Jan 12: Introduction
Introduction and Administrivia
Background: Security, Privacy, Cryptography
Jan 19: “Privacy”
“A Taxonomy of Privacy,” Daniel J. Solove, GWU Law School Public Law Research Paper No. 129, University of Pennsylvania Law Review, Vol. 154, No. 3, p. 477, January 2006.
“I’ve Got Nothing to Hide, and Other Misunderstandings of Privacy,” Daniel J. Solove
George Washington University Law School, San Diego Law Review, Vol. 44, 2007
Jan 26: Contextual Integrity
“Privacy as Contextual Integrity,”
Helen Nissenbaum, Washington Law Review, Vol. 79, No. 1, 2004
(Moderators: Andrew and Gianpaolo)
“(sp)iPhone: Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers,” P. Marquardt, A. Verma, H. Carter and P. Traynor, Proceedings of the ACM Conference on Computer and Communications Security (CCS), October 2011.
“Seeing Double: Reconstructing Obscured Typed Input from Multiple Compromising Reflections, Around the Corner,” Yi Xu, Jared Heinly, Andrew M. White, Fabian Monrose and Jan-Michael Frahm, Proceedings of the 20th ACM Conference on Computer and Communications Security, November, 2013.
Feb 9: Project Discussion
Finalize project ideas for each group based on class discussion
Feb 12 (Friday) Project Proposals Due
Feb 16: Project Proposals
Project Proposal Presentations
Feb 23: Sensor Security
“User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems,” F. Roesner, T. Kohno, A. Moshchuk, B. Parno, H.J. Wang, and C. Cowan, IEEE Symposium on Security and Privacy (Oakland), May 16-19, 2010.
“A Scanner Darkly: Protecting User Privacy from Perceptual Applications,” S. Jana, A. Narayanan, V. Shmatikov. IEEE Symposium on Security and Privacy (Oakland), 2013.
Mar 1: Lifelogging
“Dredging Up the Past: Lifelogging, Memory and Surveillance“, Allen, Anita L., University of Chicago Law Review, Vol. 75, p. 47, 2008; U of Penn Law School, Public Law Research Paper No. 07-33.
“PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces,” Robert Templeman, Mohammed Korayem, David Crandall, and Apu Kapadia, To appear in The 21st Annual Network & Distributed System Security Symposium (NDSS ’14), San Diego, CA, February 23–26, 2014.
Mar 8: Smartphone app security
“TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones,”
William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2010.
“Android permissions demystified,”
Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner. Proceedings of the 18th ACM conference on Computer and Communications Security (CCS), 2011.
No class: Spring Break
Mar 22: Authentication Schemes
“The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes,”
J. Bonneau, C. Herley, P.C. van Oorschot, F. Stajano, IEEE Symposium on Security and Privacy (Oakland), May 2012.
(Moderators: Grace and Yuchen)
Mar 29: Online Behavior
How Community Feedback Shapes User Behavior,
Justin Cheng, Cristian Danescu-Niculescu-Mizil, Jure Leskovec
Proceedings of ICWSM 2014.
Antisocial Behavior in Online Discussion Communities,
Justin Cheng, Cristian Danescu-Niculescu-Mizil, Jure Leskovec,
Proceedings of ICWSM 2015.
Apr 5: Anonymous Social Networks
Whispers in the Dark: Analysis of an Anonymous Social Network
Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao
Proceedings of the 14th ACM SIGCOMM Internet Measurement Conference (IMC)
Vancouver, Canada, November 2014.
Project Status Report Due
Apr 12: Poster + Project Status
Apr 19: Spring Symposium Day
(April 22: Project Final Report Due)
Apr 26: Final Project Presentations