Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
cs-665:schedule-winter-2016 [2016/02/29 11:03]
zappala
cs-665:schedule-winter-2016 [2016/03/17 14:47] (current)
seamons
Line 13: Line 13:
 | 2/11  |  12  | Attacks ​ |  Ad Injection at Scale: Assessing Deceptive Advertisement Modifications ​     |  Kris  | [[Homework 12]]  |   ​[https://​static.googleusercontent.com/​media/​research.google.com/​en//​pubs/​archive/​43346.pdf paper] ​    | | 2/11  |  12  | Attacks ​ |  Ad Injection at Scale: Assessing Deceptive Advertisement Modifications ​     |  Kris  | [[Homework 12]]  |   ​[https://​static.googleusercontent.com/​media/​research.google.com/​en//​pubs/​archive/​43346.pdf paper] ​    |
 | 2/18  |  13  |   ​| ​  Class Canceled ​   |   | [[Homework 13]]  |        | | 2/18  |  13  |   ​| ​  Class Canceled ​   |   | [[Homework 13]]  |        |
-| 2/23  |  14  |   ​|   ​Framing Dependencies Introduced by Underground Commoditization ​   |  Chris  | [[Homework 14]]  |  [http://​cseweb.ucsd.edu/​~savage/​papers/​WEIS15.pdf paper] ​      | +| 2/23  |  14  |  ​Misc  ​|   ​Framing Dependencies Introduced by Underground Commoditization ​   |  Chris  | [[Homework 14]]  |  [http://​cseweb.ucsd.edu/​~savage/​papers/​WEIS15.pdf paper] ​      | 
-| 2/25  |  15  |   ​|  Cookies Lack Integrity ​    ​| ​ Scott  | [[Homework 15]]  |  [https://​www.usenix.org/​conference/​usenixsecurity15/​technical-sessions/​presentation/​zheng paper] ​   | +| 2/25  |  15  |     ​|  Cookies Lack Integrity ​    ​| ​ Scott  | [[Homework 15]]  |  [https://​www.usenix.org/​conference/​usenixsecurity15/​technical-sessions/​presentation/​zheng paper] ​   | 
-| 3/1   ​| ​ 16  |   ​|  To Pin or Not to Pin     ​| ​ Jonathan ​   | [[Homework 16]]  |  [https://​www.usenix.org/​conference/​usenixsecurity15/​technical-sessions/​presentation/​oltrogge paper] ​     |+| 3/1   ​| ​ 16  |  ​Authentication  ​|  To Pin or Not to Pin     ​| ​ Jonathan ​   | [[Homework 16]]  |  [https://​www.usenix.org/​conference/​usenixsecurity15/​technical-sessions/​presentation/​oltrogge paper] ​     |
 | 3/3   ​| ​ 17  |   ​| ​ Ersatz Passwords ​     |   ​Craig ​  | [[Homework 17]]  |  [http://​dl.acm.org/​citation.cfm?​id=2818015 ​ paper] ​  | | 3/3   ​| ​ 17  |   ​| ​ Ersatz Passwords ​     |   ​Craig ​  | [[Homework 17]]  |  [http://​dl.acm.org/​citation.cfm?​id=2818015 ​ paper] ​  |
 | 3/8   ​| ​ 18  | Breaking TLS  |    Imperfect Forward Secrecy ​ |   ​Jeremy ​ | [[Homework 18]]  |  [https://​hal.inria.fr/​hal-01184171/​document paper] ​    | | 3/8   ​| ​ 18  | Breaking TLS  |    Imperfect Forward Secrecy ​ |   ​Jeremy ​ | [[Homework 18]]  |  [https://​hal.inria.fr/​hal-01184171/​document paper] ​    |
 | 3/10  |  19  |   ​| ​ Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH     ​| ​  ​Justin ​   | [[Homework 19]]  |  [https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​transcript-collision-attacks-breaking-authentication-tls-ike-ssh.pdf paper] ​   | | 3/10  |  19  |   ​| ​ Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH     ​| ​  ​Justin ​   | [[Homework 19]]  |  [https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​transcript-collision-attacks-breaking-authentication-tls-ike-ssh.pdf paper] ​   |
 | 3/11  |      |   ​| ​      ​| ​            ​| ​                 |    Annotated Bib      | | 3/11  |      |   ​| ​      ​| ​            ​| ​                 |    Annotated Bib      |
