Reading Responses

Most classes, there will be one or two papers assigned as required reading (those sidelined in blue below). Ahead of time, each student will individually submit responses to the readings.

As a rough guideline, think about it as if you just saw the paper at a conference and were explaining it to someone in the field. What's the gist, what's the idea, how well did they demonstrate it, and what did you particularly enjoy/take issue with — these are all fine things to include.

Class HotCRP

For each required paper, we will provide you with specific questions to respond to:

  • The responses should comprise 1-2 paragraphs per paper.
  • The goal is not to prove that you read the paper, but that you understand the paper.
  • So that I have time to read them and give feedback, please turn them in by 3pm the day before class (3pm Monday for Tuesday classes, and 3pm Wednesday for Thursday classes).

8/31 Ethics & Law in Security Research: Background

9/5 Ethics & Law in Security Research: Case Studies

9/7 Cryptography Background

9/12 The Certificate Ecosystem

9/14 Networking Background

9/19 Crypto Failures in Practice

9/21 Building Anonymity

9/26 Breaking Anonymity

9/28 Measuring Internet Censorship

10/3 Evading Internet Censorship

10/5 Protocol Obfuscation

10/10 User Authentication

10/12 Usable Security

10/17 Project Proposals

10/19 Classic Memory Attacks/Defenses

10/24 Modern Memory Attacks

10/26 Automating Exploits

10/31 Fuzzing

11/2 Modern Memory Defenses

11/7 Botnets

11/9 Worms

11/14 TCP/IP Security

11/16 DoS Attacks

11/21 DoS Defenses

11/23 Thanksgiving

11/28 VPNs

11/30 Underground Economies

12/5 Project presentations (1/2)

12/7 Project presentations (2/2)

Web Accessibility