Skip to main content
Link
Menu
Expand
(external link)
Copy
Copied
Home
Home
2024 Fall EE693F
Schedule
Project
Security Review
2024 Spring EE449
Schedule
2023 Fall EE693F
Schedule
Project
Security Review
2023 Spring EE449
Schedule
2022 Fall EE693F
Schedule
Project
Security Review
Additional Resources
Home
2023 Fall EE693F
Schedule
Schedule
This is a
tentative
schedule. Things will change / evolve as we work through discussions together.
Week
Class Topic
Deadlines
1
Introduction
-
This World of Ours
-
The Security Mindset
-
How to Read a Paper
Passwords
-
The Tangled Web of Password Reuse
2
Passwords
-
Your Pa$$word doesn’t matter
-
Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks
Biometric Auth
-
Impact of Artificial “Gummy” Fingers on Fingerprint Systems
3
Metadata
-
Metadata: Piecing Together a Privacy Solution
Anonymity
-
Blind signatures for untraceable payments
4
Project Discussions
Academic Writing
-
The Craft of Writing Effectively
5
Anonymity
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
Tor: The Second-Generation Onion Router
Project Proposal
6
Anonymity
-
Crowds: Anonymity for Web Transactions
Attacking Anonymity
-
Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries.
7
Attacking Anonymity
-
Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services
Stronger Anonymity
-
Vuvuzela: Scalable Private Messaging Resistant to Traffic Analysis
Project Proposal Reviews
8
Practical Anonymity
-
The Decoupling Principle: A Practical Privacy Framework
-
iCloud Private Relay Overview
Censorship
-
Alibi Routing
9
Censorship
-
Blocking-resistant communication through domain fronting
-
The Parrot is Dead: Observing Unobservable Network Communications
Security Reviews
10
Mobile Censorship Resistance
-
Moby: A Blackout-Resistant Anonymity Network for Mobile Devices
Mobile Location Attacks
-
Location Leaks on the GSM Air Interface
11
Mobile Location Anonymity
-
Pretty Good Phone Privacy
Mobile Apps
-
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps
12
Security Review Presentations
ML for Security
-
Outside the Closed World: On Using Machine Learning For Network Intrusion Detection
13
No class - work on your projects
Full Paper Deliverable
14
ML Privacy Attacks
-
Membership Inference Attacks Against Machine Learning Models
Network Protocols
-
Oblivious DNS: Practical Privacy for DNS Queries
15
Ethics
-
Rogaway: The Moral Character of Cryptographic Work
Paper Reviews
16
Project Presentations
17
Finals Week
Revised Papers Due