Checkpoint first lecture.
This commit is contained in:
parent
073f19f40f
commit
21dd6cf9f2
|
@ -0,0 +1,127 @@
|
|||
---
|
||||
author: Advanced Topics in Security and Privacy (CS 839)
|
||||
title: Lecture 01
|
||||
date: September 05, 2018
|
||||
---
|
||||
|
||||
# Security and Privacy
|
||||
|
||||
## It's everywhere!
|
||||
|
||||
## Stuff is totally insecure!
|
||||
|
||||
## It's really difficult!
|
||||
|
||||
# What topics to cover?
|
||||
|
||||
## A really, really vast field
|
||||
- Things we will not be able to cover:
|
||||
- Real-world attacks
|
||||
- Computer systems security
|
||||
- Defenses and countermeasures
|
||||
- Social aspects of security
|
||||
- Theoretical cryptography
|
||||
- ...
|
||||
|
||||
## Theme 1: Formalizing S&P
|
||||
- Mathematically formalize notions of security
|
||||
- Rigorously prove security
|
||||
- Guarantee that certain breakages can't occur
|
||||
|
||||
> Remember: definitions are tricky things!
|
||||
|
||||
## Theme 2: Automating S&P
|
||||
- Use computers to help build more secure systems
|
||||
- Automatically check security properties
|
||||
- Search for attacks and vulnerabilities
|
||||
|
||||
## Our focus: four modules
|
||||
1. Differential privacy
|
||||
2. Applied cryptography
|
||||
3. Language-based security
|
||||
4. Adversarial machine learning
|
||||
|
||||
# Differential privacy
|
||||
|
||||
## A mathematically solid definition of privacy
|
||||
- Simple and clean formal property
|
||||
- Satisfied by many algorithms
|
||||
- Degrades gracefully under composition
|
||||
|
||||
# Applied crypto
|
||||
|
||||
## Computing in an untrusted world
|
||||
- Proving you know something without revealing it
|
||||
- Certifying that you did a computation correctly
|
||||
- Computing on encrypted data, without decryption
|
||||
- Computing joint answer without revealing your data
|
||||
|
||||
# Language-based security
|
||||
|
||||
## Ensure security by construction
|
||||
- Programming languages for security
|
||||
- Compiler checks that programs are secure
|
||||
- Information flow, privacy, cryptography, ...
|
||||
|
||||
# Adversarial machine learning
|
||||
|
||||
## Manipulating ML systems
|
||||
- Crafting examples to fool ML systems
|
||||
- Messing with training data
|
||||
- Extracting training information
|
||||
|
||||
# Tedious course details
|
||||
|
||||
## Class format
|
||||
- Three components:
|
||||
1. Paper presentations
|
||||
2. Final project
|
||||
3. Class participation
|
||||
- Annoucement/schedule/materials: on [website](https://pages.cs.wisc.edu/~justhsu/teaching/current/cs839/)
|
||||
- Class mailing list: [compsci839-1-f18@lists.wisc.edu]()
|
||||
|
||||
## Paper presentations
|
||||
- Sign up to lead a discussion on one paper
|
||||
- Suggested topic, papers, and schedule on website
|
||||
- Before each presentation:
|
||||
- I will send out brief questions
|
||||
- Please email me brief answers
|
||||
|
||||
> If you want advice, come talk to me!
|
||||
|
||||
## Final project
|
||||
- Work individually or in pairs
|
||||
- Project details and suggestions on website
|
||||
- Key dates:
|
||||
- **September 19**: Pick groups and topic
|
||||
- **October 15**: Milestone 1
|
||||
- **November 14**: Milestone 2
|
||||
- **End of class**: Final writeups and presentations
|
||||
|
||||
> If you want advice, come talk to me!
|
||||
|
||||
## Todos for you
|
||||
0. Complete the course survey
|
||||
1. Check out the course website
|
||||
2. Think about what paper you want to present
|
||||
3. Brainstorm project topics
|
||||
|
||||
# Defining privacy
|
||||
|
||||
## What does privacy mean?
|
||||
- Many meanings of privacy
|
||||
|
||||
## Why is privacy hard?
|
||||
|
||||
## Hiding private data
|
||||
- Remove "personally identifiable information"
|
||||
|
||||
## Problem: not enough
|
||||
|
||||
## "Blending in a crowd"
|
||||
|
||||
## Problem: composition
|
||||
|
||||
## Differential privacy
|
||||
|
||||
## Basic definition
|
Reference in New Issue