CS 858 (Fall 2010) - Hot Topics in Computer and Communications Security

Date Topic Presenter
Sept 14 Introduction Urs
Sep 16 Advice on giving Talks / Cryptography and Security Urs
Sep 19 Paper choices are due
Sep 21 Protecting the Social Graph at 2pm in DC 1304 Urs
Sep 23 Project Presentations Jeremy / Peter
Sep 28 Sample Projects / Project Presentation Urs
Sep 30 Location Privacy

SMILE: Encounter-Based Trust for Mobile Social Services.

PrETP: Privacy-Preserving Electronic Toll Pricing.


Sanaa

Sarah
Oct 5 Privacy I

The Wi-Fi Privacy Ticker: Improving Awareness & Control of Personal Information Exposure on Wi-Fi.

Cryptographic Building Blocks


Nam

Christian
Oct 7 Privacy II

ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash.

An Analysis of Private Browsing Modes in Modern Browsers.


Brendon

Rob
Oct 12 Online Social Networking I

Moving Beyond UnTagging: Photo Privacy in a Tagged World.

Persona: An Online Social Network with User-Defined Privacy.

Tiffany

Pengfei
Oct 14 Online Social Networking II / Security Economics I

unFriendly: Multi-party Privacy Risks in Social Networks.

Where Do Security Policies Come From?

Kellen

Erik
Oct 19 Security Economics II

So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users.

Re: CAPTCHAs - Understanding CAPTCHA-Solving Services in an Economic Context.

Wei

Wakee
Oct 21 Voting Technologies

Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage.

Security Analysis of India's Electronic Voting Machines.


Aleks

Kartikaya
Oct 22 Project proposals are due
Oct 26 Location Proofs I

Ensemble: Cooperative Proximity-based Authentication.

Dude where's that IP? Circumventing Measurement-based IP Geolocation.


Divam

Sarah
Oct 28 Security for Smartphones

TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones.

Smudge Attacks on Smartphone Touch Screens.


Prima

Pengfei
Nov 2 No lecture


Nov 4 No lecture


Nov 9 Security and Privacy Policies

I'm Allowing What? Disclosing the authority applications demand of users as a condition of installation.

Visual vs. Compact: A Comparison of Privacy Policy Interfaces.

Standardizing Privacy Notices: An Online Study of the Nutrition Label Approach.


Tiffany

Rob

Wakee
Nov 11 Cloud Computing

Hey, You, Get Off My Cloud! Exploring Information Leakage in Third-Party Compute Clouds.

When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography.

Brendon

Wei
Nov 16 Privacy-Preserving Computation / Attacks I

SCiFI - A System for Secure Face Identification.

What's in a Name? Evaluating Statistical Attacks on Personal Knowledge Questions.


Aleks

Kartikaya
Nov 18 Attacks II

Chip and PIN is Broken.

Experimental Security Analysis of a Modern Automobile.


Kellen

Erik
Nov 23 Location Sharing I

I Don't Mind Being Logged, but Want to Remain in Control: A Field Study of Mobile Activity and Context Logging.

Empirical Models of Privacy in Location Sharing.


Nam

Sanaa
Nov 25 Location Sharing II

Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. Purpose-Driven Location Sharing.

On The Impact of Real-Time Feedback on Users' Behaviour in Mobile Location-Sharing Applications.


Divam

Prima
Nov 30 Project presentations I







Dec 2 Project presentations II







Dec 7 Project presentations III







Dec 19 Project write-ups are due