EE 595: Introduction to Security and Privacy
Course Project – Project Proposal
Assigned: Friday, March 30, 2018, Due: Thursday, April 19, 2018
Instructor: Tamara Bonaci
Department of Electrical Engineering
University of Washington, Seattle
The course project consists of several steps:
Selecting a security/privacy-related problem that you find interesting, would like to learn more about, or would like to provide a solution to.
Preparing an up-to-2-pages-long project proposal, where you will describe the problem that you plan to address.
Preparing an up-to-1-page-long progress report on the chosen project topic.
Preparing a 6-pages-long conference-style final project report.
Preparing a final presentation (you should plan a 10-minutes long presentation).
Initial Project Assignment
Your initial assignment is to prepare an up-to-2-pages-long Project Proposal, and to submit it through the course dropbox by 11:59pm on Thursday, April 19, 2018. With your proposals please include all reference papers you plan to use (please zip all reference papers together). We will review your proposals as quickly as possible, and will return the comments to you so that you can start working on the project.
Your proposal should include the following:
A clear description of a security/privacy-related problem that you are addressing. For example, if your project tries to address a specific attack (class of attacks) on some technology, you will likely want to include security analysis of that technology:
System: What it is, and how does it work?
Assets: What are you trying to protect (and why)? How valuable those assets are?
Adversaries: Who might try to attack the system, and why?
Vulnerabilities: How might the system be weak?
Threats: What actions might an adversary take to exploit vulnerabilities?
Risks: How important are the assets? How likely is an exploit?
Diagrams and pictures will be helpful, but are certainly not required.
2. If your project (also) focuses on addressing (preventing or mitigating) the described attack, please state (to the degree possible) how do you plan to do so. Some example questions you may want to answer:
• What broad category does your proposed solution fall into (i.e., cryptography, system redesign.)
• What are the expected benefits of the proposed solution?
• What are the known drawbacks of the solution?
Finally, for each of the papers that you are potentially referencing in your proposal, please provide a full title and list of authors.