cs 683 security and privacy spring 2018
play

CS 683 - Security and Privacy Spring 2018 Instructor: Karim - PowerPoint PPT Presentation

CS 683 - Security and Privacy Spring 2018 Instructor: Karim Eldefrawy University of San Francisco http://www.cs.usfca.edu/~keldefrawy/teaching /spring2018/cs683/cs683_main.htm (https://goo.gl/t396Fw) 1 Class Project 2 Pu Purpose Learn


  1. CS 683 - Security and Privacy Spring 2018 Instructor: Karim Eldefrawy University of San Francisco http://www.cs.usfca.edu/~keldefrawy/teaching /spring2018/cs683/cs683_main.htm (https://goo.gl/t396Fw) 1

  2. Class Project 2

  3. Pu Purpose • Learn and analyze a distributed system from a security (and cryptography) perspective • Will focus on blockchain-based systems, e.g., platforms for cryptocurrencies and smart-contracts • Learn to write a report about technical security- relevant aspects of a system • Learn to give a short (15min) technical talk about technical security-relevant aspects of a system 3

  4. Wh What you need to do • Choose one of the selected blockchain-based (or consensus-based) systems and cryptocurrencies and study its technical details • Write a 7 page report (details next) • Give a 20 minute presentation (present for 15min and answer questions for 5min) about the system (details next) 4

  5. Sy Syst stems that you could consider • Bitcoin, Bitcoin Cash, and Litecoin (all together as one project, two students can work together as a team on this) • Ethereum and Ethereum Classic (both together as one project, two students can work together as a team on this) • Ripple (single student) • Cardano (single student) • NEO (single student) • Dash (single student) 5

  6. Wh What sh shou ould ld yo your report co cover? • Executive Summary: Short overview of the system and its use cases (1 page) • Advantages: Purpose of the system, e.g., what shortcomings of other systems it addresses, what new features it introduces (1 page) • Usage: Use cases for the system (1 page) • Technical Details (4 pages) • System architecture (P2P, centralized, or hybrid) • Consensus approach (POW, POS, byzantine agreement/other consensus … etc.) • Cryptographic primitives used (hash functions, encryption, signatures … etc.) • Other special features (e.g., anonymity, smart-contracts … etc.) 6

  7. Wh What sh shou ould ld yo your presentation co cover? • Executive Summary: Short overview of the system and its use cases (2 slides) • Advantages: Purpose of the system, e.g., what shortcomings of other systems it addresses, what new features it introduces (2 slides) • Usage: Use cases for the system (2-3 slides) • Technical Details (9-10) • System architecture (P2P, centralized, or hybrid) • Consensus approach (POW, POS, byzantine agreement/other consensus … etc.) • Cryptographic primitives used (hash functions, encryption, signatures … etc.) • Other special features (e.g., anonymity, smart-contracts … etc.) 7

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend