I populate this table from this Google Doc, in case you are interested.
The basic idea this quarter is that you're going to watch videos of research research projects before lecture, then during lecture we'll talk about the basics and try to help you understand the key concepts in the paper.
During lecture we will meet via Zoom and periodically discuss ideas in addition to listening to me explain the basics. These discussions will help solidify your understanding of the material.
Date | Lecture media | Topic | Required video and optional paper |
---|---|---|---|
3/30/2020 | [Slides] [Video] | Welcome | |
4/1/2020 | [Slides] [Video] Note: this video is on canvas beause it shows pictures of students. For future videos students will have been warned about this before we post to youtube | Big idea: privacy as a human right | |
4/3/2020 | [Slides] [Video] | Privacy | 50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System Joel Reardon, University of Calgary / AppCensus Inc.; Álvaro Feal, IMDEA Networks Institute / Universidad Carlos III Madrid; Primal Wijesekera, U.C. Berkeley / ICSI; Amit Elazari Bar On, U.C. Berkeley; Narseo Vallina-Rodriguez, IMDEA Networks Institute / ICSI / AppCensus Inc.; Serge Egelman, U.C. Berkeley / ICSI / AppCensus Inc. Usenix Security 2019 (Optional paper) |
4/6/2020 | [Slides] [Video] | Privacy | Vuvuzela: scalable private messaging resistant to traffic analysis. SOSP '15: Proceedings of the 25th Symposium on Operating Systems Principles, October 2015, Jelle Van Den Hooff, David Lazar, Matei A Zaharia, Nickolai Zeldovich (Optional paper) |
4/8/2020 | [Slides] [Video] | Big idea: Computers are everywhere and they aren't very secure | |
4/10/2020 | [Slides] [Video] Note The video is on Canvas and intended only for students enrolled in the class | Insecure computers everywhere | Comprehensive Experimental Analyses of Automotive Attack Surfaces Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and Stefan Savage, University of California, San Diego; Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno, University of Washington (Optional paper) |
4/13/2020 | [Slides] [Video] | Insecure computers everywhere | Understanding the Mirai Botnet. Manos Antonakakis, Georgia Institute of Technology; Tim April, Akamai; Michael Bailey, University of Illinois, Urbana-Champaign; Matt Bernhard, University of Michigan, Ann Arbor; Elie Bursztein, Google; Jaime Cochran, Cloudflare; Zakir Durumeric and J. Alex Halderman, University of Michigan, Ann Arbor; Luca Invernizzi, Google; Michalis Kallitsis, Merit Network, Inc.; Deepak Kumar, University of Illinois, Urbana-Champaign; Chaz Lever, Georgia Institute of Technology; Zane Ma and Joshua Mason, University of Illinois, Urbana-Champaign; Damian Menscher, Google; Chad Seaman, Akamai; Nick Sullivan, Cloudflare; Kurt Thomas, Google; Yi Zhou, University of Illinois, Urbana-Champaign. (Optional paper) |
4/15/2020 | [Slides] [Video] | Big idea: trusted computing base | |
4/17/2020 | [Slides] [Video] | TCB | Notary: a device for secure transaction approval Anish Athalye, Adam Belay, M. Frans Kaashoek, Robert T Morris, Nickolai Zeldovich, SOSP 2019 (Optional paper) |
4/20/2020 | [Slides] [Video] | TCB | Saba Eskandarian, Jonathan Cogan, Sawyer Birnbaum, Peh Chang Wei Brandon, Dillon Franke, Forest Fraser, Gaspar Garcia Jr., Eric Gong, Hung T. Nguyen, Taresh K. Sethi, Vishal Subbiah, Michael Backes, Giancarlo Pellegrino, Dan Boneh, Fidelius: Protecting User Secrets from Compromised Browsers. IEEE Symposium on Security and Privacy 2019: 264-280 (Optional paper) |
4/22/2020 | No class | ||
4/24/2020 | No lecture media | How security thinking applies to real software | |
4/27/2020 | [Slides] [Video] | Big idea: Malicious computer systems | Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou, "(first 30 minutes only) Designing and implementing malicious hardware. Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), April 2008. (Optional paper) |
4/29/2020 | [Slides] [Video] | Introduce the project | |
5/1/2020 | [Slides] [Video] | Big idea: Machine learning and security | Q: Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible? A: Because Keynote Speakers Make Bad Life Decisions and Are Poor Role Models James Mickens, Harvard University |
5/4/2020 | None, zoom and comcast glitches | ML | Towards evaluating the robustness of neural networks N Carlini, D Wagner 2017 IEEE Symposium on Security and Privacy (SP), 39-57 (Optional paper) |
5/6/2020 | [Slides] [Video] | Carlini and Wagner redo lecture | |
5/8/2020 | Ask me anything | ||
5/11/2020 | [Slides] [Video] | Big idea: Computers need to be able to identify humans | Detecting and Characterizing Lateral Phishing at Scale Grant Ho, UC Berkeley and Barracuda Networks; Asaf Cidon, Barracuda Networks and Columbia University; Lior Gavish and Marco Schweighauser, Barracuda Networks; Vern Paxson, UC Berkeley and ICSI; Stefan Savage and Geoffrey M. Voelker, UC San Diego; David Wagner, UC Berkeley, Usenix Security 2019 (Optional paper) |
5/13/2020 | [Schedule] [Video (Canvas)] | Project meetings | |
5/15/2020 | [Schedule] [Video (Canvas)] | Project meetings | |
5/18/2020 | [Slides] [Video (Canvas)] | How to present your work | |
5/20/2020 | Schedule | Project meetings | |
5/22/2020 | Schedule | Project meetings | |
5/25/2020 | Memorial day | ||
5/27/2020 | Schedule | Project meetings (only select groups) | |
5/29/2020 | Schedule | In class presentations | |
6/1/2020 | Schedule | In class presentations | |
6/3/2020 | Schedule | In class presentations |