CS 683 - Security and Privacy Spring 2018 Instructor: Karim - - PowerPoint PPT Presentation

cs 683 security and privacy spring 2018
SMART_READER_LITE
LIVE PREVIEW

CS 683 - Security and Privacy Spring 2018 Instructor: Karim - - PowerPoint PPT Presentation

CS 683 - Security and Privacy Spring 2018 Instructor: Karim Eldefrawy University of San Francisco http://www.cs.usfca.edu/~keldefrawy/teaching /spring2018/cs683/cs683_main.htm (https://goo.gl/t396Fw) 1 Class Project 2 Pu Purpose Learn


slide-1
SLIDE 1

CS 683 - Security and Privacy Spring 2018

Instructor: Karim Eldefrawy

University of San Francisco

http://www.cs.usfca.edu/~keldefrawy/teaching /spring2018/cs683/cs683_main.htm (https://goo.gl/t396Fw)

1

slide-2
SLIDE 2

Class Project

2

slide-3
SLIDE 3

Pu Purpose

  • Learn and analyze a distributed system from a

security (and cryptography) perspective

  • Will

focus

  • n

blockchain-based systems, e.g., platforms for cryptocurrencies and smart-contracts

  • Learn to write a report about technical security-

relevant aspects of a system

  • Learn to give a short (15min) technical talk about

technical security-relevant aspects of a system

3

slide-4
SLIDE 4

Wh What you need to do

  • Choose one of the selected blockchain-based (or

consensus-based) systems and cryptocurrencies and study its technical details

  • Write a 7 page report (details next)
  • Give a 20 minute presentation (present for 15min

and answer questions for 5min) about the system (details next)

4

slide-5
SLIDE 5

Sy Syst stems that you could consider

  • Bitcoin, Bitcoin Cash, and Litecoin (all together as
  • ne project, two students can work together as a

team on this)

  • Ethereum and Ethereum Classic (both together as
  • ne project, two students can work together as a

team on this)

  • Ripple (single student)
  • Cardano (single student)
  • NEO (single student)
  • Dash (single student)

5

slide-6
SLIDE 6

Wh What sh shou

  • uld

ld yo your report co cover?

  • Executive Summary: Short overview of the system and its use cases

(1 page)

  • Advantages: Purpose of the system, e.g., what shortcomings of other

systems it addresses, what new features it introduces (1 page)

  • Usage: Use cases for the system (1 page)
  • Technical Details (4 pages)
  • System architecture (P2P, centralized, or hybrid)
  • Consensus approach (POW, POS, byzantine agreement/other consensus … etc.)
  • Cryptographic primitives used (hash functions, encryption, signatures … etc.)
  • Other special features (e.g., anonymity, smart-contracts … etc.)

6

slide-7
SLIDE 7

Wh What sh shou

  • uld

ld yo your presentation co cover?

  • Executive Summary: Short overview of the system and its use cases

(2 slides)

  • Advantages: Purpose of the system, e.g., what shortcomings of other

systems it addresses, what new features it introduces (2 slides)

  • Usage: Use cases for the system (2-3 slides)
  • Technical Details (9-10)
  • System architecture (P2P, centralized, or hybrid)
  • Consensus approach (POW, POS, byzantine agreement/other consensus … etc.)
  • Cryptographic primitives used (hash functions, encryption, signatures … etc.)
  • Other special features (e.g., anonymity, smart-contracts … etc.)

7