CS 858 (Winter 2009) - Hot Topics in Computer and Communications Security

Date Topic Presenter
Jan 6 Introduction Urs Hengartner
Jan 8 Advice on giving Talks / Cryptography and Security I Urs Hengartner
Jan 11 Paper choices are due
Jan 13 Research Overview / Cryptography and Security II Urs Hengartner
Jan 15 Sample Projects / Cryptography and Security III Urs Hengartner
Jan 20 Location Privacy I

Anonysense: Privacy-Aware People-Centric Sensing

Chattering Laptops


Presenters removed for privacy reasons

Jan 22 Location Privacy II

Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs

Privacy: Theory meets Practice on the Map




Jan 27 Location Privacy III

Private Queries in Location Based Services: Anonymizers are not Necessary

Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring




Jan 29 No lecture
Feb 3 Trusted Computing

Measuring Integrity on Mobile Phone Systems

Trustworthy and Personalized Computing on Public Kiosks



Feb 5 Privacy I

On the Existence of Unconditionally Privacy-Preserving Auction Protocols

FlyByNight: Mitigating the Privacy Risks of Social Networking



Feb 10 Privacy II

Privacy-Enhanced Sharing of Personal Content on the Web

Towards Practical Privacy for Genomic Computation



Feb 12 Internet Security

iTrustPage: A User-Assisted Anti-Phishing Tool

Detecting In-Flight Page Changes with Web Tripwires




Feb 17 Reading week
Feb 19 Reading week
Feb 22 Project proposals are due
Feb 24 Web 2.0 / RFID

Protection and Communication Abstractions for Web Browsers in MashupOS

EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond




Feb 26 Attacks I

Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations

Cloaker: Hardware Supported Rootkit Concealment



Mar 3 Attacks II

Lest We Remember: Cold Boot Attacks on Encryption Keys

BootJacker: Compromising Computers using Forced Restarts




Mar 5 Usability I

You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings


Mar 10 No lecture
Mar 12 No lecture
Mar 17 Usability II

Analyzing Websites for User-Visible Security Design Flaws

Exploring User Reactions to New Browser Cues for Extended Validation Certificates




Mar 19 Usability III

Personal knowledge questions for fallback authentication: Security questions in the era of Facebook

Use Your Illusion: Secure Authentication Usable Anywhere



Mar 24 Voting

Civitas: Toward a Secure Voting System

Helios: Web-based Open-Audit Voting




Mar 26 Project presentations



Mar 31 Security Economics

Secure or Insure? A Game-Theoretic Analysis of Information Security Games



Project presentations










Apr 2 Project presentations







Apr 20 (tentative) Project write-ups are due