Description

The deep and pervasive embedding of computational intelligence into society has led to the emergence of computing systems that tightly couple software with the physical and human world. Driving exciting applications such as autonomous vehicles, smarthomes, and mobile health, these computing systems are variously referred to as Embedded Systems, Cyber-Physical Systems, Internet-of-Things etc. With their tight and often real-time interaction with physical spaces and human agents, these computing systems which are resource constrained, networked and remote, suffer from a much more expanded set of security and privacy vulnerabilities and consequences than traditional computers. Examples include compromise of system state via adversarial manipulation of physical sensor signals and actuator actions, and unauthorized inferencing of private inference by authorized recipients of from high-dimensional sensor data. The course will examine attacks that such systems are vulnerable to, and emerging solution techniques spanning algorithms, software, and hardware.

General Information

Lectures
TuTh 4:00PM-5:50PM @ Boelter Hall 5264
Office Hours
Tu 6:00PM-7:00PM & Fr 5:00PM-6:00PM @ Boelter Hall 6730E
Book
Loukas, George. Cyber-physical attacks: A growing invisible threat. Butterworth-Heinemann, 2015.
http://www.sciencedirect.com/science/book/9780128012901
 (free access via UCLA campus network)

Announcements

Revised project presentation schedules
3/20/18 2:46 PM

Hi Everyone:

Below are the updated project presentation slots for those who responded to the Doodle poll.

Thanks so much for responding!

Tue 430    Hui+Wenxuan+Yifan

Tue 515    EunSun+Kevin+Leon

Wed 330   Aadithya+Nrithya

Wed 415   Asitha+Ben

Thu 200    Ahmed+Eugene

Thu 330    Cong+George

Thu 415    Nathan+Priscilla

Fri 200     Yaying+Yueyang

Fri 245     Haoming+Liang

Fri 330     Weikun+Zhengshuang

Fri 415    Boyang+Xuerui

Latest schedule also at: https://docs.google.com/spreadsheets/d/1O3W3ITYMOyUwImbTbovJezCFb2K_acKMSdkE1H6uGXQ/edit?usp=sharing

Mani

#pin

IMPORTANT: Afternoon slots open for project presentations
3/20/18 12:26 PM

Hi All:

I just got released from the jury duty (nothing like a gift of

time!), which means we can do project presentations during

more sane hours than the evening slots. 

So I've created a Doodle poll with a bunch of afternoon time slots

for rest of this week as well as some for this afternoon as well.

Please indicate your availability (as many slots as you can) ,

and I'd try my best to generate a better schedule.

https://doodle.com/poll/89tqb7km25vzwv6h

In particular, for personal reason, I'd really appreciate if those of

you scheduled for this evening and Thursday evening could

select afternoon slots - this will allow me attend some

events that I was missing previously. But not a big deal

if you can't.

I'd need your responses soon... 

Mani

#pin
Paper assignments for presentations on Feb 6, 8, and 13
1/30/18 2:09 PM

Hi Everyone:

I've put paper assignments for Feb 6, 8, and 13 in the google docs.

There is no paper presentation this Thu Feb 1, and also there will

not be any on Thu Feb 15. After that we will have 2 papers every

lecture except March 1, unless the class size drops below the

current 27.

Please let me know ASAP if any of you I've assigned a paper to has

a conflict so that I can reassign.

Man

Tue, February 6, 2018
  • Olafsdóttir, Hildur, Aanjhan Ranganathan, and Srdjan Capkun. "On the Security of Carrier Phase-based Ranging." In International Conference on Cryptographic Hardware and Embedded Systems, pp. 490-509. Springer, Cham, 2017.
    URL: https://arxiv.org/pdf/1610.06077.pdf
    Speaker: ZHANG, YIFAN

  • Malisa, Luka, Kari Kostiainen, Thomas Knell, David Sommer, and Srdjan Capkun. "Hacking in the Blind:(Almost) Invisible Runtime User Interface Attacks." In International Conference on Cryptographic Hardware and Embedded Systems, pp. 468-489. Springer, Cham, 2017.
    URL: https://eprint.iacr.org/2017/584.pdf
    Speaker: CAI, BOYANG

