Course Material

The papers in bold font are required reading and their content will be tested during quizzes.

Modules included in the course

The following content modules will be taught this time. Most of the lectures are based on recent papers from the top conferences and journals in computer security.

Course Orientation

Bootcamp in Computer Security

Adversary Models

  • lecture slides
  • Jonathan Herzog. 2005. A computational interpretation of Dolev-Yao adversaries. Theor. Comput. Sci. 340, 1 (June 2005), 57-81. DOI=10.1016/j.tcs.2005.03.003
  • Car breaking papers:
  • Chip and PIN is Broken, Murdoch, Steven J.; Drimer, Saar; Anderson, Ross; Bond, Mike; , “Chip and PIN is Broken,” Security and Privacy (SP), 2010 IEEE Symposium on , vol., no., pp.433-446, 16-19 May 2010, doi: 10.1109/SP.2010.33 (talk video)
  • Scott Wolchok, Eric Wustrow, J. Alex Halderman, Hari K. Prasad, Arun Kankipati, Sai Krishna Sakhamuri, Vasavya Yagati, and Rop Gonggrijp. 2010. Security analysis of India’s electronic voting machines. In Proceedings of the 17th ACM conference on Computer and communications security (CCS ’10). ACM, New York, NY, USA, 1-14. DOI=10.1145/1866307.1866309
  • “Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services” USENIX SEcurity 2013
  • Alex Halderman, Edward Felten, “Lessons from the Sony CD DRM Episode,” in Proceedings of the 15th USENIX Security Symposium, 31–August 4, 2006, Vancouver, BC, Canada. Presentation slides.
  • Matteo Bortolozzo, Matteo Centenaro, Riccardo Focardi, and Graham Steel. 2010. Attacking and fixing PKCS#11 security tokens. In Proceedings of the 17th ACM conference on Computer and communications security (CCS ’10). ACM, New York, NY, USA, 260-269. DOI=10.1145/1866307.1866337

Communication and Network Security

Wireless Security

On Passwords (and People)

Web Security

Usable Security

Software Security

Mobile Security

Cloud Security

Smart Meter/Grid Security & Privacy

Social Networks Security and Privacy

  • lecture slides
  • Lars Backstrom, Cynthia Dwork, and Jon Kleinberg. 2007. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In Proceedings of the 16th international conference on World Wide Web (WWW ’07). ACM, New York, NY, USA, 181-190.
  • Efficient and Scalable Socware Detection in Online Social Networks” USENIX Security 2012
  • “De-anonymizing Social Networks” (Oakland ’09)
  • Tao Stein, Erdong Chen, and Karan Mangla. 2011. Facebook immune system. In Proceedings of the 4th Workshop on Social Network Systems (SNS ’11). ACM, New York, NY, USA.
  • COMPA: Detecting Compromised Accounts on Social Networks” NDSS ’13 (optional section: 3)
  • Randy Baden, Adam Bender, Neil Spring, Bobby Bhattacharjee, and Daniel Starin. 2009. Persona: an online social network with user-defined privacy. In Proceedings of the ACM SIGCOMM 2009 conference on Data communication (SIGCOMM ’09). ACM, New York, NY, USA, 135-146.
  • Zi Chu; Gianvecchio, S.; Haining Wang; Jajodia, S., “Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?,” Dependable and Secure Computing, IEEE Transactions on , vol.9, no.6, pp.811,824, Nov.-Dec. 2012, doi: 10.1109/TDSC.2012.75 (optional section: 4)

Other Modules (not included in the 2013 version of the course)

Economics of Security (guest lecture by Prof. Hasan Cavusoglu)

Electronic Voting

  • “Clash Attacks on the Verifiability of E-Voting Systems” IEEE S&P ’12
  • Kohno, T.; Stubblefield, A.; Rubin, A.D.; Wallach, D.S., “Analysis of an electronic voting system,” In Proceedings IEEE Symposium on Security & Privacy, pp. 27- 40, 9-12 May 2004.
  • A. J. Feldman, J. A. Halderman, and E. W. Felten, Security Analysis of the Diebold AccuVote-TS Voting Machine, September 2006.
  • Küesters, R.; Truderung, T.; Vogt, A.; , “Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study,” IEEE Symposium on Security and Privacy (SP), pp.538-553, 22-25 May 2011
    doi: 10.1109/SP.2011.21
  • Garera, S. and Rubin, A. D. 2007. An independent audit framework for software dependent voting systems. In Proceedings of the 14th ACM Conference on Computer and Communications Security (Alexandria, Virginia, USA, October 28 – 31, 2007). CCS ’07. ACM, New York, NY, 256-265. DOI= http://doi.acm.org/10.1145/1315245.1315278
  • Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting, ACSAC 2007.
  • C. Karlof, N. Sastry, and D. Wagner, “Cryptographic Voting Protocols: A Systems Perspective,” USENIX Security 2005.
  • M. I. Shamos. Paper v. Electronic Voting Records – An Assessment, April 2004.
  • Scott Wolchok, Eric Wustrow, J. Alex Halderman, Hari K. Prasad, Arun Kankipati, Sai Krishna Sakhamuri, Vasavya Yagati, and Rop Gonggrijp. 2010. Security analysis of India’s electronic voting machines. In Proceedings of the 17th ACM conference on Computer and communications security (CCS ’10). ACM, New York, NY, USA, 1-14. DOI=10.1145/1866307.1866309

Authenticating people and machines over insecure networks

Privacy

Intrusion Detection

Sybils

Leave a Reply