Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
cs-665:schedule-winter-2016 [2016/01/14 15:03]
zappala
cs-665:schedule-winter-2016 [2016/03/17 14:47]
seamons
Line 1: Line 1:
-^  Date  ^  Lecture ​ ^  Topic  ^  Presenter ​ ^  Assignment ​ ^  Project ​ ^ +^  Date  ^  Lecture ​ ^ Theme ^ Topic  ^  Presenter ​ ^  Assignment ​ ^  Project ​ ^ 
-| 1/5   ​| ​ 1  |  Course Introduction ​  ​| ​ Seamons ​  ​| ​                ​| ​        | +| 1/5   ​| ​ 1  ​|   |  Course Introduction ​  ​| ​ Seamons ​  ​| ​                ​| ​        | 
-| 1/7   ​| ​ 2  |  Peer Review ​          ​| ​ Zappala ​   | [[Homework 2]]  |         | +| 1/7   ​| ​ 2  |   |    ​Peer Review ​          ​| ​ Zappala ​   | [[Homework 2]]  |         | 
-| 1/12  |  3  |  The Quest to Replace Passwords ​      ​| ​ Seamons ​ | [[Homework 3]]  |  [http://​research.microsoft.com/​pubs/​161585/​QuestToReplacePasswords.pdf paper] ​  | +| 1/12  |  3  | Passwords ​ |   The Quest to Replace Passwords ​      ​| ​ Seamons ​ | [[Homework 3]]  |  [http://​research.microsoft.com/​pubs/​161585/​QuestToReplacePasswords.pdf paper] ​  | 
-| 1/14  |  4  |  An Administrator'​s Guide to Internet Password Research ​   |  Zappala ​  | [[Homework 4]]  |    [http://​research.microsoft.com/​apps/​pubs/?​id=227130 paper] ​     | +| 1/14  |  4  |   |    ​An Administrator'​s Guide to Internet Password Research ​   |  Zappala ​  | [[Homework 4]]  |    [http://​research.microsoft.com/​apps/​pubs/?​id=227130 paper] ​     | 
-| 1/19  |  5  |  SoK: SSL and HTTPS    |  Craig   | [[Homework 5]]  |    [http://​www.ieee-security.org/​TC/​SP2013/​papers/​4977a511.pdf paper] ​   | +| 1/19  |  5  | Messaging ​  ​| ​   ​SoK: SSL and HTTPS    |  Craig   | [[Homework 5]]  |    [http://​www.ieee-security.org/​TC/​SP2013/​papers/​4977a511.pdf paper] ​   | 
-| 1/21  |  6  |   ​OTR ​  ​| ​ Jeremy ​ | [[Homework 6]]  |   ​[https://​otr.cypherpunks.ca/​otr-wpes.pdf paper] ​    | +| 1/21  |  6  |   |     OTR   ​| ​ Jeremy ​ | [[Homework 6]]  |   ​[https://​otr.cypherpunks.ca/​otr-wpes.pdf paper] ​    | 
-| 1/26  |  7  |  Neither Snow Nor Rain Nor MITM    |     ​| [[Homework 7]]  |  [http://​conferences2.sigcomm.org/​imc/​2015/​papers/​p27.pdf paper] ​      | +| 1/26  |  7  | Email   ​| ​   ​Neither Snow Nor Rain Nor MITM    |  ​Justin ​  | [[Homework 7]]  |  [http://​conferences2.sigcomm.org/​imc/​2015/​papers/​p27.pdf paper] ​      | 
-| 1/28  |  8  |  Security by Any Other Name    |     ​| [[Homework 8]]  |   ​[http://​cseweb.ucsd.edu/​~snoeren/​papers/​smtpsec-ccs15.pdf paper] ​    | +| 1/28  |  8  |   |    ​Security by Any Other Name    |   Nathan ​  | [[Homework 8]]  |   ​[http://​cseweb.ucsd.edu/​~snoeren/​papers/​smtpsec-ccs15.pdf paper] ​    | 
-| 2/2   ​| ​ 9  |   ​An End-to-End Measurement of Certificate Revocation in the Web’s PKI   ​| ​ Tyler   | [[Homework 9]]  |  [http://​conferences2.sigcomm.org/​imc/​2015/​papers/​p183.pdf paper] ​    | +| 2/2   ​| ​ 9  | PKI  |     An End-to-End Measurement of Certificate Revocation in the Web’s PKI   ​| ​ Tyler   | [[Homework 9]]  |  [http://​conferences2.sigcomm.org/​imc/​2015/​papers/​p183.pdf paper] ​    | 
