CSCI 680: Computer Architecture Security, Fall 2021
General Information
- Time and location: Tue, Thu 12:30 pm – 1:50 pm, Washington Hall 219
- Instructor: Dmitry Evtyushkin (Personal Website)
- Office hours: Tue, Thu 2:00 – 3:30 pm, or by appointment
- Email: devtyushkin@wm.edu
- Deadlines: Add/Drop: Sept 10, Withdraw: Nov 1, Project proposal submission: Oct 1, Project final report: Finals week
- Final exam: Mon, Dec 13, 2021 9:00 – 11:00 AM
- Please keep checking this website for the latest information regarding the course.
Prerequisites
Students are expected to have a good understanding of computer organization basics, operating systems principals and programming.
Course Materials
Lecture slides will be posted on Blackboard. Links to research papers used in this course will be posted on course’s website.
Recommended books:
- “COMPUTER SECURITY A Hands-on Approach” by Kevin Du
- Understanding Cryptography: A Textbook for Students and Practitioners by Christof Paar
Other useful books:
- Hacking: The Art of Exploitation by Jon Erickson
- Applied Cryptography by Bruce Schneier
- Security in Computing by Charles P. Pfleeger and Shari Lawrence Pfleeger
Course Description
This course provides an overview of emerging security challenges in computer systems. Recent attacks such as Spectre, Meltdown, Rowhammer and others are discussed in this course. The goal of the course is to provide an in-depth perspective on why these attacks are made possible, what features of computer systems can introduce new attack vectors, how to protect against know attacks and how to design safe computer systems. A range of top-tier conference papers are discussed to understand the important research challenged in computer architecture security. Students are expected to participate in discussions and give an in-class presentation. Students will be evaluated via various assignments and a written examination.
Grade Distribution
- Project – 40pt
- In-class presentations – 30pt
- Paper critiques – 10pt
- Final exam – 20pt
- Discussion participation – 10pt
General Information
- Participate in class! You earn points for in-class activity!
- Lecture slides from the instructor will be uploaded to Blackboard/Piazza
- Critique are submitted via email, homeworks are submitted via Blackboard
- Project proposal and final project report via email to the instructor
Paper Critiques and Homeworks
Instructions for paper critiques:
All students are required to submit a detailed critique for paper presented in class. Student presenting a paper does not need to submit a critique. Critiques must be submitted before the beginning of class in which the paper is discussed.
Submission Format:
Each critique should not exceed one-page and must consist of four sections:
- Paper summary (2-3 lines)
- Strengths (2-3 lines), what you liked about the paper
- Weaknesses (2-3 lines), what you did not like
- Detailed comments (rest of the page) explaining your points
In-Class Presentations
Each student will present two papers throughout the semester. If you plan to audit the course, you are required to present at least one paper. When you present a paper, be prepared to answer a variety of questions asked by the instructor and fellow students. The goal is to make class lively. A list of papers will be provided to students. Students will be allowed to choose papers from the list or suggest other papers. Suggested papers need to be approved by the instructor.
Semester-Long Research Project
Registered students are expected to perform a semester-long research project. If you audit the class, the project is optional. All projects need to be approved by the instructor. Please contact the instructor early to brainstorm potential project ideas. Projects are expected to demonstrate novelty. A limited list of topics will be announced by the instructor. However, students are encouraged to choose a topic of their interest. The topic needs to overlap with a broader definition of computer architecture security. Remember, the key to successful project is making steady progress and starting early, not trying to finish your project the night before the deadline.
You can form teams of two students to work on the project. If you choose to do that, explain in your final report what part of the project was done by each student. Multiple students can work on same topic independently.
Project Timeline
Project determination:
Please send an email to the instructor before the deadline containing:
- Project Name (think of this as your paper/report title)
- Problem Statement
- Expected Steps (setting up infrastructure, implementation, performing experiment, data analyses, etc.)
- Expected/possible outcome and contribution
Final Project Presentation
You are expected to present your results in class at the end of semester. Focus on your results you achieved and conclusions.
