CS 598

COMPUTER SECURITY IN THE PHYSICAL WORLD

Below is the calendar for this course. This is the preliminary schedule, which may be altered as the term progresses. It is the responsibility of the students to frequently check this web-page for schedule, readings, and assignment changes. As the professor, I will attempt to announce any change to the class, but this web-page should be viewed as authoritative. If you have any questions, please contact me (contact information is available at the course homepage).

Date Topic Assignments
Due
Discussions
(do readings before class)
Presenter(s)
8/23/2016 Introduction - Locks & Keys
(slides) (movie)
Reflections on Trusting Trust, Ken Thompson (link)
M. Blaze. "Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks." IEEE Security and Privacy, March/April 2003. (link)
Bates
8/25/2016 USB Security
(slides)
D. Tian, N. Scaife, A. Bates, K. Butler, and P. Traynor. "Making USB Great Again with USBFILTER." USENIX Security 2016. (link)
D. Tian, A. Bates, and K. Butler. "Defending Against Malicious USB Firmware with GoodUSB." ACSAC 2015. (link)
(Suggested Video) K. Nohl and J. Lell. "BadUSB - On Accessories that Turn Evil," Blackhat USA 2014. (link)
Bates
8/30/2016 USB Security 2
(slides) (slides)
M. Tischer, Z. Durumeric, S. Foster, S. Duan, A. Mori, E. Bursztein, and M. Bailey. "Users Really Do Plug in USB Drives They Find." Oakland 2016. (link)
S. Angel,R. Wahby, M. Howald, J. Leners, M. Spilo, Z. Sun, A. Blumberg, M. Walfish. "Defending against Malicious Peripherals with Cinch." USENIX Security 2016 (link)
Tianyuan,
Avesta
9/1/2016 Financial Security
(slides) (slides)
R. Anderson. "Why Cryptosystems Fail." Communications of the ACM 1994. (link)
S. Murdoch, S. Drimer, R. Anderson, and M. Bond, "Chip and PIN is Broken." Oakland 2010.  (link)
Hassan,
Yi
9/6/2016 Financial Security 2
(slides) (slides)
Project Choices
B.Reaves, N. Scaife, A. Bates, K. Butler, and P. Traynor. "Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World." USENIX Security 2015. (link)
K. Nohl, D. Evans, Starbug, and H. Plötz. "Reverse-Engineering a Cryptographic RFID Tag." USENIX Security '08. (link)
Qi,
Bart
9/8/2016 Mobile Devices
(slides) (slides)
P. Marquardt, A. Verma, H. Carter and P. Traynor, "(sp)iPhone: Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers." CCS 2011. (link)
G. Shah, A. Molina, and M. Blaze, "Keyboards and covert channels", USENIX Security 2006.  (link)
Ren-Jay,
Eric
9/13/2016 Mobile Devices 2
(slides) (slides)
S. Dey, N. Roy, W. Xu, R. R. Choudhury and S. Nelakuditi. "AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable." NDSS 2014. (link)
A. Das, N. Borisov, M. Caesar. "Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components." CCS 2014. (link)
Tianyuan,
Siddharth
9/15/2016 Mobile Devices 3
(slides) (slides)
S. Clark, T. Goodspeed, P. Metzger, Z. Wasserman, K. Xu, and M. Blaze, "Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System." USENIX Security 2011. (link)
N. Unger, S. Dechand, J. Bonneau, S. Fahl, H. Perl, I. Goldberg, and M. Smith. "SoK: Secure Messaging." Oakland 2015. (link)
Eric,
Gohar
9/20/2016 Medical Devices 
(announcements+slides) (slides)
D. Halperin, T.S. Heydt-Benjamin, B. Ransford, S.S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W.H. Maisel, "Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses." Oakland 2008. (link)
Michael Rushanan, Colleen Swanson, Denis Foo Kune, and Aviel D. Rubin, "SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks." Oakland 2014. (link)
Phuong,
Matt
9/22/2016 Medical Devices 2
