Reading List
Disclaimers:
- This list should be used only for choosing a paper to present (or a
course project). We are not going to read and discuss all listed
papers in class.
- You can download the local copies only from a UW host. You can
also download a file with all the papers.
- The listed dates are tentative. They might have to be adjusted
depending on people's interests or paper choices.
- There likely will be no lecture on March 10 and 12.
- Project presentations will be on March 31 and April 2.
Location Privacy (Jan 20 and 22)
- Anonysense:
Privacy-Aware People-Centric Sensing. Cornelius, Kapadia, Kotz,
Peebles, Shin, and Triandopoulos. MobiSys 2008. [local]
- Chattering
Laptops. Aura, Lindqvist, Roe, and Mohammed. PETS 2008. [local]
- Improving
Wireless Privacy with an Identifier-Free Link Layer
Protocol. Greenstein, McCoy, Pang, Kohno, Seshan, and
Wetherall. MobiSys 2008. [local]
- Privacy-Preserving
Location Tracking of Lost or Stolen Devices: Cryptographic Techniques
and Replacing Trusted Third Parties with DHTs. Ristenpart,
Maganis, Krishnamurthy, and Kohno. USENIX Security 2008. [local]
- Privacy:
Theory meets Practice on the Map. Machanavajjhala, Kifer, Abowd,
Gehrke, and Vilhuber. ICDE 2008. [local]
- Private
Queries in Location Based Services: Anonymizers are not
Necessary. Ghinita, Kalnis, Khoshgozaran, Shahabi, and
Tan. SIGMOD 2008. [local]
- Virtual
Trip Lines for Distributed Privacy-Preserving Traffic
Monitoring. Hoh, Gruteser, Herring, Ban, Work, Herrera, Bayen,
Annavaram, and Jacobson. MobiSys 2008. [local]
Privacy (Jan 27 and 29)
Internet Security, Web 2.0, Cloud Computing (Feb 3 and 5)
- Detecting
In-Flight Page Changes with Web Tripwires. Reis, Grible, Kohno,
and Weaver. NSDI 2008. [local]
- HAIL: A
High-Availability and Integrity Layer for Cloud Storage. Bowers,
Juels, and Oprea. Tech Report. [local]
- iTrustPage: A
User-Assisted Anti-Phishing Tool. Ronda, Saroiu, and
Wolman. EuroSys 2008. [local]
- Perspectives:
Improving SSH-style Host Authentication with Multi-Path
Probing. Wendlandt, Andersen, and Perrig. USENIX 2008. [local]
- Protection
and Communication Abstractions for Web Browsers in MashupOS. Wang,
Fan, Howell, and Jackson. SOSP 2007. [local]
Voting (Feb 10 and 12)
- Civitas:
Toward a Secure Voting System. Clarkson, Chong, and Myers. Oakland
2008. [local]
- Helios:
Web-based Open-Audit Voting. Ben Adida. USENIX Security 2008. [local]
- Scantegrity
II: End-to-End Verifiability for Optical Scan Election Systems using
Invisible Ink Confirmation Codes. Chaum, Carback, Clark, Essex,
Popoveniuc, Rivest, Ryan, Shen, and Sherman. EVT 2008. [local]
- Security
Evaluation of ES&S Voting Machines and Election Management
System. Aviv, Cerny, Clark, Cronin, Shah, Sherr, and Blaze. EVT
2008. [local]
- Split-Ballot
Voting: Everlasting Privacy with Distributed Trust. Moran and
Naor. CCS 2007. [local]
- VoteBox:
a tamper-evident, verifiable electronic voting system. Sandler,
Derr, and Wallach. USENIX Security 2008. [local]
RFID (Feb 24 and 26)
- Dismantling
MIFARE Classic. Garcia, de Koning Gans, Muijrers, van Rossum,
Verdult, Wichers Schreur, and Jacobs. ESORICS 2008. [local]
- EPC RFID
Tags in Security Applications: Passport Cards, Enhanced
Drivers Licenses, and Beyond. Koscher, Juels, Kohno, and