Final report
Please submit your final report via email your final project report in PDF format. Please use the ACM sigconf format. The PDF should have following sections:
- Problem Statement
- Introduction (with problem statement)
- Threat model (clearly explain all your assumptions)
- Background and Related Work
- Implementation Details
- If you are proposing some security solution, include a security analyses section
- Results
- Conclusions
If you need any help with the project or have any questions, contact the instructor during office hours. If you require access to computational resources or any specific hardware, talk to the instructor.
Exams
Students will be asked to take a Final exam.
Semester Schedule
Tentative schedule. Please watch for updates!
Week | Date | Topic | Reading |
---|---|---|---|
1 | Thu, Sep 2, 21 | Introduction to the Course | |
2 | Tue, Sep 7, 21 | Security Model, Intro | |
Thu, Sep 9, 21 | Security Model, Intro | ||
3 | Tue, Sep 14, 21 | Cryptography Intro I | |
Thu, Sep 16, 21 | Cryptography Intro II | ||
4 | Tue, Sep 21, 21 | Cryptography Intro III | |
Thu, Sep 23, 21 | Cryptography Intro IV | ||
5 | Tue, Sep 28, 21 | Timing Attacks and Side Channel Attacks I | |
Thu, Sep 30, 21 | Timing Attacks and Side Channel Attacks II | ||
6 | Tue, Oct 5, 21 | Speculative Execution Attacks I | |
Thu, Oct 7, 21 | Speculative Execution Attacks II | ||
7 | Tue, Oct 12, 21 | Speculative Execution Attacks III | |
Thu, Oct 14, 21 | Attacks using other CPU components | ||
8 | Tue, Oct 19, 21 | Fall Break | |
Thu, Oct 21, 21 | Performing computations using CPU microarchitecture | ||
9 | Tue, Oct 26, 21 | Protections againts microarchitectural attacks | |
Thu, Oct 28, 21 | Isolated execution enviroments | ||
10 | Tue, Nov 2, 21 | Phisically unclonable functions | |
Thu, Nov 4, 21 | Rowhammer and attacks on Memory I | ||
11 | Tue, Nov 9, 21 | Rowhammer and attacks on Memory II | |
Thu, Nov 11, 21 | Fault Injection Attacks | ||
12 | Tue, Nov 16, 21 | Paper Presentation | |
Thu, Nov 18, 21 | Paper Presentation | ||
13 | Tue, Nov 23, 21 | Paper Presentation | |
Thu, Nov 25, 21 | Thanksgiving Break | ||
14 | Tue, Nov 30, 21 | Paper Presentation | |
Thu, Dec 2, 21 | Paper Presentation | ||
15 | Tue, Dec 7, 21 | Paper Presentation | |
Thu, Dec 9, 21 | Overview | ||
Mon, Dec 13, 2021 | Final Exam |
Helpful Services
Students wanting to improve their academic writing or teaching/presenting skills should consider taking GRAD 520: ACADEMIC WRITING and GRAD 550: COLLEGE TEACHING. The courses are offered through the Reves Center and are aimed at non-native English speakers, specifically. If interested please contact Glosson, Sarah G at sgglos@wm.edu.
The Writing Resources Center (WRC) can help when students have questions about how to construct an argument, deliver a presentation, use and cite sources, and more. Please visit the WRC website to request a class visit, tour, or brochures. The Writing Resources Center, located on the first floor of Swem Library, is a free service provided to W&M students. Trained consultants offer individual assistance with writing, presentation, and other communication assignments across disciplines and at any stage, from generating ideas to polishing a final product.
Academic Accommodations
It is the policy of The College of William and Mary to accommodate students with disabilities and qualifying diagnosed conditions in accordance with federal and state laws. Any student who feels s/he may need an accommodation based on the impact of a learning, psychiatric, physical, or chronic health diagnosis should contact Student Accessibility Services staff at 757-221-2512 or at sas@wm.edu to determine if accommodations are warranted and to obtain an official letter of accommodation. For more information, please click here.
Honor Code
Students are required to follow the Honor System of the College of William and Mary.