Date |
Topic | Reviews | Presenter |
Sept 11 | Introduction | Urs Hengartner | |
Sept 13 | Cryptography and Security I | Urs Hengartner | |
Sept 17 | Paper choices are due | ||
Sept 18 | Cryptography and Security II | Urs Hengartner | |
Sept 20 | Cryptography and Security III / Sample Projects | Urs Hengartner | |
Sept 25 | Assignment is due | ||
Sept 25 | Privacy Avoiding Privacy Violations Caused by Context-Sensitive Services U. Hengartner and P. Steenkiste. PerCom 2006. K-Anonymity: A Model for Protecting Privacy L. Sweeney. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems. |
Reviews Reviews |
Urs Hengartner <Student presenters removed for privacy reasons> |
Sept 27 | Pervasive
Computing I Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems M. Langheinrich. UbiComp 2001. Cerberus:
A Context-Aware Security Scheme for Smart Spaces
|
Reviews Reviews |
|
Oct 2 | Pervasive
Computing II The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks F. Stajano and R. Anderson. Security Protocols Workshop 1999. Key Agreement in Peer-to-Peer Wireless Networks M. Cagalj, S. Capkun, and J.P. Hubaux. IEEE (Special Issue on Security and Cryptography), 2006. Note: You can skip Section IV. The presenter should talk about distance bounding instead. Optional readings:
|
Reviews Reviews |
|
Oct 4 | Location
Privacy I Developing Privacy Guidelines for Social Location Disclosure Applications and Services G. Iachello, I. Smith, S. Consolvo, M. Chen, and G. D. Abowd. SOUPS 2005. Preserving Privacy in Environments with Location-Based Applications G. Myles, A. Friday, and N. Davies. IEEE Pervasive Computing Magazine. Optional readings:
|
||
Oct 9 | Thanksgiving | ||
Oct 11 | Location
Privacy II Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking M. Gruteser and D. Grunwald. MobiSys 2003. Putting People in their Place: An Anonymous and Privacy-Sensitive Approach to Collecting Sensed Data in Location-Based Applications K. P. Tang, P. Keyani, J. Fogarty, and J. I. Hong. CHI 2006. Optional readings:
|
||
Oct 16 | Project proposals are due | ||
Oct 16 | RFID Privacy and Security Issues in Library RFID - Issues, Practices, and Architectures D. Molnar and D. Wagner. CCS 2004. Security and Privacy Issues in E-passports A. Juels, D. Molnar, and D. Wagner. SecureComm 2005. Optional readings:
|
||
Oct 18 | Usability Why Johnny Can't Encrypt - A Usability Evaluation of PGP 5.0 A. Whitten and J. D. Tygar. USENIX Security 1999. Why Phishing Works R. Dhamija, J. D. Tygar, and M. Hearst. CHI 2006. Optional readings:
|
||
Oct 23 | Phishing
I Do Security Toolbars Actually Prevent Phishing Attacks M. Wu, R. C. Miller, and S. L. Garfinkel, CHI 2006. The Battle Against Phishing: Dynamic Security Skins R. Dhamija and J. D. Tygar. SOUPS 2005. Optional readings:
|
||
Oct 25 | Phishing
II Web Wallet: Preventing Phishing Attacks by Revealing User Intentions M. Wu, R. C. Miller, and G. Little. SOUPS 2006. Passpet: Convenient Password Management and Phishing Protection K.-P. Yee and K. Sitaker. SOUPS 2006. Optional readings:
|
||
Oct 30 | Trusted Computing I Terra: A Virtual Machine-Based Platform for Trusted Computing T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. SOSP 2003. Pioneer: Verifying Integrity and Guaranteeing Execution of Code on Legacy Platforms A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. SOSP 2005. |
||
Nov 1 | Onion Routing Tor: The Second-Generation Onion Router R. Dingledine, N. Mathewson, and P. Syverson. USENIX Security 2004. Tor: The Errata |
Nick Mathewson |
|
Nov 6 | Trusted Computing II Design and Implementation of a TCG-Based Integrity Measurement Architecture R. Sailer, S. Zhang, T. Jaeger, and L. van Doorn. USENIX Security 2004. Trusted Computing: Promise and Risk Seth Schoen. EFF. Optional readings:
|
Urs Hengartner |
|
Nov 8 | Graphical
Passwords CAPTCHA: Using Hard AI Problems for Security L. von Ahn, M. Blum, N. J. Hopper, and J. Langford. Eurocrypt 2003. Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon. SOUPS 2005. Optional readings:
|
||
Nov 13 | Electronic
Voting Analysis of an Electronic Voting System T. Kohno, A. Stubblefield, A. D. Rubin, and D. S. Wallach. S&P 2004. Cryptographic Voting Protocols: A Systems Perspective C. Karlof, N. Sastry, and D. Wagner. USENIX Security 2005. Optional readings:
|
||
Nov 15 | Secure
Software I A Virtual Machine Introspection Based Architecture for Intrusion Detection T. Garfinkel and M. Rosenblum. NDSS 2003. A Virtual Honeypot Framework N. Provos. USENIX Security 2004. Optional readings:
|
||
Nov 20 | Secure
Software II On the Effectiveness of Address-Space Randomization H. Schacham, M. Page, B. Pfaff, E. Goh, N. Modadugu, and D. Boneh. CCS 2004. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software J. Newsome and D. Song, NDSS 2005. Optional readings:
|
||
Nov 22 | Side-Channel
Attacks Keyboard Acoustic Emanations Revisited L. Zhuang, F. Zhou, and J. D. Tygar. CCS 2005. Optional readings:
|
||
Nov 27 | Project presentations |
||
Nov 29 | Project presentations | ||
Dec 4 | Project presentations |
||
Dec 6 | Project write-ups are due |