Course Schedule Spring 2018

This schedule is subject to change. Please check back frequently.


Week Date Topic Readings
Week 1 Mar 27
Intro; Security & Crypto Crash Course I
Mar 29
Accountability & Transparency I

Assigned:
CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds. Nikitin, Kokoris-Kogias, Jovanovic, Gasser, Gailly, Khoffi, Cappos, Ford. USENIX Security. 2017.

Week 2 Apr 3
Accountability & Transparency II; Security & Crypto Crash Course II

Assigned:
Accountable Virtual Machines. Haeberlen, Aditya, Rodrigues, Druschel. OSDI. 2010.

Recommended:

Apr 5
Accountability & Transparency III

Assigned:
The Efficient Server Audit Problem, Deduplicated Re-execution, and the Web. Tan, Yu, Leners, Walfish. SOSP. 2017.

Week 3 Apr 10
Certificates & Keys

Assigned:

Recommended:

Apr 12
TLS and HTTPS

Assigned:
TLS-N: Non-repudiation over TLS Enabling Ubiquitous Content Signing for Disintermediation. Ritzdorf, Wüst, Gervais, Felley, Čapkun. NDSS. 2018.

Week 4 Apr 17
Anonymity I

Assigned:

Apr 19
Anonymity II

Assigned:
Stadium: A Distributed Metadata-Private Messaging System. Tyagi, Gilad, Zaharia, Zeldovich. SOSP. 2017.

Week 5 Apr 24
No class.
Apr 26
Oblivious Storage

Assigned:
ObliviSync: Practical Oblivious File Backup and Synchronization. Aviv, Choi, Mayberry, Roche. NDSS. 2017.

Week 6 May 1
Trusted Execution Environments

Assigned:

Recommended:

May 3
Side Channels I

Assigned:
CLKSCREW: Exposing the perils of security-oblivious energy management. Tang, Sethumadhavan, Stolfo. Usenix Security. 2017.

Week 7 May 8
Side Channels II

Assigned:

May 10
Side Channels III

Assigned:
SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution. Chen, Chen, Xiao, Zhang, Lin, Lai. CoRR. 2018.

Week 8 May 15
Cryptocurrencies: Intro.

Assigned:

Recommended:

May 17
Cryptocurrencies: Buying Physical Goods

Assigned:
Escrow protocols for cryptocurrencies: How to buy physical goods using Bitcoin. Goldfeder, Bonneau, Gennaro, Narayanan. Financial Cryptography and Data Security. 2017.

Week 9 May 22
Verifiable Computation

Assigned:

Recommended:

May 24
Cryptocurrencies: Anonymity

Assigned:

Recommended:
Bitcoin and Cryptocurrency Technologies. Narayanan, Bonneau, Felten, Miller, Goldfeder. 2016. Ch. 6.

Week 10 May 29
Cryptocurrencies: Smart Contracts

Assigned:
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Kosba, Miller, Shi, Wen, Papamanthou. Oakland. 2016.

Recommended:

May 31
Cryptocurrencies as a Platform

Assigned:
Blockstack: A Global Naming and Storage System Secured by Blockchains. Ali, Nelson, Shea, Freedman. USENIX ATC. 2016.

Recommended:

Unfortunately, some articles require a paid subscription to a journal or digital library. These articles are linked via the UChicago library proxy, and you must authenticate with your CNetID to view them.