18
Georgia Tech Information Security Center (GTISC) CS 8803 - Cellular and Mobile Network Security: Class Projects Professor Patrick Traynor 8/30/2012

Lecture03 Projects

Embed Size (px)

DESCRIPTION

Lectures

Citation preview

Page 1: Lecture03 Projects

Georgia Tech Information Security Center (GTISC)

CS 8803 - Cellular and Mobile Network Security:

Class Projects

Professor Patrick Traynor8/30/2012

Page 2: Lecture03 Projects

Georgia Tech Information Security Center (GTISC)

What’s the Difference?

• What is the difference between an BS, MS and PhD?

‣ How many points do you need to draw a line?

• This is a graduate class, so your best effort is not just required, it is expected.

• The work that you do here needs to have the goal of becoming publishable.

‣ Fine fine... how the heck do you do that??

2

Page 3: Lecture03 Projects

Georgia Tech Information Security Center (GTISC)

Projects

• Lots of questions have been sent to me via email in regards to the course project.

‣ “Please tell me a project that I can do”

‣ It’s not as easy as that.

• “This is going to be a hard course”

• You need to be creative!

‣ Graduate students need to be able to identify and solve problems

‣ Simply building someone else’s idea is not going to cut it.

3

Page 4: Lecture03 Projects

Georgia Tech Information Security Center (GTISC)

What is research?

• Which activities are research?

‣ Designing a new protocol?

‣ Building an implementation of a protocol?

‣ Measuring the cost of the protocol?

‣ Formally evaluating the correctness of a protocol?

‣ Developing methods of implementing/evaluating a protocol?

4

Page 5: Lecture03 Projects

Georgia Tech Information Security Center (GTISC)

What is not research?

• Arguing the quality of a protocol?

• Arguing the appropriateness of a protocol?

• Surveying a field?

• Illustrating a limitation of a common practice or system?

5

Page 6: Lecture03 Projects

Georgia Tech Information Security Center (GTISC)

A Cynical Definition

• That which counts on your vita... is research.

• The hardest thing about a PhD is figuring out what “research” is...

6

Page 7: Lecture03 Projects

Georgia Tech Information Security Center (GTISC)

Research vs. Engineering

• Novelty...

• Importance... (sort of)

• Discovering a new fact or idea

• Engineering is often harder than research

• One must be careful to understand the difference

7

Page 8: Lecture03 Projects

Georgia Tech Information Security Center (GTISC)

Research vs. Opinion

• Arguing a position is not research unless it uncovers some new thought or methodological device.

‣ Difference is very subtle

• Experts will often produce manifesto about an area

‣ E.g., Ten Risks of PKI: What You’re Note Being Told About Public Key Infrastructure. C. Ellison and B Schneier, Computer Security Journal, v 16, n 1, 2000, pp 1-7.

• The key here is that they are experts and have the bona fides to make such an argument.

• This is not research

8

Page 9: Lecture03 Projects

Georgia Tech Information Security Center (GTISC)

Why is there so much bad research?

• Most papers (90+%) I encounter are bad -- for one or more of the following reasons. The authors ...

‣ ...don’t formulate the problem well (or at all).‣ ...don’t motivate the problem well (or at all).‣ ...address an unimportant or moot problem.‣ ...are not familiar with the breadth or depth of the area.‣ ...do not discuss important related work.‣ ...do not have a coherent solution or it does not solve the problem.‣ ...do not have a coherent or appropriate methodology.‣ ...do not apply the methodology well.‣ ...do not draw the correct conclusions from the results.‣ ...do not present the work well enough to be understandable.‣ ...do not articulate the impact/take away.

• Any paper failing to do any of these things is a failure.

9

Page 10: Lecture03 Projects

Georgia Tech Information Security Center (GTISC)

Security Research

• Can be as diverse as computer science itself

‣ Systems design‣ Formal analysis‣ Programming languages‣ Hardware design‣ Software engineering‣ Human Computer Interfaces‣ Networking...

