14-829: Mobile Security

14-829 / 18-638: Mobile Security - Fall 2017

Academic Policies:
Students are expected to follow all academic policies set forth by departments, colleges, and the university. A (likely incomplete) list of such policies is included here for ease of access.
In addition, students are expected to adhere to these additional policies put in place for this course.
  • Collaboration Policy: For individual assignments, discussion about the assignment is encouraged, but students must complete the assignment individually - this means no sharing of code, figures, algorithms, design, etc. beyond discussing the approach to be taken. Copying and sharing are cheating.
  • Plagiarism & Citation Policy: Do not copy, paraphrase, or mention any existing material without a full bibliographic citation of where the material was obtained from - in the case of direct inclusion of written material, use quotations appropriately. Plagiarism is cheating.
  • Wiki Policy: Do not cite Wikipedia or other similar wiki pages - these are not reliable sources of information. Most reasonably good wiki pages include their own references, so follow those links and cite those sources instead. Including such citations will result in a 50% penalty in the corresponding assignment/deliverable.
  • Grading Policy: We grade work to the best of our ability based on what was submitted by students, but we sometimes make mistakes. We're happy to re-grade any work or to discuss how grades were determined.
  • Deadlines: All deadlines are fixed by the first day of class. Extensions are extremely rare, so plan ahead. Late submission of individual assignments will be accepted for up to two (2) days after the deadline, with a 10% per day penalty. No other course deliverables will be accepted for credit after the corresponding deadline.

Ethics of Security Education and Research:
As with any course or project related to security, students should be aware of ethical implications of what they are learning and doing. This includes, but is not limited to the following:
  • Research, development, and experimentation with sensitive information, attack protocols, misbehavior, etc. should be performed with the utmost care and respect. Students are responsible for seeking IRB approval when needed and understanding potential legal implications of actions taken outside of a controlled environment. Students are expected to follow a strict ethical code, especially when dealing with potentially sensitive information.
  • Students are encouraged to consult with the instructor if there is any shred of uncertainty around ethical or legal implications.