Date | Topic | Presenter | Jan 6 | Introduction | Urs Hengartner |
Jan 8 | Advice on giving Talks / Cryptography and Security I | Urs Hengartner |
Jan 11 | Paper choices are due | |
Jan 13 | Research Overview / Cryptography and Security II | Urs Hengartner |
Jan 15 | Sample Projects / Cryptography and Security III | Urs Hengartner |
Jan 20 | Location Privacy I Anonysense: Privacy-Aware People-Centric Sensing Chattering Laptops | Presenters removed for privacy reasons |
Jan 22 | Location Privacy II Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs Privacy: Theory meets Practice on the Map |
|
Jan 27 | Location Privacy III Private Queries in Location Based Services: Anonymizers are not Necessary Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring |
|
Jan 29 | No lecture | |
Feb 3 | Trusted Computing Measuring Integrity on Mobile Phone Systems Trustworthy and Personalized Computing on Public Kiosks |
|
Feb 5 | Privacy I On the Existence of Unconditionally Privacy-Preserving Auction Protocols FlyByNight: Mitigating the Privacy Risks of Social Networking |
|
Feb 10 | Privacy II Privacy-Enhanced Sharing of Personal Content on the Web Towards Practical Privacy for Genomic Computation |
|
Feb 12 | Internet Security iTrustPage: A User-Assisted Anti-Phishing Tool Detecting In-Flight Page Changes with Web Tripwires |
|
Feb 17 | Reading week | |
Feb 19 | Reading week | |
Feb 22 | Project proposals are due | |
Feb 24 | Web 2.0 / RFID Protection and Communication Abstractions for Web Browsers in MashupOS EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond |
|
Feb 26 | Attacks I Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations Cloaker: Hardware Supported Rootkit Concealment |
|
Mar 3 | Attacks II Lest We Remember: Cold Boot Attacks on Encryption Keys BootJacker: Compromising Computers using Forced Restarts |
|
Mar 5 | Usability I You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings |
|
Mar 10 | No lecture | |
Mar 12 | No lecture | |
Mar 17 | Usability II Analyzing Websites for User-Visible Security Design Flaws Exploring User Reactions to New Browser Cues for Extended Validation Certificates |
|
Mar 19 | Usability III Personal knowledge questions for fallback authentication: Security questions in the era of Facebook Use Your Illusion: Secure Authentication Usable Anywhere |
|
Mar 24 | Voting Civitas: Toward a Secure Voting System Helios: Web-based Open-Audit Voting |
|
Mar 26 | Project presentations |
|
Mar 31 | Security Economics Secure or Insure? A Game-Theoretic Analysis of Information Security Games Project presentations |
|
Apr 2 | Project presentations |
|
Apr 20 (tentative) | Project write-ups are due |