CS6230 - Topics in Information Security
Kindly send me an email stating your preferred presentation slot and paper by 16th August 2014, 12pm.
Do note that the slot number and paper number are independent, meaning you have to select one from each list.
In addition, kindly use your school email account to send the email (as well as future emails) to me.
Slides from the lecture can be downloaded from IVLE.
Student List |
1) Cai Zhenquan |
2) Ho Wee Kit |
3) Hong Hande |
4) Shruti Tople |
5) Ankit Sarkar |
6) Lim Wee Yong |
7) Ashok Balasubramanian |
8) Shweta Shinde |
9) Sankhadeep Roy |
10) Mohammad Mobashir |
11) Vishal Choudhary |
Presentation Slots
14 August - (Lecture 1 + Presentation and Paper Review) Forensic Carving of Network Packets and Associated Data Structures (by Vrizlynn Thing)
1. 21 August - The Core of the Matter: Analyzing Mailicious Traffic in Cellular Carriers (by Vishal Choudhary)
2. 28 August - Android Permissions Demystified (by Cai Zhenquan)
3. 4 September - Detecting Hoaxes, Frauds, and Deception in Writing Style Online (by Ankit Sarkar)
4. 11 September - An Historical Examination of Open Source Releases and Their Vulnerabilities (by Ho Wee Kit)
5. 18 September - Guess again (and again and again): Measuring Password Strength by Simulating Password-Cracking Algorithms (by Shruti Tople)
6. 25 September - Recess Week
7. 2 October - I Still Know What You Visited Last Summer - Leaking Browsing History via User Interaction and Side Channel Attacks (by Ashok Balasubramanian)
8. 9 October - Fashion Crimes: Trending-Term Exploitation on the Web (by Lim Wee Yong)
9. 23 October - The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authenticaiton Schemes (by Shweta Shinde)
10. 30 October - Using Fingerprint Authentication to Reduce System Security: An Empirical Study (by Sankhadeep Roy)
11. 6 November - (sp)iPhone: Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers (by Hong Hande)
12. 13 November - Click Trajectories: End-to-End Analysis of the Spam Value Chain (by Mohammad Mobashir )
List of Papers
1. Zachary Weinberg, Eric Y. Chen, Pavithra Ramesh Jayaraman, and Collin Jackson, "I
Still Know What You Visited Last Summer - Leaking Browsing History via User Interaction and Side Channel Attacks", IEEE Symposium on Security and Privacy, 2011.
2. Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Mark Felegyhazi,
Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon Mccoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker and Stefan Savage, "Click
Trajectories: End-to-End Analysis of the Spam Value Chain", IEEE Symposium on Security and Privacy, 2011.
3. Tyler Moore, Nektarios Leontiadis and Nicolas Christin, "Fashion
Crimes: Trending-Term Exploitation on the Web", ACM Conference on Computer and Communications Security, 2011.
4. Philip Marquardt, Arunabh Verma, Henry Carter and Patrick Traynor, "(sp)iPhone:
Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers", ACM Conference on Computer and Communications Security, 2011.
5. Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song and David Wagner, "Android Permissions Demystified", ACM Conference on Computer and Communications Security, 2011.
6. Hugh Wimberly, and Lorie M. Liebrock, “Using Fingerprint Authentication to Reduce System Security: An Empirical Study”, IEEE Symposium on Security and Privacy, 2011
7. Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart and Thomas Shrimpton, "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail", IEEE Symposium on Security and
Privacy, 2012.
8. Rui Wang, Shuo Chen and Xiaofeng Wang, "Signing
Me onto Your Accounts through Facebook and Google - A Traffic Guided Security Study of Commercially Deployed Single-Sign-On Web Services", IEEE Symposium on Security and Privacy, 2012.
9. Sadia Afroz, Michael Brennan and Rachel Greenstadt, "Detecting
Hoaxes, Frauds, and Deception in Writing Style Online", IEEE Symposium on Security and Privacy, 2012.
10. Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Richard Shay and Timothy Vidas, "Guess
again (and again and again): Measuring Password Strength by Simulating Password-Cracking Algorithms", IEEE Symposium on Security and Privacy, 2012.
11. Joseph Bonneau, "The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords",
IEEE Symposium on Security and Privacy, 2012.
12. Joseph Bonneau, Cormac Herley, Paul C. van Oorschot and Frank Stajano, "The
Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authenticaiton Schemes", IEEE Symposium on Security and Privacy, 2012.
13. Nigel Edwards, Liqun Chen, "An Historical Examination of Open Source Releases and Their Vulnerabilities",
ACM Conference on Computer and Communications Security, 2012.
14. Shobha Venkataraman, David Brumley, Subhabrata Sen, "Automatically
Inferring the Evolution of Malicious Activity on the Internet", Network and Distributed System Security Symposium, 2013.
15. Davide Canali, Davide Balzarotti, "Behind
the Scenes of Online Attacks: an Analysis of Exploitation Behaviors on the Web", Network and Distributed System Security Symposium, 2013.
16. Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam Metzger, Haitao Zheng, Ben Y. Zhao, "Social
Turing Tests: Crowdsourcing Sybil Detection", Network and Distributed System Security Symposium, 2013.
17. Andrew M. White, Srinivas Krishnan, Michael Bailey, Fabian Monrose, Phillip Porras, "Clear
and Present Data: Opaque Traffic and its Security Implications for the Future", Network and Distributed System Security Symposium, 2013.
18. Charles Lever, Manos Antonakakis, Brad Reaves, "The Core of the Matter: Analyzing Mailicious Traffic in Cellular Carriers",
Network and Distributed System Security Symposium, 2013.
19. Christian Rossow, Dennis Andriesse, Tillmann Werner, Brett Stone-Gross, Daniel Plohmann, Christian J. Dietrich, Herbert Bos, "SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets", IEEE Symposium on Security and Privacy, 2013.