-| 2/4   ​| ​ 10  |  CONIKS: Bringing Key Transparency to End Users    | Elham    | [[Homework 10]]  |  [https://​www.usenix.org/​system/​files/​conference/​usenixsecurity15/​sec15-paper-melara.pdf paper] ​      | +| 2/4   ​| ​ 10  |   |    ​CONIKS: Bringing Key Transparency to End Users    |  Elham    | [[Homework 10]]  |  [https://​www.usenix.org/​system/​files/​conference/​usenixsecurity15/​sec15-paper-melara.pdf paper] ​      | 
-| 2/9   ​| ​ 11  |     ​    ​| [[Homework 11]]  |  [ paper] ​     ​+| 2/9   ​| ​ 11  |   ​     ​| ​  | [[Homework 11]]  |        
-| 2/11  |  12  |     ​    ​| [[Homework 12]]  |  [ paper] ​      ​+| 2/11  |  12  | Attacks  ​ Ad Injection at Scale: Assessing Deceptive Advertisement Modifications ​     |  Kris  ​| [[Homework 12]]  |   ​[https://​static.googleusercontent.com/​media/​research.google.com/​en//​pubs/​archive/​43346.pdf ​paper] ​    ​
-| 2/18  |  13  |     ​    ​| [[Homework 13]]  |  [ paper] ​      +| 2/18  |  13  |   ​  Class Canceled ​   |   | [[Homework 13]]  |        
-| 2/23  |  14  |     ​    ​| [[Homework 14]]  |  [ paper] ​   +| 2/23  |  14  |  ​Misc  ​  Framing Dependencies Introduced by Underground Commoditization ​   |  Chris  ​| [[Homework 14]]  |  [http://​cseweb.ucsd.edu/​~savage/​papers/​WEIS15.pdf ​paper] ​      ​
-| 2/24  ​| ​ 15  |     ​| ​    | [[Homework 15]]  |  [ paper] ​     +| 2/25  ​| ​ 15  |     ​| ​ ​Cookies Lack Integrity ​    ​|  Scott  ​| [[Homework 15]]  |  [https://​www.usenix.org/​conference/​usenixsecurity15/​technical-sessions/​presentation/​zheng ​paper] ​   
-| 3/1   ​| ​ 16  |     ​|     | [[Homework 16]]  |       ​+| 3/1   ​| ​ 16  |  ​Authentication  ​ To Pin or Not to Pin     ​|  Jonathan ​   ​| [[Homework 16]]  |  ​[https://​www.usenix.org/​conference/​usenixsecurity15/​technical-sessions/​presentation/​oltrogge paper] ​     ​
-| 3/3   ​| ​ 17  |  ​Projects  ​|  | [[Homework 17]]  |   Status Report ​     ​+| 3/3   ​| ​ 17  |   ​|  ​Ersatz Passwords ​     |   ​Craig ​  | [[Homework 17]]  |  ​[http://​dl.acm.org/​citation.cfm?​id=2818015 ​ paper] ​  | 
-| 3/8   ​| ​ 18  |     ​     | [[Homework 18]]  |  [  paper] ​ +| 3/8   ​| ​ 18  | Breaking TLS  ​   ​Imperfect Forward Secrecy ​ |   ​Jeremy  ​| [[Homework 18]]  |  [https://​hal.inria.fr/​hal-01184171/​document ​paper] ​    ​
-| 3/10  |  19  |  ​Project Consultations ​  |     | [[Homework 19]]  |    Annotated Bib      | +| 3/10  |  19  |   ​| ​ ​Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH     ​|   ​Justin ​   ​| [[Homework 19]]  ​|  [https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​transcript-collision-attacks-breaking-authentication-tls-ike-ssh.pdf paper] ​   | 
-| 3/15  |  20  |     ​| ​      ​| [[Homework 20]]  |  [  paper] ​      ​+| 3/11  |      |   ​| ​      ​| ​            ​| ​                 ​|    Annotated Bib      | 
