers in the preceding conferences;
    Discover their common limitations;
    Propose a feasible solution; [optional for proposal, encouraged for mid-term, must for wrapup]
2.  Report
    What is the research problem?
    Why is it important?
    How does the state of the art address it?
    Any limitations?
    What would you do? Learn from Research Patterns by Prof. Nick Feamster.
3.  Prototype
4.  Presentation

Grading: 40%

10% Wrapup Presentation
15% Demo
15%     Report: follow conference template and organization

Great Resources

How to Do Great Research, by Prof. Nick Feamster
How to Write a Great Research Paper, by Simon Peyton Jones
How to Give a Great Research Talk, by Simon Peyton Jones