|
|
|
|
Homework
All submissions must be typed and submitted as PDF files; handwritten assignments and non-PDF files will not be accepted.
Submit homeworks online at the following URL: https://catalysttools.washington.edu/collectit/dropbox/kohno/4422.
At the top of your assignment, please
be sure to write your
name, email address,
student number, the homework assignment number (e.g. "Homework 1"),
due date, any references that you used (besides the course texts and assigned
readings), and the names of any people that you discussed the assignment with.
Please note that the future schedule is for approximate planning purposes only. The future schedule is subject to change based on our progress and other factors.
If you are enrolled in CSE M 584, then you must also read the following papers
and submit written reviews by the specified deadline. Late submissions will
not be accepted. Your evaluations should have the following form:
- Your name.
- Paper title and author(s).
- What problem does the paper address?
- Two (or more) most important new ideas in the paper, and why.
- What is the approach used to solve the problem?
- How does the paper support or otherwise justify its arguments and conclusions?
- Two ways the paper could be improved, and why.
- Two important, open research questions on the topic, and why they matter.
You must submit evaluations as a PDF file. You should upload the
evaluations to the online Catalyst system (URL at the top of this page).
Your evaluation for each reading must be less than one page
long, be single-spaced, use 12pt font, and have at least 1 inch
margins; I expect for most paper evaluations to be approximately 1/2
to 3/4 pages long.
You are welcome to, and in fact encouraged to, discuss the papers with
other students in the class. However, you must write the evaluations on your
own.
You must all also select one of the following papers to present
during the last week of class. The time for each presentation will
depend on the number of students enrolled in CSE M 584, but I
anticipate 20 to 40 minutes for each presentation. A signup system
is available here.
For Week of there is only one option - March 10th - this is correct. We
will let you know whether you will be presenting on Monday or Wednesday.
- Due Jan 9, 3pm. Value Sensitive Design and Information Systems. Friedman, Kahn, and Borning. In Zhang and Galletta (eds.), Human-computer interaction in management information systems: Foundations (pp. 348-372).
- Due Jan 16, 3pm. How to 0wn the Internet in Your Spare Time. Staniford, Paxson, and Weaver. USENIX Security 2002.
- Due Jan 23, 3pm. Spamalytics: an Empirical Analysis of Spam Marketing Conversion..
Kanich, Kreibich, Levchenko, Enright, Paxson, Voelker, and Savage. CCS 2008.
- Due Jan 30, 3pm. Why Phishing Works. Dhamija, Tygar, and Hearst. CHI 2006.
- Due Feb 6, 3pm. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. Halperin, Heydt-Benjamin, Ransford, Clark, Defend, Morgan, Fu, Kohno, and Maisel. IEEE Symposium on Security and Privacy 2008.
- Due Feb 13, 3pm. Privacy and Security in Library RFID Issues, Practices, and Architectures. Molnar and Wagner. CCS 2004.
- Due Feb 20, 3pm. RFIDs and Secret Handshakes: Defending Against Ghost-and-Leech Attacks and Unauthorized Reads with Context-Aware Communications. Czeskis, Koscher, Smith, and Kohno. CCS 2008.
- Due Feb 27, 3pm. Improving Wireless Privacy with an Identifier-Free Link Layer Protocol. Greenstein, McCoy, Pang, Kohno, Seshan, and Wetherall. MobiSys 2008.
- Due March 6, 3pm. Tor: The Second-Generation Onion Router. Dingledine, Mathewson, and Syverson. USENIX Security 2004.
|
|