-| 3/17  |  21  |     ​| ​      ​| [[Homework 21]]  |   Draft 1      +| 3/15  |  20  | DDOS  |  SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks ​    |   Tyler    ​| [[Homework 20]]  |  [https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​spiffy-inducing-cost-detectability-tradeoffs-persistent-link-flooding-attacks.pdf ​paper] ​     
-| 3/22  |  22  |     ​| ​      ​| [[Homework 22]]  |     ​[ ​ paper] ​       +| 3/17  |  21  |       |  SIBRA: Scalable Internet Bandwidth Reservation Architecture ​    |   Nathan ​  | [[Homework 21]]  ​|  [https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​sibra-scalable-internet-bandwidth-reservation-architecture.pdf ​ paper] ​      | 
-| 3/24  |  23  |     ​| ​      ​| [[Homework 23]]  |    ​Status Report ​[ paper] ​    | +| 3/18  |      ​|   |       ​| ​           |                  |    ​Draft 1       ​
-| 3/29  |  24  |     ​      ​[[Homework 24]]  ​ ​[ ​ paper] ​     ​+| 3/22  |  22  | Anonymity ​ |  RAPTOR: Routing Attacks on Privacy in Tor     |   Elham    ​| [[Homework 22]]  |     [https://​www.usenix.org/​conference/​usenixsecurity15/​technical-sessions/​presentation/​sun ​ ​paper] ​   
-| 3/31  |  25  |     ​| ​      ​| [[Homework 25]]  |    Draft 2     ​+| 3/24  |  23  |   |  Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services ​    |   Scott     | [[Homework 23]]  |     ​[https://​www.usenix.org/​conference/​usenixsecurity15/​technical-sessions/​presentation/​kwon ​paper] ​    | 
-| 4/5   ​| ​ 26  |     ​| ​      ​| [[Homework 26]]  |                +| 3/29  |  24  |   ​  No Class    ​                                  
-| 4/7   ​| ​ 27  |     ​| ​      ​| [[Homework 27]]  |                +| 3/31  |  25  | Botnets ​ |  Post-Mortem of a Zombie: Conficker Cleanup After Six Years     |   Chris     | [[Homework 25]]  ​|  [https://​www.usenix.org/​conference/​usenixsecurity15/​technical-sessions/​presentation/​asghari paper] ​               | 
-| 4/12  |  28  |     ​|       ​| ​[[Homework 28]]  ​   Final Paper | +| 4/1   ​| ​     |   ​| ​      ​| ​      ​| ​                 ​|    Draft 2       ​
-| 4/15  |  -   ​| ​ Final Exam (7:00 PM - 10:00 PM) Gigapix ​Room TMCB   ​| ​ |   ​| ​    |+| 4/5   ​| ​ 26  |  ​Misc ​ |  Forwarding-Loop Attacks in Content Delivery Networks ​    |   Kris     | [[Homework 26]]  |  ​[https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​forwarding-loop-attacks-content-delivery-networks.pdf paper] ​             ​
 +| 4/7   ​| ​ 27  |   |  Centrally Banked Cryptocurrencies ​    |   Jonathan ​   ​| [[Homework 27]]  |    ​[https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​centrally-banked-cryptocurrencies.pdf paper] ​           ​
 +| 4/12  |  28  |   |   No Class    ​|       ​| ​     ​Final Paper  
 +| 4/15  |  -   ​| ​  |    ​Final Exam (3:00 PM - 6:00 PM) CS Conference ​Room 3350 TMCB   ​| ​ |   ​| ​    |
  
cs-665/schedule-winter-2016.txt · Last modified: 2016/03/17 14:47 by seamons
Back to top
CC Attribution-Share Alike 4.0 International
chimeric.de = chi`s home Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0