University of Virginia, Department of Computer Science
CS551: Security and Privacy on the Internet, Fall 2000

Manifest: Wednesday 29 November - Monday 4 December

Assignments Due


Project Presentations


Wednesday, 29 November

Team 3: ISIS Online
Adam Spanberger, Kristen Rae Olvera, Mike Lanouette, Ryan Hammond

Team 2: Internet Credit Card Security Issues
Adam Scott Trost, Dev Batta, Son Truong Ho

Team 1: Securing Internet Chat
Aaron Bajek, Daniel George Loffredo, Jae Woo Pak, William GJ Halfond

Team 12: Smart Card Security
Gregory Kish, Jamie Walls, Rob Rex

Team 11: Bluetooth Security
Gerlando Falauto, Greg Lamm, Jagadesh Gadiyaram, Jorge Estrada Collado

Team 10: Digital Millenium Act and the DCSS Case
Elizabeth Partridge, Timothy Catlett, Victor Von Ludwig, William Haubert


Monday, 4 December

Team 7: Requirements for Building a Secure System for Online Performance Evalutions
Dan Rubin, James Tsai, James Watson, Philip Varner

Team 9: Copyright Protection with Fair Use
David Dobbs, Jennifer Kahng, Virginia Volk, William Greenwell

Team 8: Password-Reminder Systems
Dave Rubens, Jermaine McDonald, Jon Axisa, Ryan Persaud

Team 6: Server Side Macro Virus Filter
Christopher Hayden, John Loizeaux, Matthew Keller, William Foster

Team 5: A Study of the Secure Digital Music Initiative
Brandon Sutler, Jesse Robinson, Sachin Kamath, Vineet Aggarwal

Team 4: User Attacks
Andrew Snyder, Carl Morris, Tran Ngoc ("Ken") Nguyen

When you begin the Activation process, Microsoft Reader first checks to see if you are signed in on Microsoft Passport. Once you are signed in, Microsoft Reader collects unique information about your computer and sends it to a Microsoft Activation Server. The following information is transmitted:

  1. A Hardware Identification code, computed using serial numbers and other information unique to your computer. The code is computed in such a way that it is not possible to reconstruct your computer's unique information from the code, using a technique known as a "one-way hash function." In this way, Microsoft respects the privacy of information about your computer hardware while still providing you with access to copy protected content from eBook publishers.

Microsoft Reader Guidebook



Several years ago Microsoft made a big deal about Windows NT getting a C2 security rating. They were much less forthcoming with the fact that this rating only applied if the computer was not attached to a network and had no network card, had its floppy drive epoxied shut, and was running on a Compaq 386.

Bruce Schneier, Secrets and Lies


CS 655 University of Virginia
Department of Computer Science
CS 551: Security and Privacy on the Internet
David Evans
evans@cs.virginia.edu