Dr. Kishan Mehrotra, Professor and Chair, email@example.com
4-177 Center for Science and Technology
Drs. Susan Older, firstname.lastname@example.org, Shiu-Kai Chin, email@example.com, Stephen Chapin, firstname.lastname@example.org, Howard Blair, email@example.com, James Royer, firstname.lastname@example.org, Wenliang Du, email@example.com, Heng Yin, firstname.lastname@example.org, Chilukuri Mohan, email@example.com, Jae Oh, firstname.lastname@example.org
Students will be taking four core courses and six elective courses, for a total of 30 credits, with a final GPA of 3.0 in these courses, and a GPA of 2.8 in all courses taken at SU.
BS in computer science, computer engineering, or closely related field with at least 3.0 GPA;
GRE Verbal score of 150 or better (using New GRE Score System);
GRE Quantitative score of 155 or better (using New GRE Score System);
GRE Analytical (multiple choice) score of 650 or better, or a score of 3.5 or better in the new Analytical Writing;
for international students: TOEFL computer-based score of 223 (Internet-based score 85; paper-based score 563) or better;
grade point average (GPA) of 3.0/4.0 or better.
- Basic systems knowledge
- Fundamentals of traps, interrupts, and trap handling at the instruction-set architecture (ISA) level, not at the cycle-simulation level
- Concurrency and coordination mechanisms (semaphores, locking, critical regions)
- Access-control matrices, basics of access-control lists and capabilities
- Systems programming basics: makefiles, C (including the care required by pointers and memory management), systems calls, shell scripting, pipes and filters, non-IDE programming
- Data structures: stacks, queues, lists, hash tables, trees
- Discrete mathematics: symbolic logic and formal proofs (i.e., use of inference rules), sets, relations
- High-level programming experience
Some, but not all, students are provided merit-based tuition scholarships.
This program has been designed to produce graduates who possess the abilities to;
- identify and analyze vulnerabilities in systems;
- assess risks faced by systems;
- develop countermeasures to remedy risks;
- develop systems that are secure; and deliver software components or systems that have verifiable assurance properties.