Schedule

This is a tentative schedule. Things will change / evolve as we work through discussions together.

WeekClass TopicDeadlines
1Introduction
- This World of Ours
- The Security Mindset
- How to Read a Paper
Passwords
- The Tangled Web of Password Reuse
 
2Passwords
- Your Pa$$word doesn’t matter
- Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks
Biometric Auth
- Impact of Artificial “Gummy” Fingers on Fingerprint Systems
 
3Metadata
- Metadata: Piecing Together a Privacy Solution
Anonymity
- Blind signatures for untraceable payments
 
4Project Discussions
Academic Writing
- The Craft of Writing Effectively
 
5Anonymity
- Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
- Tor: The Second-Generation Onion Router
Project Proposal
6Anonymity
- Crowds: Anonymity for Web Transactions
Attacking Anonymity
- Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries.
 
7Attacking Anonymity
- Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services
Stronger Anonymity
- Vuvuzela: Scalable Private Messaging Resistant to Traffic Analysis
Project Proposal Reviews
8Practical Anonymity
- The Decoupling Principle: A Practical Privacy Framework
- iCloud Private Relay Overview
Censorship
- Alibi Routing
 
9Censorship
- Blocking-resistant communication through domain fronting
- The Parrot is Dead: Observing Unobservable Network Communications
Security Reviews
10Mobile Censorship Resistance
- Moby: A Blackout-Resistant Anonymity Network for Mobile Devices
Mobile Location Attacks
- Location Leaks on the GSM Air Interface
 
11Mobile Location Anonymity
- Pretty Good Phone Privacy
Mobile Apps
- An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps
 
12Security Review Presentations
ML for Security
- Outside the Closed World: On Using Machine Learning For Network Intrusion Detection
 
13No class - work on your projectsFull Paper Deliverable
14ML Privacy Attacks
- Membership Inference Attacks Against Machine Learning Models
Network Protocols
- Oblivious DNS: Practical Privacy for DNS Queries
 
15Ethics
- Rogaway: The Moral Character of Cryptographic Work
Paper Reviews
16Project Presentations 
17Finals WeekRevised Papers Due