| Date | Topic | Presenter | Sept 14 | Introduction | Urs | 
| Sep 16 | Advice on giving Talks / Cryptography and Security | Urs | 
| Sep 19 | Paper choices are due | |
| Sep 21 | Protecting the Social Graph at 2pm in DC 1304 | Urs | 
| Sep 23 | Project Presentations | Jeremy / Peter | 
| Sep 28 | Sample Projects / Project Presentation | Urs | 
| Sep 30 |  Location Privacy SMILE: Encounter-Based Trust for Mobile Social Services. PrETP: Privacy-Preserving Electronic Toll Pricing.  | 
      
       Sanaa Sarah  | 
    
| Oct 5 |  Privacy I The Wi-Fi Privacy Ticker: Improving Awareness & Control of Personal Information Exposure on Wi-Fi. Cryptographic Building Blocks  | 
      
       Nam Christian  | 
    
| Oct 7 |  Privacy II ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. An Analysis of Private Browsing Modes in Modern Browsers.  | 
      
       Brendon Rob  | 
    
| Oct 12 |  Online Social Networking I Moving Beyond UnTagging: Photo Privacy in a Tagged World. Persona: An Online Social Network with User-Defined Privacy.  | 
      
       Tiffany Pengfei  | 
    
| Oct 14 |  Online Social Networking II / Security Economics I unFriendly: Multi-party Privacy Risks in Social Networks. Where Do Security Policies Come From?  | 
       Kellen Erik  | 
    
| Oct 19 |  Security Economics II So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users. Re: CAPTCHAs - Understanding CAPTCHA-Solving Services in an Economic Context.  | 
       Wei Wakee  | 
    
| Oct 21 |  Voting Technologies Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage. Security Analysis of India's Electronic Voting Machines.  | 
      
       Aleks Kartikaya  | 
    
| Oct 22 | Project proposals are due | |
| Oct 26 |  Location Proofs I Ensemble: Cooperative Proximity-based Authentication. Dude where's that IP? Circumventing Measurement-based IP Geolocation.  | 
      
       Divam Sarah  | 
    
| Oct 28 |  Security for Smartphones TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. Smudge Attacks on Smartphone Touch Screens.  | 
       Prima Pengfei  | 
    
| Nov 2 |  No lecture | 
       | 
    
| Nov 4 |  No lecture | 
       | 
    
| Nov 9 |   Security and Privacy
		Policies I'm Allowing What? Disclosing the authority applications demand of users as a condition of installation. Visual vs. Compact: A Comparison of Privacy Policy Interfaces. Standardizing Privacy Notices: An Online Study of the Nutrition Label Approach.  | 
      
       Tiffany Rob Wakee  | 
    
| Nov 11 |  Cloud Computing Hey, You, Get Off My Cloud! Exploring Information Leakage in Third-Party Compute Clouds. When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography.  | 
       Brendon Wei  | 
    Nov 16 |  Privacy-Preserving Computation / Attacks I SCiFI - A System for Secure Face Identification. What's in a Name? Evaluating Statistical Attacks on Personal Knowledge Questions.  | 
      
       Aleks Kartikaya  | 
 
 Nov 18 |  Attacks II Chip and PIN is Broken. Experimental Security Analysis of a Modern Automobile.  | 
      
       Kellen Erik  | 
 Nov 23 |  Location Sharing I I Don't Mind Being Logged, but Want to Remain in Control: A Field Study of Mobile Activity and Context Logging. Empirical Models of Privacy in Location Sharing.  | 
      
       Nam Sanaa  | 
  
| Nov 25 |  Location Sharing II Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. Purpose-Driven Location Sharing. On The Impact of Real-Time Feedback on Users' Behaviour in Mobile Location-Sharing Applications.  | 
      
       Divam Prima  | 
    Nov 30 | Project presentations I | 
        | 
    
    
| Dec 2 | Project presentations II | 
  | 
    
| Dec 7 | Project presentations III | 
  | 
    
| Dec 19 | Project write-ups are due |