Schedule

This is a tentative schedule. Things will change / evolve as we work through discussions together.

WeekClass TopicDeadlines
8/26/2024Introduction
- This World of Ours (2014)
- The Security Mindset (2008)
 
8/28/2024Introduction
- How to Read a Paper (2007)
Passwords
- The Tangled Web of Password Reuse (2014)
 
9/2/2024No class 
9/4/2024Passwords
- Your Pa$$word doesn’t matter (2019)
- Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks (2016)
 
9/9/2024Biometric Auth
- Impact of Artificial “Gummy” Fingers on Fingerprint Systems (2002)
Metadata
- Metadata: Piecing Together a Privacy Solution (2014)
 
9/11/2024Anonymous Authentication
- Blind signatures for untraceable payments (1983)
 
9/16/2024Project Discussions 
9/18/2024Academic Writing
- The Craft of Writing Effectively
 
9/23/2024Anonymity
- Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms (1981)
 
9/25/2024Anonymity
- Tor: The Second-Generation Onion Router (2004)
Project Proposal
9/30/2024Anonymity
- Crowds: Anonymity for Web Transactions (1998)
 
10/2/2024Attacking Tor
- Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries (2013)
 
10/7/2024Attacking Tor
- Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services (2015)
 
10/9/2024Stronger Anonymity
- Vuvuzela: Scalable Private Messaging Resistant to Traffic Analysis (2015)
Project Proposal Reviews
10/14/2024Practical Anonymity
- The Decoupling Principle: A Practical Privacy Framework (2022)
- iCloud Private Relay Overview (2021)
 
10/16/2024Censorship
- Alibi Routing (2015)
 
10/21/2024Censorship
- Blocking-resistant communication through domain fronting (2015)
 
10/23/2024Censorship
- The Parrot is Dead: Observing Unobservable Network Communications (2013)
Security Reviews
10/28/2024Mobile Censorship Resistance
- Moby: A Blackout-Resistant Anonymity Network for Mobile Devices (2022)
 
10/30/2024Security Review Presentations 
11/4/2024Mobile Location Attacks
- Location Leaks on the GSM Air Interface (2012)
 
11/6/2024Mobile Location Anonymity
- Pretty Good Phone Privacy (2021)
 
11/11/2024No class 
11/13/2024Mobile Apps
- An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps (2016)
 
11/18/2024No class: work on your project 
11/20/2024No class: work on your projectFull Paper Deliverable
11/25/2024ML for Security
- Outside the Closed World: On Using Machine Learning For Network Intrusion Detection (2010)
 
11/27/2024ML Privacy Attacks
- Membership Inference Attacks Against Machine Learning Models (2017)
 
12/2/2024IoT
- Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices (2019)
 
12/4/2024IoT
- Information Exposure From Consumer IoT Devices (2019)
Paper Reviews
12/9/2024Ethics
- Rogaway: The Moral Character of Cryptographic Work (2015)
 
12/11/2024Project PresentationsRevised Papers Due