Calendar

Date Paper to critique and discuss Presenter
January 8
  1. Introduction and overview of the course
  2. Specifics of research in computer security
January 10 Write 2 page summary of: Boyd, D. M. and Ellison, N. B. (2008), “Social Network Sites: Definition, History, and Scholarship,” Journal of Computer-Mediated Communication, 13: 210–230. doi: 10.1111/j.1083- 6101.2007.00393.x
January 15 Critiquing & Presenting Research Papers

  1. Write and bring summary of A. J. Smith, “The Task of the Referee”, IEEE Computer 23 (4), pp. 46-51, April 1990.
  2. Read and be ready to explain: Narayanan, Arvind, and Vitaly Shmatikov. “De-anonymizing social networks,” In Security and Privacy, 2009 30th IEEE Symposium on, pp. 173-187. IEEE, 2009.
Yazan
January 17 Ralph Gross and Alessandro Acquisti. 2005. “Information revelation and privacy in online social networks,” In Proceedings of the 2005 ACM workshop on Privacy in the electronic society (WPES ’05). ACM, New York, NY, USA, 71-80. Sadeqh
January 22 Gao, Hongyu, et al. “Detecting and characterizing social spam campaigns,” Proceedings of the 10th annual conference on Internet measurement. ACM, 2010. Hootan
January 24  Wondracek, G., Holz, T., Kirda, E., Kruegel, C., “A Practical Attack to De-Anonymize Social Network Users,” In: IEEE Symposium on Security and Privacy (S & P), 2010. Charanpreet
January 29 & 31  Research Paper Proposals Blitz. Everybody presents his/her proposal for discussion.
February 5  Mudhakar Srivatsa and Mike Hicks. 2012. “Deanonymizing mobility traces: using social network as a side-channel,” In Proceedings of the 2012 ACM conference on Computer and communications security (CCS ’12). ACM, New York, NY, USA, 628-637. DOI=10.1145/2382196.2382262 Dana
February 7 L. Bilge, T. Strufe, D. Balzarotti, E. Kirda, “All your contacts are belong to us: automated identity theft attacks on social networks,” in Proceedings of the 18th International Conference on World Wide Web, ACM, New York, NY, USA, 2009, pp. 551–560. doi:http://doi.acm.org/10.1145/1526709.1526784. 3, 4
Jana
February 12 Cao, Qiang, et al. “Aiding the detection of fake accounts in large scale social online services,” Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation. USENIX Association, 2012. Yazan
February 14  Yinglian Xie, Fang Yu, Qifa Ke, Martin Abadi, Eliot Gillum, Krish Vitaldevaria, Jason Walter, Junxian Huang, and Zhuoqing Morley Mao. 2012. “Innocent by association: early recognition of legitimate users,” In Proceedings of the 2012 ACM conference on Computer and communications security (CCS ’12). ACM, New York, NY, USA, 353-364. DOI=10.1145/2382196.2382235
Kartik
February 19 & 21 Reading Week! No classes. Work on the pre-final draft of the term paper.
February 26 Pre-final draft of the term paper due
February 26 Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Ben Y. Zhao, and Yafei Dai. 2011. “Uncovering social network sybils in the wild,” In Proceedings of the 2011 ACM SIGCOMM conference on Internet Measurement Conference (IMC ’11). ACM, New York, NY, USA, 259-268. Yazan
February 28 Tao Stein, Erdong Chen, and Karan Mangla. 2011. “Facebook Immune System,” In Proceedings of the 4th Workshop on Social Network Systems (SNS ’11). ACM, New York, NY, USA.
Golnaz
March 5   Liu, Yabing, et al. “Analyzing Facebook privacy settings: User expectations vs. reality,” Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. ACM, 2011. Sadeqh
March 7  Bonneau, Joseph, and Sören Preibusch, “The privacy jungle: On the market for data protection in social networks,” Economics of information security and privacy (2010): 121-167. Karthik
March 12  Fred Stutzman, Jacob Kramer-Duffield. “Friends Only: Examining a Privacy-Enhancing Behavior in Facebook” CHI 2010.
Charanpreet
March 14  Serge Egelman, Andrew Oates, Shriram Krishnamurthi. “Oops, I Did It Again: Mitigating Repeated Access Control Errors on Facebook” CHI 2011
Hootan
March 19  Simon Jones and Eamonn O’Neill. “Feasibility of Structural Network Clustering for Group-Based Privacy Control in Social Networks,” SOUPS 2010.  Jana
March 21  Felt, Adrienne, and David Evans. “Privacy protection for social networking APIs,” 2008 Web 2.0 Security and Privacy (W2SP’08) (2008). Golnaz
March 26 Randy Baden, Adam Bender, Neil Spring, Bobby Bhattacharjee, and Daniel Starin. 2009. “Persona: an online social network with user-defined privacy,” In Proceedings of the ACM SIGCOMM 2009 conference on Data communication (SIGCOMM ’09). ACM, New York, NY, USA, 135-146. Hootan
March 28 A. Besmer, H. Lipford, M. Shehab, and G. Cheek. “Social Applications: Exploring A More Secure Framework,” SOUPS 2009. Dana
April 2 & 4 Finalizing paper and preparing presentation (no classes)
April 10 Course mini-conference (All day!) KAIS 2020
April 17 Final versions of the term papers are due.
April 26 Peer reviews of the term papers are due