The schedule and the assigned papers are subject to change. Please check regularly. Here is the class schedule from last year for your reference.

Date Details
08/25 Orientation and logistics
Review assignment:
• None! Please make sure to attend class, as we will be planning the schedule for the semester-- together!
Suggested reading:
Introduction to Information Assurance
08/27 Overview of NDSS'2020
Review assignment:
• Pick a paper from NDSS'20 program and submit a review. We will be overviewing the program. Make sure to follow the suggested review format.
09/01 Essential Crypto
Review assignment:
• None! Work on your project proposals!
09/03 Essential Crypto (Continued)
Review assignment:
• None! Work on your project proposals!
09/08 Anonymous Communications
Review assignment (pick one):
Tor: The Second-Generation Onion Router
RAPTOR: Routing Attacks on Privacy in Tor
Dissent: Accountable Anonymous Group Messaging
09/10 Anonymous Communications Continued
No reviews due (we will discuss papers from last class)!
09/15 Project Proposal Day
Tasks:
• Introduce your project in class in 2-3 minutes to get feedback and suggestion from others.
• Submit your 1-page project proposal on Moodle (by 09/15)
09/17 Bitcoin and Blockchain
Review assignment:
Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
Eclipse Attacks on Bitcoin’s Peer-to-Peer Network
Catena: Efficient Non-equivocation via Bitcoin
09/22 Bitcoin and Blockchain (Continued)
Review assignment:
•None! Overview your reviews submitted last class
09/24 Overview of USENIX Security'2020
Review assignment:
• Pick a paper from USENIX Security'20 program and submit a review. We will be overviewing the program.
09/29 Censorship, Surveillance, and Wiretapping
Review assignment:
The Parrot is Dead: Observing Unobservable Network Communications
Quack: Scalable Remote Measurement of Application-Layer Censorship
Can They Hear Me Now? A Security Analysis of Law Enforcement Wiretaps
10/01 Authentication
Review assignment:
The Tangled Web of Password Reuse
Multi-touch Authentication Using Hand Geometry and Behavioral Information
TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication
10/06 Covert Channels + Side-Channel Attacks
Review assignment:
Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in IaaS Clouds
Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud
Exploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data Centers
10/08 Data Privacy
Review assignment:
BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model
Private Information Retrieval
Quantifying Location Privacy
10/13 Privacy Leakage in Machine Learning
Review assignment:
Membership Inference Attacks Against Machine Learning Models
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
Stealing Machine Learning Models via Prediction APIs
Optional reading:
Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting
Comprehensive Privacy Analysis of Deep Learning: Stand-alone and Federated Learning under Passive and Active White-box Inference Attacks
10/15 Privacy-Preserving Machine Learning
Review assignment:
Deep Learning with Differential Privacy
Machine Learning with Membership Privacy using Adversarial Regularization
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples
Optional reading:
Privacy-preserving Prediction
ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models
10/20 Machine Learning Security
Review assignment:
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning
DeepXplore: Automated Whitebox Testing of Deep Learning Systems
Machine Learning Models that Remember Too Much
Optional reading:
Certified Robustness to Adversarial Examples with Differential Privacy
10/22 Online Social Networks
Review assignment:
Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider
Detecting Fake Accounts in Online Social Networks at the Time of Registrations
Automated Crowdturfing Attacks and Defenses in Online Review Systems
Optional reading:
Investigating Ad Transparency Mechanisms in Social Media: A Case Study of Facebook’s Explanations
10/27 Intrusion Detection
Review assignment:
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection
Outside the Closed World: On Using Machine Learning For Network Intrusion Detection
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection
10/29 IoT/Embedded Systems Security
Review assignment:
Experimental Security Analysis of a Modern Automobile
Security Analysis of Emerging Smart Home Applications
Understanding the Mirai Botnet
11/03 Malware
Review assignment:
Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials
MAMADROID: Detecting Android Malware by Building Markov Chains of Behavioral Models
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale
Optional reading:
Click Trajectories: End-to-End Analysis of the Spam Value Chain
11/05 Overview of Other Topics
Review assignment:
- None! Work on your projects.
11/10 Final Project Presentations
11/12 Final Project Presentations
11/17 Final Project Presentations
11/19 Final Project Presentations