Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
cs-665:schedule-winter-2016 [2016/01/28 14:59]
zappala
cs-665:schedule-winter-2016 [2016/03/17 14:47] (current)
seamons
Line 10: Line 10:
 | 2/2   ​| ​ 9  | PKI  |     An End-to-End Measurement of Certificate Revocation in the Web’s PKI   ​| ​ Tyler   | [[Homework 9]]  |  [http://​conferences2.sigcomm.org/​imc/​2015/​papers/​p183.pdf paper] ​    | | 2/2   ​| ​ 9  | PKI  |     An End-to-End Measurement of Certificate Revocation in the Web’s PKI   ​| ​ Tyler   | [[Homework 9]]  |  [http://​conferences2.sigcomm.org/​imc/​2015/​papers/​p183.pdf paper] ​    |
 | 2/4   ​| ​ 10  |   ​| ​   CONIKS: Bringing Key Transparency to End Users    |  Elham    | [[Homework 10]]  |  [https://​www.usenix.org/​system/​files/​conference/​usenixsecurity15/​sec15-paper-melara.pdf paper] ​      | | 2/4   ​| ​ 10  |   ​| ​   CONIKS: Bringing Key Transparency to End Users    |  Elham    | [[Homework 10]]  |  [https://​www.usenix.org/​system/​files/​conference/​usenixsecurity15/​sec15-paper-melara.pdf paper] ​      |
-| 2/9   ​| ​ 11  |   ​| ​ Ad Injection at Scale: Assessing Deceptive Advertisement Modifications ​    ​|  Kris  | [[Homework ​11]]  |  [https://​static.googleusercontent.com/​media/​research.google.com/​en//​pubs/​archive/​43346.pdf paper] ​     +| 2/9   ​| ​ 11  |   |      |   | [[Homework 11]]  |        | 
-| 2/11  ​|  ​12  ​| ​  ​| ​ Framing Dependencies Introduced by Underground Commoditization ​    ​|  Chris   ​| [[Homework ​12]]  |  [http://​cseweb.ucsd.edu/​~savage/​papers/​WEIS15.pdf paper] ​      | +| 2/11  |  12  | Attacks  ​|  Ad Injection at Scale: Assessing Deceptive Advertisement Modifications ​     |  Kris  | [[Homework ​12]]  |   ​[https://​static.googleusercontent.com/​media/​research.google.com/​en//​pubs/​archive/​43346.pdf paper] ​    ​
-| 2/18  ​|  ​13  ​| ​  ​      ​|  Scott   ​| [[Homework ​13]]  |  [ paper] ​      ​+| 2/18  ​|  ​13  ​| ​  ​| ​  Class Canceled ​   |   | [[Homework 13]]  |        | 
-2/23  ​|  ​14  ​| ​  |       |  Jonathan ​  ​| [[Homework ​14]]  |  [ paper] ​   +| 2/23  |  14  |  Misc  |   Framing Dependencies Introduced by Underground Commoditization ​   |  Chris  | [[Homework ​14]]  |  [http://​cseweb.ucsd.edu/​~savage/​papers/​WEIS15.pdf paper] ​      | 
-2/24  ​|  ​15  ​| ​  ​| ​      ​    ​| [[Homework ​15]]  |  [ paper] ​     +| 2/25  ​|  ​15  ​| ​    ​ ​Cookies Lack Integrity ​    |  Scott  | [[Homework ​15]]  |  [https://​www.usenix.org/​conference/​usenixsecurity15/​technical-sessions/​presentation/​zheng ​paper] ​   
-| 3/  |  ​16  ​| ​  |       ​| ​    | [[Homework 16]]  ​| ​      | +3/1   ​| ​ 16  ​|  ​Authentication ​ ​| ​ To Pin or Not to Pin     |  Jonathan ​   | [[Homework ​16]]  |  [https://​www.usenix.org/​conference/​usenixsecurity15/​technical-sessions/​presentation/​oltrogge ​paper] ​     
-| 3/3   ​| ​ 17  ​| ​  |    Projects ​ |  | [[Homework ​17]]  |   Status Report ​     ​+3/3   |  ​17  ​| ​  ​| ​ ​Ersatz Passwords ​     ​  Craig   | [[Homework ​17]]  |  [http://​dl.acm.org/​citation.cfm?​id=2818015  ​paper] ​  ​
-| 3/8   |  ​18  ​| ​  ​| ​      ​     | [[Homework ​18]]  |  [  paper] ​ +| 3/  |  ​18  ​| ​Breaking TLS  ​| ​   ​Imperfect Forward Secrecy ​ ​| ​  Jeremy ​ | [[Homework ​18]]  |  ​[https://​hal.inria.fr/​hal-01184171/​document paper] ​    
-| 3/10  ​| ​ ​19  ​|   ​| ​   ​Project Consultations ​      ​[[Homework 19]]  ​|    Annotated Bib      | +| 3/10  ​|  ​19  ​| ​  ​| ​ ​Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH       Justin ​   ​| [[Homework ​19]]  |  [https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​transcript-collision-attacks-breaking-authentication-tls-ike-ssh.pdf ​paper] ​   
