ICS 355: Security and Trust I - Basic Concepts


As social, economic and political processes propagate through computational networks, computational processes have ever broader social, economic and political repercussions. This makes security into one of the central problems of computer science.

While traditional sciences are concerned with truth, as confirmed by experiments, modern sciences are increasingly also concerned with lying and deceit, as enabled, implemented, countered, and prevented through network computation. Security Science gathers methods and results of research into adversarial computation. The goal of this introductory course is to familiarize students with the emerging foundations of this new science, and to prepare future computer scientists for its rapidly evolving applications.

About this course:

  • Lecturer: Peter-Michael Seidel
      • Lectures and practica:
        • Time: MW 10:30-11:45 AM
        • Place: Holmes 211
        • Office hours: Wed 12:30 – 2:00, or by appointment.

        Lecture notes and slides

      • Introduction: note, slides
      • Resource security – static part: note, slides
      • Resource security – dynamic part: note, slides
      • Channel security: note, slides
      • Privacy: slides

        Practica and homeworks are distributed through Laulima