(Under construction. The instructor reserves the right to change the schedule during the course.)
Date |
Topic |
Reading
Assignments |
Presenters
(Slides) |
1/17 |
Syllabus
Explained Review of Basic Security Concepts |
Wenjing Lou,
Slides |
|
1/24 | Review
of Basic Cryptographic Techniques Overview of Basic Network Techniques and Attacks |
Wenjing Lou, Slides | |
1/31 |
Overview of Wireless Networks Security |
Wenjing Lou, Slides | |
2/7 |
IEEE 802.11 Wireless LAN security | 1-1: "Intercepting
Mobile Communications: The Insecurity of 802.11," by N. Borisov, I.
Goldberg, and D. Wagner, ACM MOBICOM'01 |
Rodrigues, Ivor |
1-2: "802.11
Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions,"
by J. Bellardo and S. Savage, USENIX Security'03 |
Fanous, Alexander | ||
1-3: "Passive
Data Link Layer 802.11 Wireless Device Driver Fingerprinting," by
J. Franklin, et al., USENIX
Security'06 |
Li, Ming | ||
2/14 |
Cellular Network Security |
2-1: "Exploiting
Open Functionalilty in SMS-Capable Cellular Networks," by W. Enck, et al., ACM CCS'05 |
Yoshitake, Hitomi |
2-2: "Mitigating
Attacks on Open Functionality in SMS-Capable Cellular Networks," by
P. Traynor, et al., ACM
MOBICOM'06 |
Gupta, Saurabh |
||
2-3: "Smart-Phone Attacks and Defenses," by C. Guo, H. Wang, W. Zhu, HotNets III, 2004. | Meng, Rong | ||
reference:
GSM and CDMA
network security |
|||
2/21 |
RFID security
|
3-1: "RFID
Security and Privacy: a Survey," by Ari Juels, IEEE JSAC, Vol. 24,
No. 2, Feb. 2006 |
Toto, Ermal |
3-2: "Minimalist
Cryptography for Low-Cost RFID Tags", by Ari Juels, |
Hu, Yin |
||
3-3: "Dynamic Key-Updating: Privacy Preserving Authentication for RFID Systems," by L. Lu, et al., IEEE PerCom'07 | Yu, Shucheng |
||
2/28 |
TCP/IP attacks &
defenses |
4-1: "Analysis of a Denial of Service Attack on TCP,"
by C. Schuba, et al., IEEE
Symposium & Privacy'97 |
Breeman, Kenneth |
4-2: "Low-Rate
TCP-Targeted Denial of Service Attacks (The Shrew vs. the Mice and
Elephants)," by A. Kuzmanovic and E. Knightly, ACM SIGCOMM'03 |
Atkins,
Meganne |
||
4-3: "Defending
against Low-Rate TCP attacks: dynamic detection and protection." by
H. Sun, J. Lui, and D. Yau, IEEE ICNP'04 |
Kerxhalli, Lorenc |
||
3/6 |
DDoS
Attacks & Defense (1) - Overlay-based approaches |
5-1: "SOS:
Secure Overlay Services," by A. Keromytis, V. Mishra, and D.
Rubenstein, ACM SIGCOMM'02 |
Wong, Eric |
5-2: "Mayday:
Distributed Filtering for Internet Services," D. Andersen, Usenix
USITS'03 |
Gadepalli, Gayatri
|
||
5-3: "Counting
DoS Attacks with Stateless Multipath Overlays," by A. Stavrou and
A. Keromytis, ACM CCS'05 |
Wenjing Lou |
||
3/13 |
DDoS Attacks & Defense (2) - IP traceback | 6-1: "Practical
Network Support for IP Traceback," by S. Savage, et al., ACM
SIGCOMM'00 |
Darneille, Robert |
6-2: "Hash-Based
IP Traceback," by A. Snoeren, et al., ACM SIGCOMM'01 |
Fanous, Alexander |
||
6-3: "Pi: A
Path Identification Mechanism to Defend Against DDoS Attacks," by
A. Yaar, A. Perrig, and D. Song, IEEE Symposium on Security &
Privacy'03 |
Yang, Zhenyu |
||
3/20 |
DDoS Attacks & Defense (3) - Capabilities & Others | 7-1: "SIFF: A
Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks,"
by A. Yaar, A. Perrig, and D. Song, IEEE Symposium on Seruciry &
Privacy'04 |
Meng, Rong |
7-2: "A
DoS-limiting Network Architecture," by X. Yang, D. Wetherall, &
W. Anderson, ACM SIGCOMM'05 |
Hu, Yin |
||
7-3: "DDoS
Defense by Offense," by M. Walfish, et al., ACM SIGCOMM'06 |
Atkins,
Meganne |
||
3/27 |
Worm
Detection & Prevention |
8-1: "How to
Own the Internet in your spare time," by S. Staniford, et al.,
USENIX Security'02 |
Toto, Ermal |
8-2: "Vigilante:
End-to-End Containment of Internet Worms," by M. Costa, et al., SOSP'05 |
Gadepalli, Gayatri | ||
8-3: "Worm
Origin Identification Using Random Walks," by Y. Xie, et al., IEEE Sym. on Security &
Privacy'05 |
Kerxhalli, Lorenc |
||
4/3 |
Botnets |
9-1: "Botnet
Tracking: Exploring a Root-Cause Methodology to Prevent DDoS," by
F. Freiling, T. Holz, and G. Wicherski, ESORICS'05 |
Yoshitake, Hitomi |
9-2: "A Multifaceted Approach to Understanding the Botnet Phenomenon," by M. Rajab, et al., Internet Measurement Conference (IMC'06 ) | Gupta, Saurabh | ||
9-3: "Army of Botnets," by R. Vogt, J. Aycock, and M. Jacobson, NDSS'07 | Wong, Eric | ||
4/10 |
P2P Overlay Network
Security |
10-1: "Eclipse
Attacks on Overlay Networks: Threats and Defenses," by A. Singh, et al., IEEE INFOCOM'06 |
Rodrigues, Ivor |
10-2: "Message
Dropping Attacks in Overlay Networks: Attack Detection and Attacker
Identification," by L. Xie and Se. Zhu, SecureComm'06 |
Yang, Zhenyu | ||
10-3: "Rumor
Riding: Anonymizing Unstructured Peer-to-Peer Systems," by J. Han
and Y. Liu, IEEE ICNP'06 |
Li, Ming | ||
4/17 & 4/24 |
Research Paper Presentation / Demonstration |
Yu, Shucheng Breeman, Kenneth
|