Courses

Information Security
Subject associations
COS 432 / ECE 432

Course goals: learn how to design a secure system, probe systems for weaknesses, write code with fewer security bugs, use crypto libraries correctly, protect (or breach!) privacy, and use your powers ethically. Main topics: basic cryptography, system security, network security, firewalls, malware, web security, privacy technologies, cryptocurrencies, human factors, physical security, economics, and ethics of security.

Instructors
Maria Apostolaki
Spring 2024
Information Security
Subject associations
COS 432 / ECE 432

Course goals: learn how to design a secure system, probe systems for weaknesses, write code with fewer security bugs, use crypto libraries correctly, protect (or breach!) privacy, and use your powers ethically. Main topics: basic cryptography, system security, network security, firewalls, malware, web security, privacy technologies, cryptocurrencies, human factors, physical security, economics, and ethics of security.

Instructors
Maria Apostolaki
Prateek Mittal
Spring 2023
Special Topics in Information Sciences and Systems: Security and Performance Challenges in Networked Systems
Subject associations
ECE 539B / COS 597P

Multiple services we use every day, from Zoom to cryptocurrency wallets, rely on large-scale networked systems. These systems consist of a complex series of interdependent components and control algorithms, which make their management particularly challenging. In effect, we often observe disturbances such as cross-layer security vulnerabilities and unpredictable interferences across seemingly independent applications. In this course we revisit a few fundamental network topics (such as routing, monitoring, and congestion avoidance) aiming at revealing and addressing their performance and security implications.

Instructors
Maria Apostolaki
Fall 2023
Special Topics in Information Sciences and Systems: Security and Performance Challenges in Networked Systems
Subject associations
ECE 539B

Multiple services we use every day, from Zoom to cryptocurrency wallets, rely on large-scale networked systems. These systems consist of a complex series of interdependent components and control algorithms, which make their management particularly challenging. In effect, we often observe disturbances such as cross-layer security vulnerabilities and unpredictable interferences across seemingly independent applications. In this course we revisit a few fundamental network topics (such as routing, monitoring, and congestion avoidance) aiming at revealing and addressing their performance and security implications.

Instructors
Maria Apostolaki
Fall 2022