seclab welcomes its new members!
To facilitate your successful settlement in the SKKU ECE and seclab, you are encouraged to take the following steps in the specified order:
- Set up your desk in the office #27317, Eng. 2. You need to get the 4-digit secret code from a lab member to access to the office.
- Set up your computer. To install some necessary software (e.g. Windows OS), you can borrow DVDs from the office #27421, Eng. 2.
- Set up your network environments. For doing this, please discuss the lab’s system admin (Soolin Kim); you should create your own accounts to use seclab server and WordPress, respectively (probably, you can find many useful documents and templates from our file server — “seclab.skku.edu”).
- Install a LaTeX distribution on your machine (in order to actually compile LaTeX documents, you also need to install an editor. For windows, the most used editors are probably Texmaker and TeXnicCenter). LaTeX is the de-facto standard for the communication and publication of scientific documents (see LaTeX resources and examples).
- If you don’t have a SKKU account, then create it at http://www.skku.edu. Please use your English name rather than nickname for your official SKKU account if you can (it would be helpful for you if you want to pursue a career in the academy).
- Please provide your regular weekly timetable to Prof. Hyoungshick Kim via email. It will be helpful to reschedule the lab events.
- If you don’t have Google and Dropbox accounts, then create them. We use Google Calendar which should make scheduling events easier and Dropbox which should make file sharing easier. Provide your account information to Prof. Hyoungshick Kim via email.
- If you don’t have a personal web page, then create it. Otherwise, update it with your new status, contact information, and affiliation. Create a link from your record in the People page to your home page.
- Please check the minimum requirements for Seclab students.
- “Graduate School Survival Guide”
- “Mihir Bellare’s educational resources”
- “The illustrated guide to a Ph.D.”, (by Matt Might)
- “10 easy ways to fail a Ph.D.”, (by Matt Might) (the Korean version)
- “The Researcher’s Bible”, (by Alan Bundy)
- “Managing your supervisor”, (by Toby Walsh)
- “Managing your supervisor”, (by Nick Feamster)
- “3 qualities of successful Ph.D. students”, (by Matt Might)
- “PhD Know-how”, (in Korean by Yoon Sup Choi)
- “Things every PhD student should know”, (in Korean by Changhyun Kwon)
- “Ph.D. Students Must Break Away From Undergraduate Mentality”, (by Jason Hong)
- “15 pieces of advice I wish my PhD advisor had given me”, (by Jim Kurose)
- “How to read a paper”, (by S. Keshav)
- “How to Read a Technical Paper“, (by Jason Eisner)
- “How to write a great research paper”, (by Simon Peyton Jones)
- “How to write top conference papers in security?”, (by Yongdae Kim)
- “How (and How Not) to Write a Good Systems Paper”, (by Roy Levin and David D. Redell)
- “How to Write a Good (Systems) Paper”, (by Gernot Heiser)
- “How To Write A Dissertation”
- “How to Write Research Papers”, (by Tao Xie)
- “How to Respond to a Revise and Resubmit”
- “Writing Rebuttals”
- “Storytelling 101: Writing Tips for Academics” (by Nick Feamster)
- “Writing a Literature Review”
- “What is a Survey Paper” (by Jennifer Wong)
- “Mathematical Writing”, (by Donald E. Knuth)
- “How do I write a good research paper?” (by Andrew J. Ko)
- “Catchy Titles Are Good: But Avoid Being Cute” (by Jacob O. Wobbrock)
- “Writing a position paper”
- “10 tips for writing a truly terrible journal article” (by Bert Blocken)
- “Writing a good introduction” (by Jim Kurose)
- “Writing reviews for systems conferences“, (by Timothy Roscoe)
- “Networking on the Network”, (by Phil Agre)
- “Attending an academic conference”, (by Michael Ernst)
- “The Travel Grant HOWTO”, (by Christian Kreibich)
- “How to write a good email to your supervisor”, (in Korean by Changhyun Kwon)
- “Presenting a Technical Talk”, (by Nick Feamster)
- “How to Give an Academic Talk”, (by Paul N. Edwards)
- “How to give a good research talk”, (by Simon Peyton Jones)
- “Armando’s Paper Writing and Presentations”, (by Armando Fox)
- Presenter Travel Award Letter Example
How to research
- “Research Patterns” (by Nick Feamster)
- “Common Pitfalls in Writing about Security and Privacy Human Subjects Experiments, and How to Avoid Them”, (by Stuart Schechter)
- Introduction to computer security at YouTube
- Computer system security at MIT OCW
- Information security at SJSU
- Software security at ASU
- Seed Labs
- Learning computer security
- Developing Secure Systems at PITT
- Software Defined Networking Lab
- Free Malware Analysis and Reverse Engineering
- Moss (for detecting software plagiarism)
- Number Theory for Cryptographers
- A Computational Introduction to Number Theory and Algebra (by Victor Shoup)
- Programming Language
- C language: A list of books, Programming practice problems
- C and C++ courses: MIT OCW course
- GDB: quick reference, tutorial, user manual
- Python: If you are new to Python, you may find it valuable to work through the code academy Python tutorials, Introduction to Computer Science and Programming (at MIT) or Google’s Python class; Problem Solving with Algorithms and Data Structures using Python; Python Tutorials for security applications; please see a free textbook (Python for Informatics).
- Programming challenges: Baekjoon Online Judge, leetcode and Codeforces
- Big and Little Endian
- Offensive Security Tools
- CTF: guideline
- Radare2: document for self learning, r2pipe for scripting, cutter for GUI
- Utility to decode or encode base64 and other formats
- Utility to generate cryptographic hashes including MD5, SHA1
- Network Security Tools
- SSL Security test: https://www.ssllabs.com/ssltest/index.html
- Security paper
- IoT Security
- Usable Security