Class schedule will be posted during the first week of classes. Please make sure to attend the first class as we will be discussing the topics.

Date Details
01/24/2017 Orientation and logistics
Required reading:
• None
Suggested reading:
Introduction to Information Assurance
01/26/2017 Intro to Crypto I
Required reading:
• None
01/31/2017 Intro to Crypto II
Required reading:
• None
02/02/2017 Bitcoin and Blockchain
Required reading:
Zerocash: Decentralized Anonymous Payments from Bitcoin
02/09/2017 Snow Day (School closed!)
02/14/2017 Anonymous Communications I
Required reading:
Tor: The Second-Generation Onion Router
02/16/2017 Anonymous Communications II
Required reading (pick one):
RAPTOR: Routing Attacks on Privacy in Tor (Bobby)
Dissent: Accountable Anonymous Group Messaging (Kai)
02/21/2017 Traffic Analysis I
Required reading:
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows
02/23/2017 Traffic Analysis II
Required reading (pick one):
A Critical Evaluation of Website Fingerprinting Attacks (Cassian)
Phonotactic reconstruction of encrypted VoIP conversations: Hookt on fon-iks (Adin)
02/28/2017 Botnet detection
Required reading:
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection (Brendan)
03/02/2017 Intrusion Detection
Required reading:
Specification Mining for Intrusion Detection in Networked Control Systems (Konor)
03/07/2017 Data Privacy
Required reading:
Robust De-anonymization of Large Sparse Datasets (Anthony)
03/09/2017 Online Social Networks
Required reading:
Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider
03/14/2017 Spring Break!
03/16/2017 Spring Break!
03/28/2017 Side Channel Attacks
Required reading: (pick one)
I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks(Brendan)
Cross-VM Side Channels and Their Use to Extract Private Keys (Adin)
03/30/2017 Authentication
Required reading:
zxcvbn: Low-Budget Password Strength Estimation (Neeki)
An Empirical Study of Textual Key-Fingerprint Representations (Clark)
04/04/2017 Future Internet and Security
Required reading:
ANDaNA: Anonymous Named Data Networking Application
04/06/2017 Internet Censorship
Required reading:
The Parrot is Dead: Observing Unobservable Network Communications
04/11/2017 Machine Learning and Security I
Required reading (pick one):
Privacy-Preserving Deep Learning (Shirish)
Membership Inference Attacks against Machine Learning Models (Shahrzad)
04/13/2017 Machine Learning and Security II
Required reading (pick one):
Stealing Machine Learning Models via Prediction APIs (Pegah)
Explaining and Harnessing Adversarial Examples (Sachin)
04/19/2017 Location Privacy (Room 140)
Required reading:
Quantifying Location Privacy
04/20/2017 Mobile Security
Required reading:
CHEX: statically vetting Android apps for component hijacking vulnerabilities (Jay)
04/25/2017 Final Project Presentations
04/27/2017 Final Project Presentations
05/02/2017 Final Project Presentations