(slides) (slides)
T. Denning, B. Friedman, B. Gill, D. Kramer, M. Reynolds, T. Kohno. "Beyond usability: applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices." ACSAC 2014. (link)
K. Mowery, E. Wustrow, T. Wypch, C. Singleton, C. Comfort, E. Rescorla, S. Checkoway, J. Halderman, H. Shacham. "Security Analysis of a Full-Body Scanner." USENIX Security 2014. (link)
Saad,
Deepak
9/27/2016 Internet of Things
(slides) (slides)
E. Fernandes, J. Jung, and A. Prakash. "Security Analysis of Emerging Smart Home Applications." IEEE Security & Privacy 2016. (link)
Y. Xu, J-M Frahm and F. Monrose. "Watching the Watchers: Automatically Inferring TV Content From Outdoor Light Effusions." CCS 2014. (link)
Gohar,
Bart
9/29/2016 Internet of Things 2
(slides) (slides)
Y. Oren and A. Keromytis. "From the Aether to the Ethernet—Attacking the Internet using Broadcast Digital Television." USENIX Security 2014. (link)
E. Fernandes, J. Paupore, A. Rahmati, D. Simionato, M. Conti, A. Prakash. "FlowFence: Practical Data Protection for Emerging IoT Application Frameworks," USENIX Security 2016. (link)
Ren-Jay,
Qi
10/4/2016 Wiretapping
(slides) (slides)
Abstract, Background,
RelWork
M. Sherr, E. Cronin, S. Clark, and M. Blaze. "Signaling vulnerabilities in wiretapping systems." IEEE S&P Magazine 2005. (link)
M. Sherr, G. Shah, E. Cronin, S. Clark, and Matt Blaze. "Can They Hear me Now? A Security Analysis of Law Enforcement Wiretaps," CCS 2009. (link)
Kyo Hyun,
Hassan
10/6/2016 Wiretapping 2
(missing) (slides)
A. Bates, K. Butler, M. Sherr, C. Shields, P. Traynor, and D. Wallach, "Accountable Wiretapping -or- I Know They Can Hear You Now." NDSS 2012. (link)
A. M. White, A. R. Matthews, K. Z. Snow, and F. Monrose, “Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks." Oakland 2011. (link)
Simon,
Corly
10/11/2016 Provenance-based Solutions
(announcements+slides) (slides)
C. Yang, G. Yang, A. Gehani, V. Yegneswaran, D. Tariq, and G. Gu. "Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps." Security and Privacy in Communication Networks, 2016. (link)
Backes, Michael, Sven Bugiel, and Sebastian Gerling. "Scippa: system-centric IPC provenance on Android." ACSAC 2014. (link)
Wajih,
Qi
10/13/2016 CCS'16 Preview
A. Hojjati, A. Adhikari, K. Struckmann, E. J. Chou, T. N. T. Nguyen, K. Madan, M. S. Winslett, C. A. Gunter, and W. P. King. "Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets." CCS 2016.
D. Tian, A. Bates, K. Butler, and R. Rangaswami. "ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices." CCS 2016.
Avesta,
Bates
10/18/2016 CPS
(slides) (slides)
Experimental Proposal
D. Formby, P. Srinivasan, A. Leonard, J. Rogers and R. Beyah. "Who’s in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems." NDSS 2016. (link)
A. A. Cárdenas, S. Amin, Z. Lin, Y. Huang, C. Huang, and S. Sastry. "Attacks against process control systems: risk assessment, detection, and response." ASIACCS 2011. (link)
Yi,
Siddharth
10/20/2016 CPS 2 / Smart Grid
(slides) (slides)
Stephen McLaughlin, Saman Zonouz, Devin Pohly, Patrick McDaniel, "A Trusted Safety Verifier for Process Controller Code." NDSS 2014. (link)
McDaniel, Patrick, and Stephen McLaughlin. "Security and privacy challenges in the smart grid." IEEE Security and Privacy Magazine (2009). (link)
Deepak,
Simon
10/25/2016 Smart Grid
Attend Dongyan Xu's 4PM talk in Coordinated Science Lab Auditorium (B02). Check-in with Professor Bailey. (link)
10/27/2016 Smart Grid 2
(slides) (slides)
R. Tan, V. B. Krishna, D. Yao, Z. Kalbarczyk. "Impact of integrity attacks on real-time pricing in smart grids" CCS 2013. (link)
