^ Date ^ Lecture ^ Theme ^ Topic ^ Presenter ^ Assignment ^ Project ^ | 1/9 | 1 | | Course Introduction | | [[Homework 1]] | | | 1/11 | 2 | | Peer Review | | [[Homework 2]] | | | 1/16 | 3 | Passwords | The Quest to Replace Passwords | | [[Homework 3]] | [http://research.microsoft.com/pubs/161585/QuestToReplacePasswords.pdf paper] | | 1/18 | 4 | | CONIKS: Bringing Key Transparency to End Users | | [[Homework 4]] | [https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-melara.pdf paper] | | 1/23 | 5 | | | | [[Homework 5]] | [https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-melara.pdf paper] | | 1/25 | 6 | | | | [[Homework 6]] | | | 1/30 | 7 | Usable Security | A Tale of Two Studies | | [[Homework 7]] | | | 2/1 | 8 | | We're on the Same Page | | [[Homework 8]] | [https://isrl.byu.edu/pubs/chi2016.pdf paper] | | 2/6 | 9 | | Secure Socket API | Jordan | [[Homework 9]] | | | 2/8 | 10 | | Universal Adversarial Perturbations | Tyler | [[Homework 10]] | [http://openaccess.thecvf.com/content_cvpr_2017/papers/Moosavi-Dezfooli_Universal_Adversarial_Perturbations_CVPR_2017_paper.pdf paper] | | 2/13 | 11 | | Bitcoin's Academic Pedigree | | [[Homework 11]] | [https://dl.acm.org/citation.cfm?id=3167461.3132259 paper1] [https://queue.acm.org/detail.cfm?id=3136559 paper2] | | 2/15 | 12 | | No Class | | Homework 12 | | | 2/22 | 13 | | Bitcoin | Vaishnavi | [[Homework 13]] | [https://bitcoin.org/bitcoin.pdf paper] | | 2/27 | 14 | | Bitcoin-NG | Danny | [[Homework 14]] | [https://www.usenix.org/system/files/conference/nsdi16/nsdi16-paper-eyal.pdf paper] | | 3/1 | 15 | | Hydra | Tyler | [[Homework 15]] | [https://thehydra.io/paper.pdf paper] | | 3/6 | 16 | | No Class | | [[Homework 16]] | Survey Paper Topic | | 3/8 | 17 | | Exploits | Jordan | [[Homework 17]] | [http://ieeexplore.ieee.org/abstract/document/5504796/?reload=true paper] | | 3/13 | 18 | | Town Crier | Vaishnavi | [[Homework 18]] | [https://dl.acm.org/citation.cfm?id=2978326 paper] | | 3/15 | 19 | | | | | | | 3/19 | | | | | | Annotated Bib | | 3/20 | 20 | | Project Reviews | | | | | 3/22 | 21 | | OmniLedger | Danny | [[Homework 21]] | [https://www.computer.org/csdl/proceedings/sp/2018/4353/00/435301a019.pdf paper] | | 3/27 | 22 | | Adversarial Neural Cryptography | Tyler | [[Homework 22]] | [https://arxiv.org/pdf/1610.06918.pdf paper] | | 3/28 | | | | | | Draft 1 | | 3/29 | 23 | | AEG | Jordan | [[Homework 23]] | [http://security.ece.cmu.edu/aeg/aeg-current.pdf paper] | | 4/3 | 24 | | Privacy Risks with Facebook's PII-based Targeting | Vaishnavi | [[Homework 24]] | [https://www.computer.org/csdl/proceedings/sp/2018/4353/00/435301a221.pdf paper] | | 4/5 | 25 | | | | | | | 4/7 | | | | | | Draft 2 | | 4/10 | 26 | | Ransomware | Danny | [[Homework 26]] | [https://www.cs.princeton.edu/~yuxingh/static/oakland-18.pdf paper] | | 4/12 | 27 | | | | | | | 4/17 | 28 | | No Class | | | Final Paper | | 4/20 | - | | Final Exam (3:00 PM - 6:00 PM) CS Conference Room 3350 TMCB | | | |