The schedule is tentative and subject to change! Please check the week before each class. Here is the class schedule from last offering for your reference.

Date Details
09/06 Orientation and logistics
Review assignment:
• None! Please make sure to attend class, as important logistics will be discussed!
Suggested reading:
Introduction to Information Assurance
09/08 Essential Crypto
Review assignment:
• None! You can work on your project proposals!
09/15 Essential Crypto (Continued)
Review assignment:
• None! You can work on your project proposals!
09/20 Anonymous Communications
Review assignment (pick one for each session; the order of papers is arbitrary!):
Locating Hidden Servers
Nymble: Blocking Misbehaving Users in Anonymizing Networks
RAPTOR: Routing Attacks on Privacy in Tor
Dissent: Accountable Anonymous Group Messaging
Other useful resources:
Original Tor Design
A decent collection of anonymity-related papers
09/22 Anonymous Communications (Continued)
Pick another paper from last class (above) and review!
09/27 Censorship, Surveillance, and Wiretapping
Review assignment:
The Parrot is Dead: Observing Unobservable Network Communications
Quack: Scalable Remote Measurement of Application-Layer Censorship
Can They Hear Me Now? A Security Analysis of Law Enforcement Wiretaps
Other resources:
A decent collection of censorship papers
09/29 Intrusion Detection
Review assignment:
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection
Outside the Closed World: On Using Machine Learning For Network Intrusion Detection
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection
DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning
10/04 Overview of USENIX Security'22
Review assignment:
• Pick a paper from USENIX Security'22 program and submit a review. We will be overviewing the program. Make sure to follow the suggested review format.
10/06 Project Proposal Day
Tasks:
• Introduce your project in class in 2-3 minutes to get feedback and suggestion from others.
• Submit your 1-page project proposal on Moodle (by 10/07)
10/11 Data Privacy
Review assignment:
BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model
Private Information Retrieval
Quantifying Location Privacy
10/13 Privacy Leakage in Machine Learning
Review assignment:
Membership Inference Attacks Against Machine Learning Models
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
Stealing Machine Learning Models via Prediction APIs
Optional reading:
Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting
Machine Learning with Membership Privacy using Adversarial Regularization
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples
10/18 Machine Learning Security
Review assignment:
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning
DeepXplore: Automated Whitebox Testing of Deep Learning Systems
Machine Learning Models that Remember Too Much
Optional reading:
Certified Robustness to Adversarial Examples with Differential Privacy
10/20 Trustworthy Federated Learning
Review assignment:
Comprehensive Privacy Analysis of Deep Learning: Stand-alone and Federated Learning under Passive and Active White-box Inference Attacks
How To Backdoor Federated Learning
Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Production Federated Learning
Ditto: Fair and Robust Federated Learning Through Personalization
10/25 Bitcoin and Blockchain
Review assignment:
• None!
10/27 Bitcoin and Blockchain (Continued)
Review assignment:
Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
Eclipse Attacks on Bitcoin’s Peer-to-Peer Network
Catena: Efficient Non-equivocation via Bitcoin
11/01 Authentication
Review assignment:
The Tangled Web of Password Reuse
Multi-touch Authentication Using Hand Geometry and Behavioral Information
TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication
11/03 Online Social Networks
Review assignment:
Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider
Detecting Fake Accounts in Online Social Networks at the Time of Registrations
Automated Crowdturfing Attacks and Defenses in Online Review Systems
Optional reading:
Investigating Ad Transparency Mechanisms in Social Media: A Case Study of Facebook’s Explanations
11/08 IoT/Embedded Systems Security
Review assignment:
Experimental Security Analysis of a Modern Automobile
Security Analysis of Emerging Smart Home Applications
Understanding the Mirai Botnet
11/10 No class
Virat will hold office hours for HW
11/15 Malware
Review assignment:
Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials
MAMADROID: Detecting Android Malware by Building Markov Chains of Behavioral Models
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale
Optional reading:
Click Trajectories: End-to-End Analysis of the Spam Value Chain
11/17 Covert Channels + Side-Channel Attacks
Review assignment:
Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in IaaS Clouds
Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud
Exploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data Centers
11/29 Final Project Presentations
12/01 Final Project Presentations
12/06 Final Project Presentations
12/08 Final Project Presentations