Week 1
No class
No reading.
No class
No reading.
Week 2
Introduction
No reading.
Michael Rushanan
Reading:
K. Bhargavan and A. Delignat-Lavaud Web-based Attacks on Host-Proof Encrypted Storage
Week 3
Christina Garman
Reading:
C.V. Wright et al. Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations
C.V. Wright et al. Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? (no summary required)
A. White et al. Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on fon-iks (no summary required)
Paul Martin
Reading:
J. Jiang et al. Ghost Domain Names: Revoked Yet Still Resolvable
D. Dagon et al. Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority (no summary required)
Week 4
Steven Presser
Reading:
Week 5
Aditya Kamalakkannan
Reading:
Matt Brocker
Reading:
B. Driessen et al. Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards
Week 6
Madeline Stone
Reading:
S. Jana and V. Shmatikov Memento: Learning Secrets from Process Footprints
No class
No reading.
Week 7
Kartik Thapar
Reading:
MDSec iOS Application (In)Security
D. Blazakis The Apple Sandbox (no summary required)
Stephen Checkoway
Reading:
S. Checkoway and H. Shacham. Iago Attacks: Why The System Call API Is a Bad Untrusted RPC Interface
Week 8
Spring break
No reading.
Spring break
No reading.
Week 9
Balaji Dhamodharaswamy
Reading:
Week 10
Bakul Singhal
Reading:
N. Carlini et al. An Evaluation of the Google Chrome Extension Security Architecture
Anupam Mehta
Reading:
N. Heninger et al. Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices
Week 11
Sandeep Savarala
Reading:
L. Liu et al. Chrome Extensions: Threat Analysis and Countermeasures
Lalit Jagotra
Reading:
Week 12
Deeba Azmath
Reading:
T. Nighswander et al. GPS Software Attacks
Yashvier Kosaraju
Reading:
N.J. AlFardan and K.G. Paterson Lucky Thirteen: Breaking the TLS and DTLS Record Protocols
Week 13
Amritha Kalathummarath
Reading:
No class
No reading.
Week 14