S. McLaughlin, P. McDaniel, and W. Aiello, "Protecting Consumer Privacy from Electric Load Monitoring." CCS 2011. (link)
Tianyuan,
Saad
11/1/2016 Voting Systems 
(slides) (slides)
Status Slides
K. Butler, W. Enck, H. Hursti, S. McLaughlin, P. Traynor, and P. McDaniel, "Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections Following Project EVEREST", USENIX EVT 2008. (link)
R. Fink, A. Sherman, and R. Carback. "TPM Meets DRE: Reducing the Trust Base for Electronic Voting Using Trusted Platform Modules." Transactions on Information Forensics and Security 2009. (link)
Siddharth,
Kyo Hyun
11/3/2016 Voting Systems 2
(slides) (n/a)
S. Wolchok, E. Wustrow, J.A. Halderman, H.K. Prasad, A. Kankipati, S.K. Sakhamuri, V. Yagati, and R. Gonggrijp. "Security analysis of India's electronic voting machines." CCS 2010.  (link)
S. Wolchok, E. Wustrow, D. Isabel, and J. A. Halderman. "Attacking the Washington, D.C. Internet Voting System." Financial Cryptography and Data Security 2012. (link)
Surya,
Matt
11/8/2016 Telephony
(slides) (slides)
W. Enck, P. Traynor, P. McDaniel and T. La Porta, "Exploiting Open Functionality in SMS-Capable Cellular Networks." CCS 2005. (link)
C. Li, G. Tu, C. Peng, Z. Yuan, Y. Li, S. Lu, X. Wang. "Insecurity of Voice Solution VoLTE in LTE Mobile Networks." CCS 2015. (link)
Zane,
Corly
11/10/2016 Telephony 2
(slides) (slides)
F. van den Broek, R. Verdult, and J. de Ruiter. "Defeating IMSI Catchers." CCS 2015. (link)
A. Dabrowski, N. Pianta, T. Klepp, M. Mulazzani, E. Weippl. "IMSI-Catch Me If You Can: IMSI-Catcher-Catchers." ACSAC 2014. (link)
Ren-Jay,
Simon
11/15/2016 Network Infrastructure
(slides) (slides)
Status Slides
D. Wenlandt, D. Anderson, and A. Perrig. "Perspectives: improving SSH-style host authentication with multi-path probing." ATC'08. (link)
B. Reaves, E. Shernan, A. Bates, H. Carter, and P. Traynor. "Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge." USENIX Security '15. (link)
Hassan,
Gohar
11/17/2016 Network Infrastructure 2
(slides) (slides)
V. Balasubramaniyan, A. Poonawalla, M. Ahamad, M. Hunter, and P. Traynor. "PinDr0p: using single-ended audio features to determine call provenance." (link)
J. Liang, J. Jiang, H. Duan, K. Li, T. Wan, and J. Wu. "When HTTPS Meets CDN: A Case of Authentication in Delegated Service." Oakland 2014. (link)
(Suggested Video) M. Marlinskipe. "SSL and the Future of Authenticity," BLACKHAT USA 2011. (link)
Wajih,
Zane
11/22/2016 THANKSGIVING BREAK
11/24/2016 THANKSGIVING BREAK
11/29/2016 Automotive Systems 
(slides) (slides)
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno, "Comprehensive Experimental Analyses of Automotive Attack Surfaces." USENIX Security 2011. (link)
D. Lundberg, B. Farinholt,∗ E. Sullivan, R. Mast, S. Checkoway, S. Savage, A. C. Snoeren, and K. Levchenko. "On The Security of Mobile Cockpit Information Systems." CCS 2014. (link)
(Suggested Video) C. Miller, and C. Valasek. "Remote Exploitation of an Unaltered Passenger Vehicle," DEFCON 23. (link)
Surya,
Kyo Hyun
12/1/2016 Automotive Systems 2
(slides) (grading/wrapup)
K. Cho and K. Shin. "Fingerprinting Electronic Control Units for Vehicle Intrusion Detection." USENIX Security 2016. (link)
Course Wrap-Up
Deepak,
Bates
12/6/2016 Projects
Presentations
Team Bitcoin Wallet, Team ProvContainer, Team Strava
12/8/2016 Projects 2
Presentations
Team Echosquat, Team Gait Identification, Team Hack-the-Xfinities, Team Echoauth, Team WearSec, Team Allibi, Team Fitbit, Team DataPlane, Team ProvThings