Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
cs-665:schedule-winter-2016 [2016/02/16 08:46]
seamons
cs-665:schedule-winter-2016 [2016/03/17 14:47] (current)
seamons
Line 11: Line 11:
 | 2/4   ​| ​ 10  |   ​| ​   CONIKS: Bringing Key Transparency to End Users    |  Elham    | [[Homework 10]]  |  [https://​www.usenix.org/​system/​files/​conference/​usenixsecurity15/​sec15-paper-melara.pdf paper] ​      | | 2/4   ​| ​ 10  |   ​| ​   CONIKS: Bringing Key Transparency to End Users    |  Elham    | [[Homework 10]]  |  [https://​www.usenix.org/​system/​files/​conference/​usenixsecurity15/​sec15-paper-melara.pdf paper] ​      |
 | 2/9   ​| ​ 11  |   ​| ​     |   | [[Homework 11]]  |        | | 2/9   ​| ​ 11  |   ​| ​     |   | [[Homework 11]]  |        |
-| 2/11  |  12  |   ​|  Ad Injection at Scale: Assessing Deceptive Advertisement Modifications ​     |  Kris  | [[Homework 12]]  |   ​[https://​static.googleusercontent.com/​media/​research.google.com/​en//​pubs/​archive/​43346.pdf paper] ​    | +| 2/11  |  12  | Attacks  ​|  Ad Injection at Scale: Assessing Deceptive Advertisement Modifications ​     |  Kris  | [[Homework 12]]  |   ​[https://​static.googleusercontent.com/​media/​research.google.com/​en//​pubs/​archive/​43346.pdf paper] ​    | 
-| 2/18  |  13  |   ​| ​  ​Framing Dependencies Introduced by Underground Commoditization ​   |  Chris  | [[Homework ​13]]  |  [http://​cseweb.ucsd.edu/​~savage/​papers/​WEIS15.pdf paper] ​      | +| 2/18  |  13  |   |   Class Canceled ​   |   | [[Homework 13]]  |        | 
-| 2/23  ​|  ​14  ​| ​  ​|  Cookies Lack Integrity ​    ​| ​ Scott  | [[Homework ​14]]  |  [https://​www.usenix.org/​conference/​usenixsecurity15/​technical-sessions/​presentation/​zheng paper] ​   | +| 2/23  |  14  |  Misc  ​|   ​Framing Dependencies Introduced by Underground Commoditization ​   |  Chris  | [[Homework ​14]]  |  [http://​cseweb.ucsd.edu/​~savage/​papers/​WEIS15.pdf paper] ​      | 
-2/25  ​|  ​15  |   |  To Pin or Not to Pin     ​| ​ Jonathan ​   | [[Homework ​15]]  |  [https://​www.usenix.org/​conference/​usenixsecurity15/​technical-sessions/​presentation/​oltrogge paper] ​     | +| 2/25  ​|  ​15  ​| ​    ​|  Cookies Lack Integrity ​    ​| ​ Scott  | [[Homework ​15]]  |  [https://​www.usenix.org/​conference/​usenixsecurity15/​technical-sessions/​presentation/​zheng paper] ​   | 
-| 3/  |  ​16  ​| ​  ​| ​      ​    ​| [[Homework ​16]]  |       ​+3/1   ​| ​ 16  ​|  ​Authentication ​ ​| ​ To Pin or Not to Pin     ​| ​ Jonathan ​   | [[Homework ​16]]  |  [https://​www.usenix.org/​conference/​usenixsecurity15/​technical-sessions/​presentation/​oltrogge paper] ​     | 
-| 3/  |  ​17  ​| ​  ​|    ​Projects ​ ​| ​ | [[Homework ​17]]  |   Status Report ​     ​+| 3/  |  ​17  ​| ​  ​| ​ ​Ersatz Passwords ​     ​  Craig   | [[Homework ​17]]  |  ​[http://​dl.acm.org/​citation.cfm?​id=2818015 ​ paper] ​  
-| 3/8   |  ​18  ​| ​  ​| ​      ​     | [[Homework ​18]]  |  [  paper] ​ +| 3/  |  ​18  ​| ​Breaking TLS  ​|    ​Imperfect Forward Secrecy ​ ​| ​  Jeremy ​ | [[Homework ​18]]  |  ​[https://​hal.inria.fr/​hal-01184171/​document paper] ​    
-| 3/10  ​| ​ ​19  ​|   ​| ​   ​Project Consultations ​      ​[[Homework 19]]  ​|    Annotated Bib      | +| 3/10  ​|  ​19  ​| ​  ​| ​ ​Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH       Justin ​   ​| [[Homework ​19]]  |  [https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​transcript-collision-attacks-breaking-authentication-tls-ike-ssh.pdf ​paper] ​   
