CSE 599 G/H (Autumn 2006)

Selected Topics in Computer Security


Class Schedule

Date

Topic and readings

09/27/2006

Course Introduction

Assigned Readings: None

10/02/2006

Usability

Assigned Readings:

10/04/2006

Usability

Assigned Readings:

10/09/2006

Usability and Ubiquitous Devices

Assigned Readings:

10/11/2006

RFIDs

Presenter: Nick.

Assigned Readings:

10/16/2006

Limits of Encryption

Assigned Readings:

10/18/2006

Covert Channels

Presenter: Carl.

Assigned Readings:

10/20/2006

Project

Project proposals due.

10/23/2006

Social Applications (Guest Lecture: David W. McDonald)

Guest Lecture: David W. McDonald.

Assigned Readings: None.

Related Papers:

10/25/2006

Electronic Voting (Guest Lecture: Josh Benaloh)

Guest Lecture: Josh Benaloh.

Title: Verifiable Election Technologies: Simplifying a Quarter Century of Research

Abstract: Extensive cryptography research over last quarter century has produced verifiable election protocols which offer integrity guarantees far better than any widely-deployed election technology, yet these methodologies have rarely (if ever) been used in actual elections. One reason for this lack of use is the complexity of these techniques. This talk reviews some of the historical approaches to cryptographic elections and describes a relatively simple but still effective approach to achieving verifiability in elections. By sacrificing some of the properties of prior verifiable election designs, it is possible to offer a design which is more accessible and therefore more suitable for broad public consumption.

Bio: Josh Benaloh is a cryptographer at Microsoft Research. He earned his bachelor's degree from M.I.T. in 1981, and his Ph.D. from Yale University in 1987 where his dissertation "Verifiable Secret-Ballot Elections" and other writings introduced the so-called "homomorphic" paradigm for cryptographic elections. Before joining Microsoft in 1994, he served as a postdoctoral fellow at the University of Toronto and an Assistant Professor at Clarkson University. He has served as a director of the International Association for Cryptologic Research since 1999 and was the General Chair of the Crypto 2006 conference held this past August.

Assigned Readings: None.

Related Papers:

10/30/2006

Information Hiding and DRM

Presenter: Tanya.

Assigned Readings:

Additional/Related Papers: We will discuss some of these papers, but you are not required to read them.

11/01/2006

No class.

11/06/2006

Worms

Assigned Readings:

Additional/Related Papers:

11/08/2006

No class.

11/13/2006

Malware

Presenter: Alex.

Assigned Readings:

Additional/Related Papers:

11/15/2006

(Date Change)

Assigned Readings:

Related Papers:

  • Social Phishing. Tom Jagatic, Nathaniel Johnson, Markus Jakobsson, and Filippo Menczer. CACM, to appear.
  • Valuating Privacy. Bernardo A. Huberman, Eytan Adar, and Leslie R. Fine. IEEE Security and Privacy, September/October, 2005.

11/20/2006

Malware

Assigned Readings:

11/22/2006

Identity Theft and Worms

Assigned Readings: Please read and review two of the following three papers.

11/27/2006

Botnets and Spam (Date Change)

Presenter: Harsha.

Assigned Readings:

11/29/2006

Humans in Protocols and Worms

Assigned Readings: Please read and review two of the following three papers.

12/04/2006

Humans in Protocols, Network Security, and Virtualization

Assigned Readings:

12/06/2006

Anonymity

Assigned Readings:


yoshi@cs.washington.edu