Apr 23, 2016 by
a file upload
Apr 6, 2016 at 9pm - Apr 30, 2016 at 11:59pm
This assignment was locked Apr 30, 2016 at 11:59pm.
EE 595: Course Project – Initial Project Assignment
Assigned: Wednesday, April 6, 2016, Due: Saturday, April 23, 2016
Instructor: Tamara Bonaci
Department of Electrical Engineering University of Washington, Seattle
The course project consists of several steps:
Selecting a security/privacy-related problem that you find interesting, would like to learn more about, or would like to provide a solution to.
Preparing a up-to-2-pages-long project proposal, where you will describe the problem that you plan to address.
Preparing a single page progress report on the chosen project topic.
Preparing a 6-pages-long conference-style final project report.
Preparing a final presentation (you should plan a 10-minutes long presentation).
Initial Project Assignment
Your initial assignment is to prepare a up-to-2-pages-long Project Proposal, and to submit it through the course dropbox by Saturday, April 23, 2016. With your proposals please include all reference papers you plan to use (zip all documents together). I will review your proposals as quickly as possible, and will return the comments to you so that you can start working on the project.
Your proposal should include the following:
A clear description of a security/privacy-related problem that you are addressing. For example, if your project tries to address a specific attack (class of attacks) on some technology, you will likely want to include security analysis of that technology:
• System: What it is, and how does it work?
• Assets: What are you trying to protect (and why)? How valuable those assets are? • Adversaries: Who might try to attack the system, and why?
• Vulnerabilities: How might the system be weak?
• Threats: What actions might an adversary take to exploit vulnerabilities?
• Risks: How important are the assets? How likely is an exploit?
Diagrams and pictures will be helpful, but are certainly not required.
If your project (also) focuses on addressing (preventing or mitigating) the described attack, please state (to the degree possible) how do you plan to do so. Some example questions you may want to answer:
• What broad category does your proposed solution fall into (i.e., cryptography, system redesign.) • What are the expected benefits of the proposed solution?
• What are the known drawbacks of the solution?
Finally, for each of the papers that you are potentially referencing in your proposal, please provide a full title and list of authors.
You've already rated students with this rubric. Any major changes could affect their assessment results.