Thu, February 8, 2018 Tue, February 13, 2018
  • Lampert, Ben, Riad S. Wahby, Shane Leonard, and Philip Levis. "Robust, low-cost, auditable random number generation for embedded system security." In Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM, pp. 16-27. ACM, 2016.
    URL: https://eprint.iacr.org/2016/884.pdf
    Speaker: RAMESH, SHOBAN NARAYAN

  • Chen, Jiongyi, Wenrui Diao, Qingchuan Zhao, Chaoshun Zuo, Zhiqiang Lin, XiaoFeng Wang, Wing Cheong Lau, Menghan Sun, Ronghai Yang, and Kehuan Zhang. "IOTFUZZER: Discovering Memory Corruptions in IoT Through App-based Fuzzing." In NDSS, 2018.
    URL: https://goo.gl/q6u9pu
    Speaker: VENKATANARAYANAN, AADITHYA

  • Fisch, Ben, Dhinakaran Vinayagamurthy, Dan Boneh, and Sergey Gorbunov. "Iron: functional encryption using Intel SGX." In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 765-782. ACM, 2017.
    URL: https://eprint.iacr.org/2016/1071.pdf
    Speaker: CHENG, PRISCILLA CHIHAN

Paper presentation assignment for Thu Jan 18
1/11/18 2:29 PM

  • Lebeck, Kiron, Kimberly Ruth, Tadayoshi Kohno, and Franziska Roesner. "Securing augmented reality output." In Security and Privacy (SP), 2017 IEEE Symposium on, pp. 320-337. IEEE, 2017.
    URL: http://www.ieee-security.org/TC/SP2017/papers/541.pdf
    Speaker: LAKSHMIPATHY, ARJUN

Important: please fill out the student information form
1/10/18 12:11 AM

Hi Everyone:

Please make sure to fill out the form

https://goo.gl/forms/5O9hv3qd4LsRJXKz2

where I am collecting information about google id and github id.

I need these to set up shared folders and repositories. Only 23

students have filled it out - others, please take a moment to do it.

Thanks!

Mani

Paper Presentation Instructions & Assignments has been added to class homepage under Resources
1/10/18 12:06 AM

The teaching staff has posted a new miscellaneous resource.

Title: Paper Presentation Instructions & Assignments
https://docs.google.com/document/d/e/2PACX-1vRbX5hhZVmaJT9GRmWccXjWh3nuzO3d8mxAhYEvwkZufx6dSwPJqyXSwtiln9CA63ZxvL57MHXBjIQr/pub


You can view it on the course page: https://piazza.com/ucla/winter2018/ece209as/resources

Welcome!
1/09/18 12:08 AM

Welcome to this new course on the topics CPS/IoT security and privacy.

Please make note of the following announcements:

1. At the present moment the class is full (i.e. I handed out the PTEs), but I fully expect students to drop and so I should be able to hand out more PTEs.

2. Please note that if you are on the waitlist then please make sure to till out the form at https://goo.gl/forms/U8Wg6zJmmshIGSlq2 about which I'd sent email on Dec 8 to students who're on the waitlist at the time. I will not consider you for PTE otherwise as slots open up.

3. Also, once I assign you a PTE (which you can check via the registration system) but you don't use the PTE within a reasonable time, then the PTE is considered withdrawn and I'd give a PTE to another student and inform you. In effect you will lose the PTE, and even if you enroll, I'll ask the department to de-enroll you.

4. Finally, please note that all subsequent class related communications will take place via Piazza. I have pre-regitered on Piazza all those who are enrolled in the class. Other students who are on the waiting list would need to register themselves (since I don't actually know if you're still interested in the course) by going to http://piazza.com/ucla/winter2018/ece209as.

#pin
Staff Office Hours
NameOffice Hours
Amr Alanwar
When?
Where?
Srivastava, Mani
When?
Where?