Skip to main content Link Search Menu Expand Document (external link) Copy Copied

Schedule

This is a tentative schedule. Things will change / evolve as we work through discussions together.

DateClass TopicDeadlines
8/22/2022Introduction
- This World of Ours
- The Security Mindset
 
8/24/2022Passwords
- The Tangled Web of Password Reuse
 
8/29/2022Passwords
- Your Pa$$word doesn’t matter
- Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks
 
8/31/2022Metadata
- Metadata: Piecing Together a Privacy Solution
 
9/5/2022No class 
9/7/2022Anonymous Authentication
- Blind signatures for untraceable payments
 
9/12/2022Academic Writing
- The Craft of Writing Effectively
 
9/14/2022Anonymity
- Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
 
9/19/2022Project Discussions 
9/21/2022Anonymity
- Tor: The Second-Generation Onion Router
 
9/26/2022Anonymity
- Crowds: Anonymity for Web Transactions
 
9/28/2022Attacking Anonymity
- Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries.
Project Proposal
10/3/2022Attacking Anonymity
- Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services
 
10/5/2022Stronger Anonymity
- Vuvuzela: Scalable Private Messaging Resistant to Traffic Analysis
 
10/10/2022Practical Anonymity
- iCloud Private Relay Overview
- iCloud Private Relay: information for Cloudflare customers
Project Proposal Reviews
10/12/2022Censorship
- Alibi Routing
 
10/17/2022Censorship
- Blocking-resistant communication through domain fronting
 
10/19/2022Censorship
- The Parrot is Dead: Observing Unobservable Network Communications
 
10/24/2022Mobile Censorship Resistance
- Moby: A Blackout-Resistant Anonymity Network for Mobile Devices
 
10/26/2022Mobile Location Attacks
- Location Leaks on the GSM Air Interface
Security Reviews
10/31/2022Mobile Location Anonymity
- Pretty Good Phone Privacy
 
11/2/2022Mobile Apps
- An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps
 
11/7/2022- 
11/9/2022ML for Security
- Outside the Closed World: On Using Machine Learning For Network Intrusion Detection
 
11/14/2022No class: work on your project 
11/16/2022No class: work on your project 
11/21/2022Security Review Presentations
ML Privacy Attacks
- Membership Inference Attacks Against Machine Learning Models
 
11/23/2022Network Protocols
- Oblivious DNS: Practical Privacy for DNS Queries
Final Project Deliverable
11/28/2022IoT
- Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices
 
11/30/2022IoT
- Information Exposure From Consumer IoT Devices
 
12/5/2022Ethics
- Rogaway: The Moral Character of Cryptographic Work
Paper Reviews
12/7/2022Project PresentationsRevised Papers Due