From dadfa9b82670f651bd2952b331818edd931621d3 Mon Sep 17 00:00:00 2001 From: Justin Hsu Date: Sun, 3 Jun 2018 20:20:59 -0400 Subject: [PATCH] Update syllabus. --- syllabus.md | 33 +++++++++++++++++---------------- 1 file changed, 17 insertions(+), 16 deletions(-) diff --git a/syllabus.md b/syllabus.md index 9233173..9b603d2 100644 --- a/syllabus.md +++ b/syllabus.md @@ -16,26 +16,27 @@ covered. Adversarial ML (what happens to ML algorithms in the presence of adversaries?) will be also be discussed. List of some topics that we will cover (obviously not complete) are given below. -Software Security - - Secure information flow - - Finding vulnerabilities - - Defensive measures and mitigations - Differential Privacy - - Basic mechanisms - - Local Differential Privacy +- Basic properties and examples +- Advanced mechanisms +- Local Differential Privacy Cryptographic Techniques - - Zero-knowledge proofs - - Secure multi-party computation - - Verifiable computation +- Zero-knowledge proofs +- Secure multi-party computation +- Verifiable computation + +Language-based Security +- Secure information flow +- Differential privacy +- Symbolic cryptography Adversarial Machine Learning - - Training-time attacks - - Test-time attacks - - Model theft attacks +- Training-time attacks +- Test-time attacks +- Model-theft attacks Grading will be based on three components: - - Reading research papers and writing reviews - - Homeworks - - Class project +- Reading research papers and writing reviews +- Homeworks +- Class project