• Some are specific to security

‣ Cryptography‣ Secure protocol design‣ Security policy

10

Page 11: Lecture03 Projects

Georgia Tech Information Security Center (GTISC)

Idea Formulation

• The essential part of successful research is picking good problems and solutions.

‣ If it is so easy, just jump in...

11

Page 12: Lecture03 Projects

Georgia Tech Information Security Center (GTISC)

Idea Formulation (cont)

• Good approaches to finding ideas:

‣ Read lots of papers in a particular area you think is interesting‣ Read the newspaper and figure out what problems people have‣ Read slashdot and learn about new emerging technology.• ...but ignore the vast majority of user comments

• Then as the following questions (write down answers)

‣ What are the problems that this area asks?‣ What methodological tools are people using to address

problems in this area?‣ How do your set of skills apply to these problems?‣ How is the field evolving?‣ How are expected changes in the larger computer science

community going to affect the known problems and solutions?

12

Page 13: Lecture03 Projects

Georgia Tech Information Security Center (GTISC)

Hammers

• How do you solve problems?

‣ Are you an expert in performance analysis? Formalism? Are you a policy specialist? Complexity reductions? Simulation master? Are you a systems builder? Interested in static analysis?

• Understand what techniques are being used in each area so that:

‣ You can speak the language of that sub-community.

‣ You can understand the shortcomings of their methods and bring in your own “hammers”

13

Page 14: Lecture03 Projects

Georgia Tech Information Security Center (GTISC)

Idea Formulation - Jumbles

• Do the following exercise:

‣ (5 minutes) Take four pieces of paper out of the bag being passed around and come up with as many paper titles as you can.• This is not an outline, there is no ordering.• Use your imagination!• Creativity is the essence of this exercise (don’t overthink)• Some of the list will be nonsense - do not filter thoughts!

‣ Example: If I got “Web 2.0” and “Location”, I might come up with the following (just a start):• “Large-scale Localization of Users based on Social Network Group

Behaviors”, “The Impact of Web 2.0 on Network Stability”, “The Leakage of Private Information from Web 2.0 Applications”.

• Of course, this is general - focus your thoughts specifically on the paper• e.g., better algorithm than the authors -- use graph theory

14

Page 15: Lecture03 Projects

Georgia Tech Information Security Center (GTISC)

Idea Formulation - Articles

• Read the following article.

• Speed is the key - not deep understanding.

• When you finish, write down the words that come into your mind.

‣ Things you saw in the article

‣ Words or phrases that arose from these words

‣ A Paper Title

• This is stream of consciousness - there are no right or wrong answers, and grammar does not count.

15

Page 16: Lecture03 Projects

Georgia Tech Information Security Center (GTISC)

Notes on Authorship

• This is the most dangerous part of publishing. This has led to very serious rifts in the profession...

‣ Make sure that anyone involved knows the policy (what one needs to do to be an author) the expectations and the repercussions of not participating as expected.

• Ordering matters in some fields (systems), not in others(math).

• Make sure everything is clear to everyone before getting started.

‣ I know of best friends who no longer speak to each other.

‣ A paper is never worth that kind of heartache, but people will surprise you.

‣ Do you have a policy and what is it?16

Page 17: Lecture03 Projects

Georgia Tech Information Security Center (GTISC)

Teams, Ideas, etc

• Students must form into groups of 2 with the expectation of creating a publishable work by the end of the semester.

‣ I expect more from groups than individuals.

‣ Graduate students are all considered to be at the same level - PhD.

‣ Undergrads can focus more on an application, but are highly encouraged to join a team with graduate students.

• Having a publication before grad school/the real world is a big plus on your resume.

• You must come together as a group and pick a project.

17

Page 18: Lecture03 Projects

Georgia Tech Information Security Center (GTISC)

Idea Assignment: 9/18/12

• Everyone has 5 minutes to present idea (3 slides)

‣ Area

‣ Problem

‣ Related Works

‣ Solution

‣ Methodology

‣ Expected Results

‣ Expected Take Away

• Everyone should practice timing and presentation. If the idea is not appropriate (tough love), or you don’t finish in 5 minutes, you will do it again next class.

18

Slide 1}} Slide 2

} Slide 3