Lecture, four hours; laboratory, two hours; outside study, two hours. Requisite: Computer Science 33. Exploration of vulnerabilities in cyber-physical and Internet of Things systems that undermine user trust by disrupting operations, causing information leakage, and creating security risks, especially in adversarial settings. A cross-layer approach is necessary to mitigate these challenges. Examination of these issues from software, network, microarchitectural, and physical perspectives. Special attention is given to edge-cloud systems, which are often resource constrained, wirelessly connected, and use artificial intelligence and machine learning methods for analysis and control. These systems interact with the physical world through sensors and actuators, and often operate in untrusted environments, making them particularly vulnerable. Necessary background included through introductory lectures. Study focuses on recent research, presented and discussed in class, with possible guest lectures from industry experts. Students complete computer-based assignments, further solidifying understanding of these cutting-edge security issues. Letter grading.
Click on any course to view its details