Project Presentations

December 8th, 2009 by David Evans

Please email me a link to your presentation slides (which I will add to the schedule in the previous post). Thanks!


Presentation Schedule

November 30th, 2009 by David Evans

Here’s the schedule for the project presentations:

Tuesday, 1 December
Derek Davis, Improved Security Through Dynamic Instrumentation
Michael Deighan, Secure Electronic Health Records: The German Experience
Carrie Ruppar and Ryan Layer
Zak Fry

Thursday, 3 December
Kirti Chawla, Analyzing and Safeguarding Human-Kinesics Information in Wirelessly Instrumented Space
Yan Huang
Tianhao Tong, Secure Data from Unknown Third Party Gadgets
Yu Yao and Jiawei Wang

Tuesday, 8 December
Yuchen Zhou
Mona Sergi and Paul Diorio, Information in Camoflauge
Minh Le
Ming Mao and Chih-hao Shen, Web Services in Clouds with Privacy Almost FREE

You should prepare to give a 15 minute presentation on your project, and there will be a few minutes for questions following your presentation. You’ll find some advice for giving good talks here.

The final project reports are due Friday, December 11 (by 4:59pm). See the project page for details on the final reports. Please turn in your report both on paper (drop off at my office) and by email.


Paper for Nov. 19 – The Protection of Information in Computer Systems

November 17th, 2009 by mdeighan

Read Section 1, Basic Principles Of Information Protection, for Thursday


Paper for Nov 12 – Native Client: A Sandbox for Portable, Untrusted x86 Native Code

November 5th, 2009 by Ming

Best paper award for 2009 S&P

http://nativeclient.googlecode.com/svn/trunk/src/native_client/documentation/nacl_paper.pdf


Paper for Nov. 5 – Your Botnet is My Botnet

November 1st, 2009 by chih-hao

Your Botnet is My Botnet: Analysis of a Botnet Takeover by Stone-Gross et al. In Proceedings of CCS 2009. ACM Press, Nov. 2009. [PDF]


Readings for Thursday October 29th:

October 22nd, 2009 by Carrie Ruppar

From the DNI’s 60 Day Cyberspace Policy Review:
http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf

Executive Summary
Section 4: Incident Response  pages 24-30
Section 5 Encouraging Innovation pages 31-36

From Securing Cyberspace for the 44th Presidency:
http://csis.org/files/media/csis/pubs/081208_securingcyberspace_44.pdf
Section 5: Identity Management in Cybersecurity pages 61-65


Oct. 22 paper on RSA: [A Method for Obtaining Digital Signatures and Public-Key Cryptosystems]

October 13th, 2009 by jh3wn

A Method for Obtaining Digital Signatures and Public-Key Cryptosystems by R.L. Rivest, A. Shamir, and L. Adleman, Communications of the ACM 21,2 (Feb. 1978), 120–126.


Upcoming Schedule: Project Proposals

October 10th, 2009 by David Evans

According to the original syllabus, project proposals are due Tuesday, October 13. I will accept proposal by email (without penalty) until 5pm on Friday, Oct 16. There will be no class on Thursday, October 15. On Tuesday, October 20, we will discuss the projects. Everyone should be prepared on Oct 20th to give a short (4-minute) presentation that motivates and describes your project (you may use slides for this if you want).

As a reminder from the project page, the project proposal should include:

  • Clear Statement of the Problem — what question is your
    project seeking to answer? If your project is successful, what will the
    research community know after you are done that it does not already
    know.

  • Motivation — why is your problem interesting and
    important?

  • Related Work — this doesn’t need to be complete yet,
    but should be enough to show the problem is relevant and interesting and
    make it clear what has and has not already been solved by other
    researchers. You should make sure to relate the related work to your
    project, not just summarize a lot of papers you have read. For every
    work you describe, your related work section should explain clearly why
    it is relevant to what you want to do.

  • Research Plan — concrete description of what you plan
    to do. Your research plan must include clear milestones for every week
    until the end of the project.

  • Evaluation — description of how you will decide if the
    project is successful. How do you know if you have answered the problem
    question? Note that your project does not need to be a
    successful research project to satisfy the requirements for the
    course project, but you do need some way of evaluating the success of
    your project.

We expect most project proposals will be about 5 pages long, but there
is no strict length requirement or expectation.


Next Tuesday

September 29th, 2009 by David Evans

We’ll meet as normal next Tuesday (Oct 6), even though this is a University reading day. (Consider this a “make-up” meeting for Thursday, Oct 15 when we will not meet.)


Paper for Oct 1 – The New Casper

September 27th, 2009 by ZakFry

The New Casper: Query Processing for Location Services without Compromising Privacy By Mohamed F. Mokbel, Chi-Yin Chow, Walid G. Aref. In Proceedings of the 32nd International Conference on Very Large Data Bases.