From 21dd6cf9f2b0feb8d08dcbdcc667441a6ad89572 Mon Sep 17 00:00:00 2001 From: Justin Hsu Date: Tue, 4 Sep 2018 00:02:03 -0500 Subject: [PATCH] Checkpoint first lecture. --- website/docs/resources/slides/lecture01.md | 127 +++++++++++++++++++++ 1 file changed, 127 insertions(+) create mode 100644 website/docs/resources/slides/lecture01.md diff --git a/website/docs/resources/slides/lecture01.md b/website/docs/resources/slides/lecture01.md new file mode 100644 index 0000000..a5dda20 --- /dev/null +++ b/website/docs/resources/slides/lecture01.md @@ -0,0 +1,127 @@ +--- +author: Advanced Topics in Security and Privacy (CS 839) +title: Lecture 01 +date: September 05, 2018 +--- + +# Security and Privacy + +## It's everywhere! + +## Stuff is totally insecure! + +## It's really difficult! + +# What topics to cover? + +## A really, really vast field +- Things we will not be able to cover: + - Real-world attacks + - Computer systems security + - Defenses and countermeasures + - Social aspects of security + - Theoretical cryptography + - ... + +## Theme 1: Formalizing S&P +- Mathematically formalize notions of security +- Rigorously prove security +- Guarantee that certain breakages can't occur + +> Remember: definitions are tricky things! + +## Theme 2: Automating S&P +- Use computers to help build more secure systems +- Automatically check security properties +- Search for attacks and vulnerabilities + +## Our focus: four modules +1. Differential privacy +2. Applied cryptography +3. Language-based security +4. Adversarial machine learning + +# Differential privacy + +## A mathematically solid definition of privacy +- Simple and clean formal property +- Satisfied by many algorithms +- Degrades gracefully under composition + +# Applied crypto + +## Computing in an untrusted world +- Proving you know something without revealing it +- Certifying that you did a computation correctly +- Computing on encrypted data, without decryption +- Computing joint answer without revealing your data + +# Language-based security + +## Ensure security by construction +- Programming languages for security +- Compiler checks that programs are secure +- Information flow, privacy, cryptography, ... + +# Adversarial machine learning + +## Manipulating ML systems +- Crafting examples to fool ML systems +- Messing with training data +- Extracting training information + +# Tedious course details + +## Class format +- Three components: + 1. Paper presentations + 2. Final project + 3. Class participation +- Annoucement/schedule/materials: on [website](https://pages.cs.wisc.edu/~justhsu/teaching/current/cs839/) +- Class mailing list: [compsci839-1-f18@lists.wisc.edu]() + +## Paper presentations +- Sign up to lead a discussion on one paper +- Suggested topic, papers, and schedule on website +- Before each presentation: + - I will send out brief questions + - Please email me brief answers + +> If you want advice, come talk to me! + +## Final project +- Work individually or in pairs +- Project details and suggestions on website +- Key dates: + - **September 19**: Pick groups and topic + - **October 15**: Milestone 1 + - **November 14**: Milestone 2 + - **End of class**: Final writeups and presentations + +> If you want advice, come talk to me! + +## Todos for you +0. Complete the course survey +1. Check out the course website +2. Think about what paper you want to present +3. Brainstorm project topics + +# Defining privacy + +## What does privacy mean? +- Many meanings of privacy + +## Why is privacy hard? + +## Hiding private data +- Remove "personally identifiable information" + +## Problem: not enough + +## "Blending in a crowd" + +## Problem: composition + +## Differential privacy + +## Basic definition