Week |
Date |
Topic |
Readings |
Week 1
|
Mar 28
|
Introduction
|
|
Mar 30
|
TLS and HTTPS
|
Assigned:
-
DROWN: Breaking TLS using SSLv2. Aviram, Schinzel, Somorovsky, Heninger, Dankel, Steube, Valenta, Adrian, Halderman, Dukhovni, K{\"{a}}sper, Cohney, Engels, Paar, Shavitt. In submission. 2016.
-
Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS. Garman, Paterson, {Van Der Merwe}, Holloway. Usenix Security. 2015.
Recommended:
-
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice. Adrian, Bhargavan, Durumeric, Gaudry, Green, Halderman, Heninger, Springall, Thom{\'{e}}, Valenta, Vandersloot, Wustrow, Paul. CCS. 2015.
-
Lucky thirteen: Breaking the TLS and DTLS record protocols. AlFardan, Paterson. Oakland. 2013.
-
The First Few Milliseconds of an HTTPS Connection. Moser. 2009.
-
The Transport Layer Security (TLS) Protocol, Version 1.2. Dierks, Rescorla. 2008.
|
Week 2
|
Apr 4
|
Certificates
|
Assigned:
Recommended:
|
Apr 6
|
Secure Messaging
|
Assigned:
-
SoK: Secure Messaging. Unger, Dechand, Bonneau, Fahl, Perl, Goldberg, Smith. 2015.
-
Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage. Garman, Green, Kaptchuk, Miers, Rushanan. In submission. 2016.
|
Week 3
|
Apr 11
|
Passwords
|
Assigned:
-
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. Bonneau, Herley, Van Oorschot, Stajano. Oakland. 2012.
-
Measuring real-world accuracies and biases in modeling password guessability. Ur, Segreti, Bauer, Christin, Cranor, Komanduri, Kurilova, Mazurek, Melicher, Shay. Usenix Security. 2015.
Recommended:
|
Apr 13
|
Usable Security
|
Assigned:
Recommended:
-
So long, and no thanks for the externalities: the rational rejection of security advice by users. Herley. NSPW. 2009.
-
The psychology of security for the home computer user. Howe, Ray, Roberts, Urbanska, Byrne. Oakland. 2012.
-
Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System. Clark, Goodspeed, Metzger, Wasserman, Xu, Blaze. Usenix Security. 2011.
|
Week 4
|
Apr 18
|
Web Security
|
Assigned:
Recommended:
|
Apr 20
|
Memory Safety
|
Assigned:
|
Week 5
|
Apr 25
|
Isolation
|
Assigned:
-
Native client: A sandbox for portable, untrusted x86 native code. Yee, Sehr, Dardyk, Chen, Muth, Ormandy, Okasaka, Narula, Fullagar. Oakland. 2009.
-
Capsicum: practical capabilities for UNIX. Watson, Anderson, Laurie, Kennaway. Usenix Security. 2010.
Recommended:
|
Apr 29
Ry 276
|
Trusted Computing I
|
Assigned:
Recommended:
-
Reflections on trusting trust. Thompson. Communications of the ACM. 1984.
-
The ten page introduction to trusted computing. Martin, Others. Computing Laboratory, Oxford University Oxford. 2008.
-
TrInc: Small Trusted Hardware for Large Distributed Systems. Levin, Douceur, Lorch, Moscibroda. NSDI. 2009.
-
Logical attestation: an authorization architecture for trustworthy computing. Sirer, de Bruijn, Reynolds, Shieh, Walsh, Williams, Schneider. SOSP. 2011.
|
Week 6
|
May 2
|
Trusted Computing II
|
Assigned:
Recommended:
-
Intel SGX Explained. Costan, Devadas. 2015.
-
OpenSGX: An Open Platform for SGX Research. Jain, Desai, Kim, Shih, Lee, Choi, Shin, Kim, Kang, Han. NDSS. 2016.
|
May 4
|
BFT
|
Assigned:
|
Week 7
|
May 9
|
Untrusted Cloud I
|
Assigned:
Recommended:
|
May 11
|
Untrusted Cloud II
|
Assigned:
Recommended:
-
Social networking with frientegrity: privacy and integrity with an untrusted provider. Feldman, Blankstein, Freedman, Felten. Usenix Security. 2012.
-
Building web applications on top of encrypted data using Mylar. Helfer, Valdez, Popa, Stark, Zeldovich, Kaashoek, Balakrishnan. NSDI. 2014.
-
Accountable Virtual Machines. Haeberlen, Aditya, Rodrigues, Druschel. OSDI. 2010.
-
Efficient Data Structures for Tamper-Evident Logging. Crosby, Wallach. Usenix Security. 2009.
|
Week 8
|
May 16
|
Verifiable Computation I
|
Assigned:
Recommended:
-
Making argument systems for outsourced computation practical (sometimes). Setty, McPherson, Blumberg, Walfish. NDSS. 2012.
-
Taking proof-based verified computation a few steps closer to practicality. Setty, Vu, Panpalia, Braun. Usenix Security. 2012.
-
Resolving the conflict between generality and plausibility in verified computation. Setty, Braun, Vu, Blumberg, Parno, Walfish. EuroSys. 2013.
|
May 18
|
Verifiable Computation II
|
Assigned:
Recommended:
|
Week 9
|
May 26
Ry 276
|
Privacy and Web Advertising
|
Assigned:
Recommended:
|
Week 10
|
May 30
|
Memorial Day – No class
|
|
Jun 1
|
Anonymity and Anticensorship
|
Assigned:
Recommended:
-
The parrot is dead: Observing unobservable network communications. Houmansadr, Brubaker, Shmatikov. Oakland. 2013.
-
A Critical Evaluation of Website Fingerprinting Attacks. Juarez, Afroz, Acar, Diaz, Greenstadt, Berkeley. CCS. 2014.
-
Dissent: Accountable Anonymous Group Messaging. Corrigan-Gibbs, Ford. CCS. 2010.
-
Proactively Accountable Anonymous Messaging in Verdict. Corrigan-Gibbs, Wolinsky, Ford. Usenix Security. 2013.
|
Jun 3
Ry 276
|
Side Channels
|
Assigned:
Recommended:
-
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. Ristenpart, Tromer, Shacham, Savage. CCS. 2009.
-
When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography. Ristenpart, Yilek. NDSS. 2010.
-
Cross-VM side channels and their use to extract private keys. Zhang, Juels, Reiter, Ristenpart. CCS. 2012.
-
Scheduler-based Defenses against Cross-VM. Varadarajan, Ristenpart, Swift. Usenix Security. 2014.
-
Cross-Tenant Side-Channel Attacks in PaaS Clouds. Juels, Ristenpart, Reiter. CCS. 2014.
|