| Date | Details |
|---|---|
| 01/24/2017 | Orientation and logistics |
|
Required reading: • None Suggested reading: • Introduction to Information Assurance |
|
| 01/26/2017 | Intro to Crypto I |
|
Required reading: • None |
|
| 01/31/2017 | Intro to Crypto II |
|
Required reading: • None |
|
| 02/02/2017 | Bitcoin and Blockchain |
|
Required reading: • Zerocash: Decentralized Anonymous Payments from Bitcoin |
|
| 02/09/2017 | Snow Day (School closed!) |
| 02/14/2017 | Anonymous Communications I |
|
Required reading: • Tor: The Second-Generation Onion Router |
|
| 02/16/2017 | Anonymous Communications II |
|
Required reading (pick one): • RAPTOR: Routing Attacks on Privacy in Tor (Bobby) • Dissent: Accountable Anonymous Group Messaging (Kai) |
|
| 02/21/2017 | Traffic Analysis I |
|
Required reading: • RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows |
|
| 02/23/2017 | Traffic Analysis II |
|
Required reading (pick one): • A Critical Evaluation of Website Fingerprinting Attacks (Cassian) • Phonotactic reconstruction of encrypted VoIP conversations: Hookt on fon-iks (Adin) |
|
| 02/28/2017 | Botnet detection |
|
Required reading: • BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection (Brendan) |
|
| 03/02/2017 | Intrusion Detection |
|
Required reading: • Specification Mining for Intrusion Detection in Networked Control Systems (Konor) |
|
| 03/07/2017 | Data Privacy |
|
Required reading: • Robust De-anonymization of Large Sparse Datasets (Anthony) |
|
| 03/09/2017 | Online Social Networks |
|
Required reading: • Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider |
|
| 03/14/2017 | Spring Break! |
| 03/16/2017 | Spring Break! |
| 03/28/2017 | Side Channel Attacks |
|
Required reading: (pick one) • I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks(Brendan) • Cross-VM Side Channels and Their Use to Extract Private Keys (Adin) |
|
| 03/30/2017 | Authentication |
|
Required reading: • zxcvbn: Low-Budget Password Strength Estimation (Neeki) • An Empirical Study of Textual Key-Fingerprint Representations (Clark) |
|
| 04/04/2017 | Future Internet and Security |
|
Required reading: • ANDaNA: Anonymous Named Data Networking Application |
|
| 04/06/2017 | Internet Censorship |
|
Required reading: • The Parrot is Dead: Observing Unobservable Network Communications |
|
| 04/11/2017 | Machine Learning and Security I |
|
Required reading (pick one): • Privacy-Preserving Deep Learning (Shirish) • Membership Inference Attacks against Machine Learning Models (Shahrzad) |
|
| 04/13/2017 | Machine Learning and Security II |
|
Required reading (pick one): • Stealing Machine Learning Models via Prediction APIs (Pegah) • Explaining and Harnessing Adversarial Examples (Sachin) |
|
| 04/19/2017 | Location Privacy (Room 140) |
|
Required reading: • Quantifying Location Privacy |
|
| 04/20/2017 | Mobile Security |
|
Required reading: • CHEX: statically vetting Android apps for component hijacking vulnerabilities (Jay) |
|
| 04/25/2017 | Final Project Presentations |
| 04/27/2017 | Final Project Presentations |
| 05/02/2017 | Final Project Presentations |