Date | Topic | Presenter | Jan 8 | Introduction | Urs Hengartner |
Jan 10 | Advice on giving Talks / Cryptography and Security I | Urs Hengartner |
Jan 13 | Paper choices are due | |
Jan 15 | Sample Projects / Cryptography and Security II | Urs Hengartner |
Jan 17 | Location Privacy I Louis, Lester and Pierre: Three Protocols for Location Privacy G. Zhong, I. Goldberg and U. Hengartner. PET 2007. A Study on the Value of Location Privacy D. Cvrcek, M. Kumpost, V. Matyas and G. Danezis. WPES 2006. |
Urs Hengartner Urs Hengartner |
Jan 22 | Location Privacy II Inference Attacks on Location Tracks J. Krumm. Pervasive 2007. Developing Privacy Guidelines for Social Location Disclosure Applications and Services G. Iachello, I. Smith, S. Consolvo, M. Chen, and G. D. Abowd. SOUPS 2005. |
Student presenters removed for privacy reasons |
Jan 24 | Location Privacy III Preserving Location Privacy in Wireless LANs T. Jiang, H. J. Wang and Y.-C. Hu. MobiSys 2007. MobiHide: A Mobilea [sic] Peer-to-Peer System for Anonymous Location-Based Queries G. Ghinita, P. Kalnis and S. Skiadopoulos. SSTD 2007. Optional readings:
|
|
Jan 29 | Ubiquitous Computing Devices That Tell On You: Privacy Trends in Consumer Ubiquitous Computing T. S. Saponas, J. Lester, C. Hartung, S. Agarwal and T. Kohno. USENIX Security 2007. Instant Matchmaking: Simple and Secure Integrated Ubiquitous Computing Environments D. K. Smetters, D. Balfanz, G. Durfee, T. F. Smith and K.-H. Lee. UbiComp 2006. Optional readings:
|
|
Jan 31 | RFID I Privacy and Security Issues in Library RFID - Issues, Practices, and Architectures D. Molnar and D. Wagner. CCS 2004. Security and Privacy Issues in E-passports A. Juels, D. Molnar, and D. Wagner. SecureComm 2005. Optional readings:
|
|
Feb 5 | RFID II Security Analysis of a Cryptographically-Enabled RFID Device S. C. Bono, M. Green, A. Stubblefield, A. Juels, A. D. Rubin, and M. Szydlo. USENIX Security 2005. |
|
Feb 7 | Kiosks I Trustworthy Personalized Computing on Public Kiosks S. Garriss, R. Cáceres, S. Berger, R. Sailer, L. van Doorn and X. Zhang. IBM Research Report RC24169 (A short version appeared in HotMobile 2007.). Rapid Trust Establishment for Transient Use of Unmanaged Hardware A. Surie, A. Perrig, M. Satyanarayanan and D. Farber. CMU-CS-06-176 (A short version appeared in IEEE Pervasive Computing.). |
|
Feb 12 | Kiosks II / RFID III Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer M. Mannan and P. C. van Oorschot. FC 2007. Is Your Cat Infected with a Computer Virus? M. R. Rieback, B. Crispo and A. S. Tanenbaum. PerCom 2006. |
|
Feb 14 | Passwords Simple Authentication for the Web T. W. van der Horst and K. E. Seamons. SecureComm 2007. A Large-Scale Study of Web Password Habits D. Florêncio and C. Herley. WWW 2007. Optional readings:
|
|
Feb 15 | Project proposals are due | |
Feb 19 | Reading week | |
Feb 21 | Reading week | |
Feb 26 | No lecture | |
Feb 28 | Usability I The Memorability and Security of Passwords -- Some Empirical Results J. Yan, A. Blackwell, R. Anderson and A. Grant. IEEE Security and Privacy. Why Johnny Can't Encrypt - A Usability Evaluation of PGP 5.0 A. Whitten and J. D. Tygar. USENIX Security 1999. Optional readings:
|
|
Mar 4 | Usability II Lessons Learned From the Deployment of a Smartphone-Based Access-Control System L. Bauer, L. F. Cranor, M. K. Reiter and K. Vaniea. SOUPS 2007. The Emperor's New Security Indicators S. E. Schechter, R. Dhamija, A. Ozment and I. Fischer. Oakland 2007. Optional readings:
|
|
Mar 6 | Phishing Phinding Phish: An Evaluation of Anti-Phishing Toolbars Y. Zhang, S. Egelman, L. Cranor and J. Hong. NDSS 2007. CANTINA: A Content-Based Approach to Detecting Phishing Web Sites Y. Zhang, J. Hong and L. Cranor. WWW 2007. |
|
Mar 11 | Voting I Security Analysis of the Diebold AccuVote-TS Voting Machine A. J. Feldman, J. A. Halderman and E. W. Felten. EVT 2007. Optional readings:
|
|
Mar 13 | Voting II Cryptographic Voting Protocols: A Systems Perspective C. Karlof, N. Sastry, and D. Wagner. USENIX Security 2005. The ThreeBallot Voting System R. L. Rivest. |
|
Mar 18 | New Security Architectures Securing Vehicular Ad Hoc Networks M. Raya and J.-P. Hubaux. IEEE Wireless Communications Magazine. |
|
Mar 20 | Security Economics I The Economics of Mass Surveillance G. Danezis and B. Wittneben. WEIS 2006. Information Security Economics - and Beyond R. Anderson and T. Moore. Crypto 2007 Keynote. |
|
Mar 25 | New Security Architectures II Bitfrost: the One Laptop per Child Security Model I. Krstic and S. L. Garfinkel. SOUPS 2007. Project presentation |
|
Mar 27 | Project presentations |
|
Apr 1 | Project presentations |
|
Apr 3 | Project presentations |
|
Apr 18 | Project write-ups are due |