-| 3/15  |  20  | DDOS  |  ​SIBRAScalable Internet Bandwidth Reservation Architecture ​    |   Nathan ​  | [[Homework 20]]  |  [https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​sibra-scalable-internet-bandwidth-reservation-architecture.pdf  paper] ​      ​+| 3/15  |  20  | DDOS  |  ​SPIFFYInducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks ​    |   Tyler    ​| [[Homework 20]]  |  [https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​spiffy-inducing-cost-detectability-tradeoffs-persistent-link-flooding-attacks.pdf paper] ​     
-| 3/17  |  21  |   ​|  ​SPIFFYInducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks ​    |   Tyler    ​| [[Homework 21]]  |  [https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​spiffy-inducing-cost-detectability-tradeoffs-persistent-link-flooding-attacks.pdf paper] ​     |+| 3/17  |  21  |       ​|  ​SIBRAScalable Internet Bandwidth Reservation Architecture ​    |   Nathan ​  | [[Homework 21]]  |  [https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​sibra-scalable-internet-bandwidth-reservation-architecture.pdf  paper] ​      ​|
 | 3/18  |      |   ​| ​      ​| ​           |                  |    Draft 1       | | 3/18  |      |   ​| ​      ​| ​           |                  |    Draft 1       |
 | 3/22  |  22  | Anonymity ​ |  RAPTOR: Routing Attacks on Privacy in Tor     ​| ​  ​Elham ​   | [[Homework 22]]  |     ​[https://​www.usenix.org/​conference/​usenixsecurity15/​technical-sessions/​presentation/​sun ​ paper] ​   | | 3/22  |  22  | Anonymity ​ |  RAPTOR: Routing Attacks on Privacy in Tor     ​| ​  ​Elham ​   | [[Homework 22]]  |     ​[https://​www.usenix.org/​conference/​usenixsecurity15/​technical-sessions/​presentation/​sun ​ paper] ​   |
Line 30: Line 30:
 | 4/5   ​| ​ 26  |  Misc  |  Forwarding-Loop Attacks in Content Delivery Networks ​    ​| ​  ​Kris ​    | [[Homework 26]]  |  [https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​forwarding-loop-attacks-content-delivery-networks.pdf paper] ​             | | 4/5   ​| ​ 26  |  Misc  |  Forwarding-Loop Attacks in Content Delivery Networks ​    ​| ​  ​Kris ​    | [[Homework 26]]  |  [https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​forwarding-loop-attacks-content-delivery-networks.pdf paper] ​             |
 | 4/7   ​| ​ 27  |   ​| ​ Centrally Banked Cryptocurrencies ​    ​| ​  ​Jonathan ​   | [[Homework 27]]  |    [https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​centrally-banked-cryptocurrencies.pdf paper] ​           | | 4/7   ​| ​ 27  |   ​| ​ Centrally Banked Cryptocurrencies ​    ​| ​  ​Jonathan ​   | [[Homework 27]]  |    [https://​www.internetsociety.org/​sites/​default/​files/​blogs-media/​centrally-banked-cryptocurrencies.pdf paper] ​           |
-| 4/12  |  28  |   ​| ​  No Class    |       ​| ​[[Homework 28]]  ​|   Final Paper  | +| 4/12  |  28  |   ​| ​  No Class    |       ​| ​   |   Final Paper  | 
-| 4/15  |  -   ​| ​  ​| ​   Final Exam (7:00 PM - 10:00 PM) Gigapix ​Room TMCB   ​| ​ |   ​| ​    |+| 4/15  |  -   ​| ​  ​| ​   Final Exam (3:00 PM - 6:00 PM) CS Conference ​Room 3350 TMCB   ​| ​ |   ​| ​    |
  
cs-665/schedule-winter-2016.1456769021.txt.gz · Last modified: 2016/02/29 11:03 by zappala
Back to top
CC Attribution-Share Alike 4.0 International
chimeric.de = chi`s home Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0