Skip to main content Link Search Menu Expand Document (external link) Copy Copied


This is a tentative schedule. Things will change / evolve as we work through discussions together.

DateClass TopicDeadlines
- This World of Ours
- The Security Mindset
- The Tangled Web of Password Reuse
- Your Pa$$word doesn’t matter
- Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks
- Metadata: Piecing Together a Privacy Solution
9/5/2022No class 
9/7/2022Anonymous Authentication
- Blind signatures for untraceable payments
9/12/2022Academic Writing
- The Craft of Writing Effectively
- Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
9/19/2022Project Discussions 
- Tor: The Second-Generation Onion Router
- Crowds: Anonymity for Web Transactions
9/28/2022Attacking Anonymity
- Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries.
Project Proposal
10/3/2022Attacking Anonymity
- Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services
10/5/2022Stronger Anonymity
- Vuvuzela: Scalable Private Messaging Resistant to Traffic Analysis
10/10/2022Practical Anonymity
- iCloud Private Relay Overview
- iCloud Private Relay: information for Cloudflare customers
Project Proposal Reviews
- Alibi Routing
- Blocking-resistant communication through domain fronting
- The Parrot is Dead: Observing Unobservable Network Communications
10/24/2022Mobile Censorship Resistance
- Moby: A Blackout-Resistant Anonymity Network for Mobile Devices
10/26/2022Mobile Location Attacks
- Location Leaks on the GSM Air Interface
Security Reviews
10/31/2022Mobile Location Anonymity
- Pretty Good Phone Privacy
11/2/2022Mobile Apps
- An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps
11/9/2022ML for Security
- Outside the Closed World: On Using Machine Learning For Network Intrusion Detection
11/14/2022No class: work on your project 
11/16/2022No class: work on your project 
11/21/2022Security Review Presentations
ML Privacy Attacks
- Membership Inference Attacks Against Machine Learning Models
11/23/2022Network Protocols
- Oblivious DNS: Practical Privacy for DNS Queries
Final Project Deliverable
- Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices
- Information Exposure From Consumer IoT Devices
- Rogaway: The Moral Character of Cryptographic Work
Paper Reviews
12/7/2022Project PresentationsRevised Papers Due