CSE 564 (Spring 2011)
Computer Security and Privacy
Readings
Papers available in the HotCRP conference review system: http://cse564.cs.washington.edu/.
March 30: (Analysis and Measure)
- Re: CAPTCHAs -- Understanding CAPTCHA-Solving Services in an Economic Context
- Security Analysis of India's Electronic Voting Machines
April 4: (Analysis and Measure)
- Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study
- Spamalytics: An Empirical Analysis of Spam Marketing Conversion
April 6: (Design)
- Tor: The Second-Generation Onion Router
- Chipping Away at Censorship Firewalls with User-Generated Content
April 11: (Physical world and usability)
- Keyboard Acoustic Emanations
- The Design and Analysis of Graphical Passwords
April 13: (Physical world and usability)
- ClearShot: Eavesdropping on Keyboard Input from Video
- On User Choice in Graphical Password Schemes
April 18:
- Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
- Secrecy, Flagging, and Paranoia: Adoption Criteria in Encrypted E-Mail
April 20:
- The Wi-Fi Privacy Ticker: Improving Awareness & Control of Personal Information Exposure on Wi-Fi
- Access Control for Home Data Sharing: Attitudes, Needs and Practices
April 25:
- Robust Defenses for Cross-Site Request Forgery
- Protecting Browsers from DNS Rebinding Attacks
April 27:
- An Empirical Study of Privacy-Violating Information Flows in JavaScript Web Applications
- XCS: Cross Channel Scripting and its Impact on Web Applications
May 2:
- The Multi-Principal OS Construction of the Gazelle Web Browser
- The Security Architecture of the Chromium Browser
May 4:
May 9:
- Protecting Browsers from Extension Vulnerabilities
- Defeating Script Injection Attacks with Browser-Enforced Embedded Policies
May 11:
- Class canceled, no readings!
May 16:
- Why Phishing Works
- The Emperor's New Security Indicators
May 18:
- On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing
- Cryptographic Voting Protocols: A Systems Perspective
May 23:
- Bootstrapping Trust in Commodity Computers
May 25:
- BitBlaze: A New Approach to Computer Security via Binary Analysis