Lectures
Please check this page regularly.
Lecture/ Date |
Topics |
Slides |
Week 1 (Aug 30) |
|
|
Week 2 (Sept 6) |
|
|
Week 3 (Sept 13) |
(Continue from Lecture 2 slide 7)
Secure Programming · Strings, · Pointer Subterfuge
(From Book: Secure Coding in C and C++)
|
|
Week 4 (Sept 20)
Rescheduled on Sept 23 |
Continue from previous week Secure programming: Dynamic Memory Management (From Book: Secure Coding in C and C++)
|
|
Week 5 (Sept 27) |
(Continue Lecture 5) Secure Programming Race Conditions, Integer Issues & Other Issues (From Books: Secure Coding in C and C++) Static & Dynamic Analysis (From Book: Secure Programming with Static Analysis & papers)
|
(Self-study: Read the chapter)
|
Week 6 (Oct 4) |
|
|
Week 7 (Oct 12) |
|
|
Week 8 (Oct 18) |
MIDTERM |
|
Week 9 (Oct 25) |
(Continue Lecture 10) Formal methods |
(Updated on Nov 8) |
Week 10 (Nov 1) |
(Continue Lecture 11) Blockchain (Kuheli Sai) Java Security |
|
Week 11 (Nov 8) |
(Continue remaining materials from Lectures 11-12) Heathcare Security and Privacy |
|
Week 12 (Nov 15) |
(Continue remaining part of Lecture 12, and 13) Presentation by Zhendong Wang (PhD student)
|
|
(Nov 22) |
Thanksgiving |
|
Week 13 (Nov 29) |
Presentation of Research Papers (Focus Area for papers: HEALTHCARE IT SECURITY)
1. Trust Enhanced Cloud Security for Healthcare Services
Presenter: Aashima Sharma Primary Reviewer: Akshay Parab Secondary Reviewer: Aneesh Sule 2. How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability Analysis
Presenter: Chi-Heng Hung Primary Reader: Emily Kauffman Secondary Reviewer: Yuanyuan Zhang 3. Cybersecurity of Healthcare IoT-Based Systems: Regulation and Case-Oriented Assessment Presenter: Shenghui Yang Primary Reader: Ashutosh Burde + Amar Alsaggaf Secondary Reviewer: Emily Kauffman 4. Towards Autonomic Security Management of Healthcare Information Systems Presenter: Andrew Lacey Primary Reviewer: Aravindhan Anbarasu Secondary Reviewer: Tushar Shetty 5. On the design of a Blockchain-based system to facilitate Healthcare Data Sharing Presenter: Yue Sun Primary Reviewer: Huiying Liu & Zhendong Wang Secondary Reviewer: Akshay Parab 6. A Secure Framework For Medical Information Exchange (MI-X) Between Healthcare Providers Presenter: Kuheli Sai Primary Reviewer: Aneesh Sule Secondary Reviewer: Aravindhan Anbarasu 7. Fitness Trackers: Fit for Health but Unfit for Security and Privacy Presenter: Yixiao Gao Primary Reviewer: Yuanyuan Zhang Secondary Reviewer: Huiying Liu + Amar Alsaggaf 8. A Patient Centered Cloud Platform for Mobile-Health Enabled Clinical Research Presenter: Haobing Huang Primary Reviewer: Tushar Shetty Secondary Reviewer: Ashutosh Burde & Zhendong Wang
|
8 Research Papers |
Week 14 (Dec 3) |
Presentation of Research Papers (Focus Area for papers: SQL/XSS)
1. Automatic Web Security Unit Testing: XSS Vulnerability Detection Presenter: Huiying Liu Reviewer 1: Kuheli Sai Reviewer 2: Yixiao Gao
2. Source Code Patterns of SQL Injection Vulnerabilities Presenter: Zhendong Wang Reviewer 1:Yue Sun Reviewer 2:Chi-Heng Hung 3. SWAP: Mitigating XSS Attacks using a Reverse Proxy Presenter: Aneesh Sule Reviewer 1: Emily Kauffman Reviewer 2: Aashima Sharma
4. Analysis of Effectiveness of Black-Box Web Application Scanners in Detection of Stored SQL Injection and Stored XSS Vulnerabilities Presenter: Ashutosh Burde Reviewer 1: Haobing Huang Reviewer 2: Shenghui Yang 5. Finding SQL Injection and Cross Site Scripting Vulnerabilities with Diverse Static Analysis Tools Presenter: Yuanyuan Zhang Reviewer 1: Andrew Lacey Reviewer 2: Emily Kauffman
6. Improving Web Application Firewalls to detect advanced SQL injection attacks Presenter: Akshay Parab Reviewer 1: Aashima Sharma Reviewer 2:Amar Alsaggaf
|
6 Research Papers |
Week 15 (Dec 3) |
Presentation of Research Papers (Focus Area for papers: HEALTHCARE IT SECURITY)
1. Developing a SSE-CMM-based Security Risk Assessment Process for Patient-Centered Healthcare Systems 2. Towards a Software Engineering Approach for Cloud and IoT Services in Healthcare 3. Security testing for Android mHealth apps 4. On Design of A Fine-Grained Access Control Architecture for Securing IoT-Enabled Smart Healthcare Systems Note: Project presentation/Demo should be arranged for this week.
|
|