Security and Privacy in Contemporary Distributed Software Systems (B-KUL-H0Q33A)

4 ECTSEnglish24 Second term
POC Cybersecurity

Current and future software applications, services and systems are relatively complex in nature and therefore hard to develop, deploy and evolve, especially in light of facing security threats in practice. This course studies advanced concepts in the creation and organization of complex distributed systems and discusses the strengths and weaknesses of these systems in light of security and privacy.

Students obtain insights, experience and capabilities that are extremely important in the study, analysis and assessment of contemporary distributed computing platforms such as – for example – cloud-based storage, large scale monitoring systems, distributed systems in automotive, highly replicated peer-2-peer systems such as block chain, etc.

The course embraces some of the “killer-applications” of this time, the students learn about the trade-offs made during the engineering and deployment of such systems. The chosen platforms embed – often in production at large scale in practice – pragmatic choices that we reflect upon. This process trains the students in terms of critical reflection and evaluation. Security and privacy are the key properties being assessed; yet trade-offs with performance, availability and use-ability are an essential theme as well.

The student should possess basic knowledge on computer networks and in computer programming.

Activities

4 ects. Security and Privacy in Contemporary Distributed Software Systems: Lecture (B-KUL-H0Q33a)

4 ECTSEnglishFormat: Lecture24 Second term
POC Cybersecurity

The course builds upon basic knowledge in security and privacy, and on basic know in software, systems and distributed systems. The course starts form a set of introduction lectures and subsequently runs as a series of workshops where students present and analyse existing systems and services, based on seminal and ground breaking research papers.

The course addresses a collection of contemporary and relevant distributed systems and platforms by zooming into relevant research literature and available documentation.

Every year, a selection of core themes is defined and the teaching team starts the course by presenting a set of introductory lectures.

Subsequently, we address a number of case studies in terms of security and privacy properties and qualities. The format of this activity is follows a workshop style with presentations by students and joint discussions.

Course material will be provided on Toledo

  • The presentations of all lectures
  • A selection of seminal papers covering relevant research
  • The presentations, feedback and reports of each workshop

 

This course combines a limited set of lectures with self-study, and participation to workshops that include presentations, discussion, critical evaluation and reporting activities. Students are actively engaging in the process of delivering these workshops, for example through one or more of the following elements.

  • The study and processing of literature (book chapter or papers)
  • The development of a case study based on literature.
  • Writing a paper or report.
  • The organization and delivery of a presentation or discussion.

Evaluation

Evaluation: Security and Privacy in Contemporary Distributed Software Systems (B-KUL-H2Q33a)

Type : Partial or continuous assessment with (final) exam during the examination period
Description of evaluation : Oral, Paper/Project, Presentation


Permanent evaluation based on: Paper/Presentation Report- Self Assesment and Peer Assesment contributions during lectures and workshops

 

  • The evaluation for this course is linked to (1) an evaluation of the contributions made by the student during the semester (50% of the grades), en (2) an evaluation of the obtained knowledge and insights, made during an oral exam in the examination period (partial open book, partially closed book – 50% of the course grades).
  • The learning process for this course is, apart from attending the lectures, linked to self-study, active participation in the workshops and presentation sessions, and contributing to a critical evaluation and reporting about the workshops.
  • Students are expected to actively participate in the study of the selected themes, e.g. in one or more of the following elements:
    • Studying and processing  literature (from books or magazines/journals)
    • Performing a case study based on literature
    • Writing a paper or report
    • Preparing and presenting and participating in discussion sessions
  • Evaluations and reporting are prepared individually. Half of the course grades are based on the contributions made during the semester

Students that score less than a 10 in the June examination period are asked to, when they did not pass the first part (1), prepare an assignment, which is an extension or improvement of the study work done during the semester. Students that fail on the second part (2) are asked to perform the exam part of the evaluation again.