14-850: INSuRE Cybersecurity Research

14-850: INSuRE Cybersecurity Research - Fall 2017



Academic Policies:
Students are expected to follow all academic policies set forth by departments, colleges, and the university. A (likely incomplete) list of such policies is included here for ease of access.
In addition, students are expected to adhere to these additional policies put in place for this course.
  • Collaboration Policy: Students are encouraged to fully collaborate on all group deliverables. Peer evaluations are to be done individually. Collaboration across groups will be allowed, but groups should not share code, figures, algorithms, design, etc. beyond discussing similarities between projects and approaches / designs. Further cross-group collaboration should be discussed with the instructor before proceeding.
  • Plagiarism & Citation Policy: Do not copy, paraphrase, or mention any existing material without a full bibliographic citation of where the material was obtained from - in the case of direct inclusion of written material, use quotations appropriately.
  • Wiki Policy: Do not cite Wikipedia or other similar wiki pages - these are not reliable sources of information. Most reasonably good wiki pages include their own references, so follow those links and cite those sources instead.
  • Grading Policy: We grade work to the best of our ability based on what was submitted by students, but we sometimes make mistakes. We're happy to re-grade any work or to discuss how grades were determined.
  • Deadlines: All deadlines are fixed as soon as announced (ideally before class day one). Extensions are extremely rare, so plan ahead. Late submission of project deliverables will not be accepted for credit after the corresponding deadline.

Ethics of Security Education and Research:
As with any course or project related to security, students should be aware of ethical implications of what they are learning and doing. This includes, but is not limited to the following:
  • Research, development, and experimentation with sensitive information, attack protocols, misbehavior, etc. should be performed with the utmost care and respect. Students are responsible for seeking IRB approval when needed and understanding potential legal implications of actions taken outside of a controlled environment. Students are expected to follow a strict ethical code, especially when dealing with potentially sensitive information.
  • Students are encouraged to consult with the instructor if there is any shred of uncertainty around ethical or legal implications.