|
|
|
|
Homework (General)
All submissions must be typed and submitted as PDF files; handwritten assignments and non-PDF files will not be accepted.
Unless otherwise specified, submit homeworks online at the following URL: https://catalysttools.washington.edu/collectit/dropbox/summary/kohno/9908.
At the top of your assignment, please
be sure to write your
name, email address, UWNetID,
student number, the homework assignment number (e.g. "Homework 1"),
due date, any references that you used (besides the course texts and assigned
readings), and the names of any people that you discussed the assignment with.
Please note that any future schedule is for approximate planning purposes only. The future schedule is subject to change based on our progress and other factors.
Non-graded Immediate Tasks (Start of Quarter)
Textbook-Style Homeworks
- Homework 1
Out: here
Due: April 16, 6:30pm
- Homework 2
Out: here
Due: May 3, 11:45pm
- Homework 3
Out: here
Due: June 4, 11:45pm
Final
Research Component
For the research component of the course, you must read the
following papers and submit written reviews by the specified
deadline. Late submissions will not be accepted.
There will be at most two required research readings per class, and
often just one.
Your
evaluations should have the following form:
- Your name.
- Paper title and author(s).
- What problem does the paper address?
- Two (or more) most important new ideas in the paper, and why.
- What is the approach used to solve the problem?
- How does the paper support or otherwise justify its arguments and conclusions?
- Two ways the paper could be improved, and why.
- Two important, open research questions on the topic, and why they matter.
You must submit evaluations as a PDF file. You should upload the
evaluations to the online Catalyst system (URL at the top of this page).
Your evaluation for each reading must be less than one page
long, be single-spaced, use 12pt font, and have at least 1 inch
margins; I expect for most paper evaluations to be approximately 1/2
to 3/4 pages long.
You are welcome to, and in fact encouraged to, discuss the papers with
other students in the class. However, you must write the evaluations on your
own.
Students enrolled in CSE M 590 will be required to present one
of these papers during class. More information will be announced as
the course progresses.
- Due April 8, 6:30pm. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. Halperin, Heydt-Benjamin, Ransford, Clark, Defend, Morgan, Fu, Kohno, and Maisel. IEEE Symposium on Security and Privacy 2008.
- Due April 15, 6:30pm. Vanish: Increasing Data Privacy with Self-Destructing Data. Geambasu, Kohno, Levy, and Levy. USENIX Security 2009.
- Due April 29, 6:30pm. Why Phishing Works. Dhamija, Tygar, and Hearst. CHI 2006. [Aeron]
- Due May 6, 6:30pm. Spamalytics: an Empirical Analysis of Spam Marketing Conversion. Kanich, Kreibich, Levchenko, Enright, Paxson, Voelker, and Savage. CCS 2008. [Patrick]
- Due May 13, 6:30pm. Secure Attribute-Based Systems. Pirretti, Traynor, McDaniel, and Waters. CCS 2006. [Ting]
- Due May 27, 6:30pm. Robust De-anonymization of Large Sparse Datasets. Arvind Narayanan, Vitaly Shmatikov. IEEE Symposium on Security and Privacy 2008.
[Param]
- Due May 27, 6:30pm. Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow. Chen, Wang, Wang, and Zhang. Oakland 2010. [Dane]
- Due June 3, 6:30pm. Experimental Security Analysis of a Modern Automobile.
Koscher, Czeskis, Roesner, Patel, Kohno, Checkoway, McCoy, Kantor, Anderson, Shacham, and Savage. Oakland 2010. [Steve]
|
|