-| 3/15  |  20  |   ​      ​      ​| [[Homework 20]]  |  [  paper] ​      ​+| 3/11  ​| ​     |   ​| ​      ​            ​                 |    Annotated Bib      | 
-| 3/17  |  21  ​|   |       ​| ​      ​| [[Homework 21]]  |   Draft 1      +| 3/15  |  20  | DDOS  ​ ​SPIFFY:​ Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks ​      Tyler    ​| [[Homework 20]]  |  [https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​spiffy-inducing-cost-detectability-tradeoffs-persistent-link-flooding-attacks.pdf ​paper] ​     
-| 3/22  |  22  |   ​      ​      ​| [[Homework 22]]  |     ​[ ​ paper] ​       +| 3/17  |  21  |       ​| ​ ​SIBRA:​ Scalable Internet Bandwidth Reservation Architecture ​    ​| ​  ​Nathan ​  | [[Homework 21]]  ​|  [https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​sibra-scalable-internet-bandwidth-reservation-architecture.pdf ​ paper] ​      | 
-| 3/24  |  23  |   ​| ​      ​      ​| [[Homework 23]]  |    ​Status Report ​[ paper] ​    | +| 3/18  |      ​|   |       ​| ​           |                  |    ​Draft 1       ​
-| 3/29  |  24  |   ​| ​      ​      ​| [[Homework ​24]]  |  [  paper] ​     +| 3/22  |  22  | Anonymity  ​ ​RAPTOR:​ Routing Attacks on Privacy in Tor       Elham    ​| [[Homework 22]]  |     [https://​www.usenix.org/​conference/​usenixsecurity15/​technical-sessions/​presentation/​sun ​ ​paper] ​   
-3/31  ​ ​25  ​|   ​| ​      ​| ​      ​| ​[[Homework 25]]  ​|    Draft 2     ​+| 3/24  |  23  |   ​| ​ ​Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services ​      Scott     | [[Homework 23]]  |     ​[https://​www.usenix.org/​conference/​usenixsecurity15/​technical-sessions/​presentation/​kwon ​paper] ​    | 
-| 4/5   ​| ​ 26  |   ​      ​      ​| [[Homework 26]]  |                +| 3/29  |  24  |   ​| ​  No Class    ​                 ​| ​                 | 
-| 4/7   ​| ​ 27  |   ​| ​      ​      ​| [[Homework 27]]  |                +| 3/31  |  25  | Botnets ​ |  Post-Mortem of a Zombie: Conficker Cleanup After Six Years     ​| ​  ​Chris ​    | [[Homework ​25]]  |  [https://​www.usenix.org/​conference/​usenixsecurity15/​technical-sessions/​presentation/​asghari ​paper] ​               
-| 4/12  |  28  |   ​| ​      ​|       ​| ​[[Homework 28]]  ​   Final Paper | +4/1        |   ​| ​      ​| ​      ​| ​                 |    Draft 2       ​
-| 4/15  |  -   ​| ​  ​| ​   Final Exam (7:00 PM - 10:00 PM) Gigapix ​Room TMCB   ​| ​ |   ​| ​    |+| 4/5   ​| ​ 26  |  ​Misc  ​ ​Forwarding-Loop Attacks in Content Delivery Networks ​      Kris     | [[Homework 26]]  |  ​[https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​forwarding-loop-attacks-content-delivery-networks.pdf paper] ​             ​
 +| 4/7   ​| ​ 27  |   ​| ​ ​Centrally Banked Cryptocurrencies ​      Jonathan ​   ​| [[Homework 27]]  |    ​[https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​centrally-banked-cryptocurrencies.pdf paper] ​           ​
 +| 4/12  |  28  |   ​| ​  No Class    ​|       ​| ​     ​Final Paper  
 +| 4/15  |  -   ​| ​  ​| ​   Final Exam (3:00 PM - 6:00 PM) CS Conference ​Room 3350 TMCB   ​| ​ |   ​| ​    |
  
cs-665/schedule-winter-2016.1454018388.txt.gz · Last modified: 2016/01/28 14:59 by zappala
Back to top
CC Attribution-Share Alike 4.0 International
chimeric.de = chi`s home Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0