Tentative Course Schedule

(Under construction. The instructor reserves the right to change the schedule during the course.)

Date
Topic
Reading Assignments
Presenters (Slides)
1/17
Syllabus Explained
Review of Basic Security Concepts

Wenjing Lou, Slides
1/24 Review of Basic Cryptographic Techniques
Overview of Basic Network Techniques and Attacks
  Wenjing Lou, Slides
1/31
Overview of Wireless Networks Security
  Wenjing Lou, Slides
2/7
IEEE 802.11 Wireless LAN security 1-1: "Intercepting Mobile Communications: The Insecurity of 802.11," by N. Borisov, I. Goldberg, and D. Wagner, ACM MOBICOM'01
Rodrigues, Ivor
1-2: "802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions," by J. Bellardo and S. Savage, USENIX Security'03
Fanous, Alexander
1-3: "Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting," by J. Franklin, et al., USENIX Security'06
Li, Ming
2/14
Cellular Network Security
2-1: "Exploiting Open Functionalilty in SMS-Capable Cellular Networks," by W. Enck, et al., ACM CCS'05
Yoshitake, Hitomi
2-2: "Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks," by P. Traynor, et al., ACM MOBICOM'06
Gupta, Saurabh
 
2-3: "Smart-Phone Attacks and Defenses," by C. Guo, H. Wang, W. Zhu, HotNets III, 2004. Meng, Rong
reference: GSM and CDMA network security

2/21
RFID security


3-1: "RFID Security and Privacy: a Survey," by Ari Juels, IEEE JSAC, Vol. 24, No. 2, Feb. 2006
Toto, Ermal
3-2: "Minimalist Cryptography for Low-Cost RFID Tags", by Ari Juels,
Hu, Yin
3-3: "Dynamic Key-Updating: Privacy Preserving Authentication for RFID Systems," by L. Lu, et al., IEEE PerCom'07 Yu, Shucheng
2/28
TCP/IP attacks & defenses
4-1: "Analysis of a Denial of Service Attack on TCP," by C. Schuba, et al., IEEE Symposium & Privacy'97
Breeman, Kenneth
4-2: "Low-Rate TCP-Targeted Denial of Service Attacks (The Shrew vs. the Mice and Elephants)," by A. Kuzmanovic and E. Knightly, ACM SIGCOMM'03
Atkins, Meganne
4-3: "Defending against Low-Rate TCP attacks: dynamic detection and protection." by H. Sun, J. Lui, and D. Yau, IEEE ICNP'04
Kerxhalli, Lorenc
3/6
DDoS Attacks & Defense (1) - Overlay-based approaches
5-1: "SOS: Secure Overlay Services," by A. Keromytis, V. Mishra, and D. Rubenstein, ACM SIGCOMM'02
Wong, Eric
5-2: "Mayday: Distributed Filtering for Internet Services," D. Andersen, Usenix USITS'03
Gadepalli, Gayatri
5-3: "Counting DoS Attacks with Stateless Multipath Overlays," by A. Stavrou and A. Keromytis, ACM CCS'05
Wenjing Lou
3/13
DDoS Attacks & Defense (2) - IP traceback 6-1: "Practical Network Support for IP Traceback," by S. Savage, et al., ACM SIGCOMM'00
Darneille, Robert

6-2: "Hash-Based IP Traceback," by A. Snoeren, et al., ACM SIGCOMM'01
Fanous, Alexander
6-3: "Pi: A Path Identification Mechanism to Defend Against DDoS Attacks," by A. Yaar, A. Perrig, and D. Song, IEEE Symposium on Security & Privacy'03
Yang, Zhenyu
3/20
DDoS Attacks & Defense (3) - Capabilities & Others 7-1: "SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks," by A. Yaar, A. Perrig, and D. Song, IEEE Symposium on Seruciry & Privacy'04
Meng, Rong
7-2: "A DoS-limiting Network Architecture," by X. Yang, D. Wetherall, & W. Anderson,  ACM SIGCOMM'05
Hu, Yin
7-3: "DDoS Defense by Offense," by M. Walfish, et al., ACM SIGCOMM'06
Atkins, Meganne
3/27
Worm Detection & Prevention
8-1: "How to Own the Internet in your spare time," by S. Staniford, et al., USENIX Security'02
Toto, Ermal
8-2: "Vigilante: End-to-End Containment of Internet Worms," by M. Costa, et al., SOSP'05
Gadepalli, Gayatri
8-3: "Worm Origin Identification Using Random Walks," by Y. Xie, et al., IEEE Sym. on Security & Privacy'05
Kerxhalli, Lorenc
4/3
Botnets
9-1: "Botnet Tracking: Exploring a Root-Cause Methodology to Prevent DDoS," by F. Freiling, T. Holz, and G. Wicherski, ESORICS'05
Yoshitake, Hitomi
9-2: "A Multifaceted Approach to Understanding the Botnet Phenomenon," by M. Rajab, et al., Internet Measurement Conference (IMC'06 ) Gupta, Saurabh
9-3: "Army of Botnets," by R. Vogt, J. Aycock, and M. Jacobson, NDSS'07 Wong, Eric
4/10
P2P Overlay Network Security
10-1: "Eclipse Attacks on Overlay Networks: Threats and Defenses," by A. Singh, et al., IEEE INFOCOM'06
Rodrigues, Ivor
10-2: "Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification," by L. Xie and Se. Zhu, SecureComm'06
Yang, Zhenyu
10-3: "Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems," by J. Han and Y. Liu, IEEE ICNP'06
Li, Ming
4/17 & 4/24
Research Paper Presentation / Demonstration
Yu, Shucheng

Breeman, Kenneth