Assignments in this course will consist of research paper reading and presentations, reviews of presented papers, a course project, and one finals assignment. The course project can take the form of implementing an existing technique, using or extending an existing tool relevant to the scope of the cource, designing a new technique or application (must properly demonstrate security-related properties), or perform a literature review. Each project can be done individually or in teams of two (non-survey projects only).
All students are expected to participate in class discussions and perform all assignments regardless of the number of credit hours they are registered for.
Your instructor will treat you as a professional, and you should plan on conducting yourself in an appropriate way. No behavior that compromises academic honesty (such as use of someone else's work or code, using prohibited materials during tests, or making your work available to others) will be tolerated in this course. If you need assistance with anything, do not hesitate to contact the instructor.
It is expected that your work represents your own understanding of the problem. If work of others is used, it must be properly cited. Use of properly cited material is acceptable, but no referencing is treated as claiming the work as your own.
Academic dishonesty will not be tolerated in this course. It is the CSE policy that each case of academic integrity violation is recorded. The standing policy of the department is that all students involved in an academic integrity violation will receive an F grade for the course, unless the instructor recommends a lesser penalty for the first instance of academic integrity violation for the student in question.
Information about the CSE policies can be found here; UB academic integrity policies are available here; and UB graduate school guidelines can be found here.
Sample publications in IoT security and privacy:
Date | Class content |
Week 1: September 3 | |
Week 2: September 10 | IoT security survey Presented by Min and Matt |
Week 3: September 17 | IoT security survey Presented by Winston and Aditya |
Week 4: September 24 | IoT privacy |
Week 5: October 1 | IoT smart cities security survey |
Week 6: October 8 | Vehicle authentication |
Week 7: October 15 | Smart grid authentication |
Week 8: October 22 | RUFs |
Week 9: October 29 | RFID security and privacy
|
Week 10: November 5 | RFID/PUF, black SDN |
Week 11: November 12 | Remote attestation |
Week 12: November 19 | Privacy-preserving smart metering |
Week 13: November 26 | Thanksgiving |
Week 14: December 3 | Project presentations |
Week 15: December 10 | Project presentations |