Date | Topic | Presenter | Sept 14 | Introduction | Urs |
Sep 16 | Advice on giving Talks / Cryptography and Security | Urs |
Sep 19 | Paper choices are due | |
Sep 21 | Protecting the Social Graph at 2pm in DC 1304 | Urs |
Sep 23 | Project Presentations | Jeremy / Peter |
Sep 28 | Sample Projects / Project Presentation | Urs |
Sep 30 | Location Privacy SMILE: Encounter-Based Trust for Mobile Social Services. PrETP: Privacy-Preserving Electronic Toll Pricing. |
Sanaa Sarah |
Oct 5 | Privacy I The Wi-Fi Privacy Ticker: Improving Awareness & Control of Personal Information Exposure on Wi-Fi. Cryptographic Building Blocks |
Nam Christian |
Oct 7 | Privacy II ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. An Analysis of Private Browsing Modes in Modern Browsers. |
Brendon Rob |
Oct 12 | Online Social Networking I Moving Beyond UnTagging: Photo Privacy in a Tagged World. Persona: An Online Social Network with User-Defined Privacy. |
Tiffany Pengfei |
Oct 14 | Online Social Networking II / Security Economics I unFriendly: Multi-party Privacy Risks in Social Networks. Where Do Security Policies Come From? |
Kellen Erik |
Oct 19 | Security Economics II So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users. Re: CAPTCHAs - Understanding CAPTCHA-Solving Services in an Economic Context. |
Wei Wakee |
Oct 21 | Voting Technologies Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage. Security Analysis of India's Electronic Voting Machines. |
Aleks Kartikaya |
Oct 22 | Project proposals are due | |
Oct 26 | Location Proofs I Ensemble: Cooperative Proximity-based Authentication. Dude where's that IP? Circumventing Measurement-based IP Geolocation. |
Divam Sarah |
Oct 28 | Security for Smartphones TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. Smudge Attacks on Smartphone Touch Screens. |
Prima Pengfei |
Nov 2 | No lecture |
|
Nov 4 | No lecture |
|
Nov 9 | Security and Privacy
Policies I'm Allowing What? Disclosing the authority applications demand of users as a condition of installation. Visual vs. Compact: A Comparison of Privacy Policy Interfaces. Standardizing Privacy Notices: An Online Study of the Nutrition Label Approach. |
Tiffany Rob Wakee |
Nov 11 | Cloud Computing Hey, You, Get Off My Cloud! Exploring Information Leakage in Third-Party Compute Clouds. When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography. |
Brendon Wei |
Nov 16 | Privacy-Preserving Computation / Attacks I SCiFI - A System for Secure Face Identification. What's in a Name? Evaluating Statistical Attacks on Personal Knowledge Questions. |
Aleks Kartikaya |
Nov 18 | Attacks II Chip and PIN is Broken. Experimental Security Analysis of a Modern Automobile. |
Kellen Erik |
Nov 23 | Location Sharing I I Don't Mind Being Logged, but Want to Remain in Control: A Field Study of Mobile Activity and Context Logging. Empirical Models of Privacy in Location Sharing. |
Nam Sanaa |
Nov 25 | Location Sharing II Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. Purpose-Driven Location Sharing. On The Impact of Real-Time Feedback on Users' Behaviour in Mobile Location-Sharing Applications. |
Divam Prima |
Nov 30 | Project presentations I |
|
Dec 2 | Project presentations II |
|
Dec 7 | Project presentations III |
|
Dec 19 | Project write-ups are due |