-| 3/15  |  20  |   ​      ​      ​| [[Homework 20]]  |  [  paper] ​      ​+| 3/11  ​| ​     |   ​| ​      ​            ​                 |    Annotated Bib      | 
-| 3/17  |  21  ​|   |       ​| ​      ​| [[Homework 21]]  |   Draft 1      +| 3/15  |  20  | DDOS  ​ ​SPIFFY:​ Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks ​      Tyler    ​| [[Homework 20]]  |  [https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​spiffy-inducing-cost-detectability-tradeoffs-persistent-link-flooding-attacks.pdf ​paper] ​     
-| 3/22  |  22  |   ​      ​      ​| [[Homework 22]]  |     ​[ ​ paper] ​       +| 3/17  |  21  |       ​| ​ ​SIBRA:​ Scalable Internet Bandwidth Reservation Architecture ​    ​| ​  ​Nathan ​  | [[Homework 21]]  ​|  [https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​sibra-scalable-internet-bandwidth-reservation-architecture.pdf ​ paper] ​      | 
-| 3/24  |  23  |   ​| ​      ​      ​| [[Homework 23]]  |    ​Status Report ​[ paper] ​    | +| 3/18  |      ​|   |       ​| ​           |                  |    ​Draft 1       ​
-| 3/29  |  24  |   ​| ​      ​      ​| [[Homework ​24]]  |  [  paper] ​     +| 3/22  |  22  | Anonymity  ​ ​RAPTOR:​ Routing Attacks on Privacy in Tor       Elham    ​| [[Homework 22]]  |     [https://​www.usenix.org/​conference/​usenixsecurity15/​technical-sessions/​presentation/​sun ​ ​paper] ​   
-3/31  ​ ​25  ​|   ​| ​      ​| ​      ​| ​[[Homework 25]]  ​|    Draft 2     ​+| 3/24  |  23  |   ​| ​ ​Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services ​      Scott     | [[Homework 23]]  |     ​[https://​www.usenix.org/​conference/​usenixsecurity15/​technical-sessions/​presentation/​kwon ​paper] ​    | 
-| 4/5   ​| ​ 26  |   ​      ​      ​| [[Homework 26]]  |                +| 3/29  |  24  |   ​| ​  No Class    ​                 ​| ​                 | 
-| 4/7   ​| ​ 27  |   ​| ​      ​      ​| [[Homework 27]]  |                +| 3/31  |  25  | Botnets ​ |  Post-Mortem of a Zombie: Conficker Cleanup After Six Years     ​| ​  ​Chris ​    | [[Homework ​25]]  |  [https://​www.usenix.org/​conference/​usenixsecurity15/​technical-sessions/​presentation/​asghari ​paper] ​               
-| 4/12  |  28  |   ​| ​      ​|       | [[Homework 28]]  ​|    Final Paper | +4/1        |   ​| ​      ​| ​      ​| ​                 |    Draft 2       ​
-| 4/15  |  -   ​| ​  ​| ​   Final Exam (7:00 PM - 10:00 PM) Gigapix ​Room TMCB   ​| ​ |   ​| ​    |+| 4/5   ​| ​ 26  |  ​Misc  ​ ​Forwarding-Loop Attacks in Content Delivery Networks ​      Kris     | [[Homework 26]]  |  ​[https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​forwarding-loop-attacks-content-delivery-networks.pdf paper] ​             ​
 +| 4/7   ​| ​ 27  |   ​| ​ ​Centrally Banked Cryptocurrencies ​      Jonathan ​   ​| [[Homework 27]]  |    ​[https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​centrally-banked-cryptocurrencies.pdf paper] ​           ​
 +| 4/12  |  28  |   ​| ​  No Class    ​|       ​| ​   ​|   Final Paper  
 +| 4/15  |  -   ​| ​  ​| ​   Final Exam (3:00 PM - 6:00 PM) CS Conference ​Room 3350 TMCB   ​| ​ |   ​| ​    |
  
cs-665/schedule-winter-2016.1455637579.txt.gz · Last modified: 2016/02/16 08:46 by seamons
Back to top
CC Attribution-Share Alike 4.0 International
chimeric.de = chi`s home Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0