Date | Details |
---|---|
01/24/2017 | Orientation and logistics |
Required reading: • None Suggested reading: • Introduction to Information Assurance |
|
01/26/2017 | Intro to Crypto I |
Required reading: • None |
|
01/31/2017 | Intro to Crypto II |
Required reading: • None |
|
02/02/2017 | Bitcoin and Blockchain |
Required reading: • Zerocash: Decentralized Anonymous Payments from Bitcoin |
|
02/09/2017 | Snow Day (School closed!) |
02/14/2017 | Anonymous Communications I |
Required reading: • Tor: The Second-Generation Onion Router |
|
02/16/2017 | Anonymous Communications II |
Required reading (pick one): • RAPTOR: Routing Attacks on Privacy in Tor (Bobby) • Dissent: Accountable Anonymous Group Messaging (Kai) |
|
02/21/2017 | Traffic Analysis I |
Required reading: • RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows |
|
02/23/2017 | Traffic Analysis II |
Required reading (pick one): • A Critical Evaluation of Website Fingerprinting Attacks (Cassian) • Phonotactic reconstruction of encrypted VoIP conversations: Hookt on fon-iks (Adin) |
|
02/28/2017 | Botnet detection |
Required reading: • BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection (Brendan) |
|
03/02/2017 | Intrusion Detection |
Required reading: • Specification Mining for Intrusion Detection in Networked Control Systems (Konor) |
|
03/07/2017 | Data Privacy |
Required reading: • Robust De-anonymization of Large Sparse Datasets (Anthony) |
|
03/09/2017 | Online Social Networks |
Required reading: • Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider |
|
03/14/2017 | Spring Break! |
03/16/2017 | Spring Break! |
03/28/2017 | Side Channel Attacks |
Required reading: (pick one) • I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks(Brendan) • Cross-VM Side Channels and Their Use to Extract Private Keys (Adin) |
|
03/30/2017 | Authentication |
Required reading: • zxcvbn: Low-Budget Password Strength Estimation (Neeki) • An Empirical Study of Textual Key-Fingerprint Representations (Clark) |
|
04/04/2017 | Future Internet and Security |
Required reading: • ANDaNA: Anonymous Named Data Networking Application |
|
04/06/2017 | Internet Censorship |
Required reading: • The Parrot is Dead: Observing Unobservable Network Communications |
|
04/11/2017 | Machine Learning and Security I |
Required reading (pick one): • Privacy-Preserving Deep Learning (Shirish) • Membership Inference Attacks against Machine Learning Models (Shahrzad) |
|
04/13/2017 | Machine Learning and Security II |
Required reading (pick one): • Stealing Machine Learning Models via Prediction APIs (Pegah) • Explaining and Harnessing Adversarial Examples (Sachin) |
|
04/19/2017 | Location Privacy (Room 140) |
Required reading: • Quantifying Location Privacy |
|
04/20/2017 | Mobile Security |
Required reading: • CHEX: statically vetting Android apps for component hijacking vulnerabilities (Jay) |
|
04/25/2017 | Final Project Presentations |
04/27/2017 | Final Project Presentations |
05/02/2017 | Final Project Presentations |