See the syllabus for late policies, dropped quizzes, etc.
No. | Due | Info |
---|---|---|
1A | October 30 at 10 P.M. | Assignment 1A |
1B | November 13 at 5 P.M. | Assignment 1B |
2A | November 16 at 5 P.M. | Assignment 2A |
2B | December 4 at 5 P.M. | Assignment 2B |
1C | December 7 at 5 P.M. | Assignment 1C (rev. 2) |
2C | December 11 at 5 P.M. | Assignment 2C |
Date | Topic | Reading Assignment |
---|---|---|
Oct 25 | Introduction | No assigned reading |
Oct 30 | Bitcoin (special lecture) | |
Nov 1 | Computer Fraud and Abuse Act (CFAA) | Required: 18 U.S. Code § 1030 – Fraud and related activity in connection with computers Optional: C. Doyle. “Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws” Reading questions:
|
Nov 6 | Electronic Communications Privacy Act (ECPA) and Stored Communications Act (SCA) |
Required: 18 U.S. Code § 2511, 2701, 2702, 2703, 2707 Optional: G. Stevens and C. Doyle. “Privacy: An Overview of Federal Statutes Governing Wiretapping and Electronic Eavesdropping” Reading questions:
|
Nov 8 | Web search | Required: A. N. Langville and C. D. Meyer. Google's PageRank and Beyond: The Science of Search Engine Rankings, Ch. 1, Sec. 1.3.2; Ch. 2, Sec. 2.1 and 2.2, skip pp. 17–18; Ch. 3, skip 3.2.2. Reading questions:
|
Nov 13 | Basic password attacks and defenses Location: ECEB 3002 |
Required: P. Ducklin. “Serious Security: How to store your users‘ passwords safely” Reading questions:
|
Nov 15 | Advanced password attacks and defenses Location: ECEB 3002 |
Required: P. Oechslin. “Making a Faster Cryptanalytic Time-Memory Trade-Off” |
Nov 27 | Web Cloaking | Required: D. Y. Wang et al. “Cloak and Dagger: Dynamics of Web Search Cloaking” Reading questions:
|
Nov 29 | Traffic Monetization | Required: D. Samosseiko. “The Partnerka—What is it, and why should you care” Reading questions:
|
Dec 4 | CAPTCHAs | Required: M. Motoyama et al. “Re: CAPTCHAs — Understanding CAPTCHA-Solving Services in an Economic Context” Reading questions:
|
Dec 6 | Ransomware | Required: K. Liao et al. “Behind Closed Doors: Measurement and Analysis of CryptoLocker Ransoms in Bitcoin” Reading questions:
|
Dec 11 | Remote Access Trojans | Required: B. Farinholt et al. “To Catch a Ratter: Monitoring the Behavior of
Amateur DarkComet RAT Operators in the Wild” Reading questions:
|
Dec 14 | Final Exam | Time: 8 A.M. Location: ECEB 2015 |
These important Web sites are part of Assignment 1: Trimpuny Student Pages