Brajkovic. Tech Report. [local]
- Reverse-Engineering
a Cryptographic RFID Tag. Nohl, Evans, Starbug, and Plotz. USENIX
Security 2008. [local]
- RFIDs and
Secret Handshakes: Defending Against Ghost-and-Leech Attacks and
Unauthorized Reads with Context-Aware Communications. Czeskis,
Koscher, Smith, and Kohno. CCS 2008. [local]
- Unidirectional Key Distribution Across Time and Space
with Applications to RFID Security. Juels, Pappu, and
Parno. USENIX Security 2008. [local]
Attacks (Mar 3 and 5)
- BootJacker:
Compromising Computers using Forced Restarts. Chan, Carlyle,
David, Farivar, and Campbell. CCS 2008. [local]
- Cloaker:
Hardware Supported Rootkit Concealment. David, Chan, Carlyle, and
Campbell. Oakland 2008. [local]
- Lest We
Remember: Cold Boot Attacks on Encryption Keys. Halderman, Schoen,
Heninger, Clarkson, Paul, Calandrino, Feldman, Appelbaum, and
Felten. USENIX Security 2008. [local]
- Pacemakers
and Implantable Cardiac Defibrillators: Software Radio Attacks and
Zero-Power Defenses. Halperin, Heydt-Benjamin, Ransford, Clark,
Defend, Morgan, Fu, Kohno, and Maisel. Oakland 2008. [local]
- Spot
Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP
Conversations. Wright, Ballard, Coull, Monrose, and
Masson. Oakland 2008. [local]
- Thinking
Inside the Box: System-Level Failures of Tamper Proofing. Drimer,
Murdoch, and Anderson. Oakland 2008. [local]
Usability (Mar 17 and 19)
- Analyzing
Websites for User-Visible Security Design Flaws. Falk, Prakash,
and Borders. SOUPS 2008. [local]
- A User
Study of Policy Creation in a Flexible Access-Control
System. Bauer, Cranor, Reeder, Reiter, and Vaniea. CHI 2008. [local]
- Exploring
User Reactions to New Browser Cues for Extended Validation
Certificates. Sobey, Biddle, van Oorschot, and
Patrick. ESORICS 2008. [local]
- Personal
knowledge questions for fallback authentication: Security questions in
the era of Facebook. Rabkin. SOUPS 2008. [local]
- Use Your
Illusion: Secure Authentication Usable Anywhere. Hayashi, Dhamija,
Christin, and Perrig. SOUPS 2008. [local]
- You've
Been Warned: An Empirical Study of the Effectiveness of Web Browser
Phishing Warnings. Egelman, Cranor, and Hong. CHI 2008. [local]
Trusted Computing (Mar 24)
- Flicker:
An Execution Infrastructure for TCB Minimization. McCune, Parno,
Perrig, Reiter, and Isozaki. EuroSys 2008. [local]
- Measuring
Integrity on Mobile Phone Systems. Muthukumaran, Sawani,
Schiffman, Jung, and Jaeger. SACMAT 2008. [local]
- Trustworthy and
Personalized Computing on Public Kiosks. Garriss, Caceres, Berger,
Sailer, van Doorn, and Zhang. MobiSys 2008. [local]
Economics, Incentives (Mar 26)
- An
Inquiry into the Nature and Causes of the Wealth of Internet
Miscreants. Franklin, Paxson, Perrig, and Savage. CCS 2007. [local]
- Learning
More About the Underground Economy: A Case-Study of Keyloggers and
Dropzones. Holz, Engelberth, and Freiling. Tech Report. [local]
- Secure or
Insure? A Game-Theoretic Analysis of Information Security
Games. Grossklags, Christin, and Chuang. WWW 2008. [local]
- Spamalytics:
An Empirical Analysis of Spam Marketing Conversion. Kanich,
Kreibich, Levchenko, Enright, Voelker, Paxson, and Savage. CCS 2008. [local]
- The
Impact of Incentives on Notice and Take-down. Moore and
Clayton. WEIS 2008. [local]