Assignments
- [Sep 9] The science of guessing: analyzing an anonymized corpus of 70 million passwords, Joseph BonneauDue Sep 9, 2022 at 7am1 Points Possible
- [Sept 12]: A Study of Probabilistic Password Models, Ma et al.Due Sep 12, 2022 at 7am4 Points Possible
- [Sep 14] Beyond credential stuffingDue Sep 14, 2022 at 7:01am4 Points Possible
- [Sep 16] Might I Get PwnedDue Sep 16, 2022 at 7:01am4 Points Possible
- [Sep 19] pASSWORD tYPOS and TypToPDue Sep 19, 2022 at 7:01am4 Points Possible
- [Sep 21] Fuzzy ExtractorsDue Sep 21, 2022 at 7am4 Points Possible
- [Sep 23] Biometrics: A Tool for Information Security,Due Sep 23, 2022 at 7am4 Points Possible
- Group creationDue Sep 23, 2022 at 11:59pm5 Points Possible
- [Sep 26] Data Breaches, Phishing, or Malware?Due Sep 26, 2022 at 7:01am4 Points Possible
- [Sep 28] Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network DevicesDue Sep 28, 2022 at 7:01am4 Points Possible
- [Sep 30] SoK: Hate, Harassment, and Online AbuseDue Sep 30, 2022 at 7:01am4 Points Possible
- [Oct 3] Decentralized Privacy-preserving Proximity TracingDue Oct 3, 2022 at 7:01am4 Points Possible
- [Oct 5] Quantifying Location PrivacyDue Oct 5, 2022 at 7:01am4 Points Possible
- [Oct 7] Analysis of Privacy ProtectionsDue Oct 7, 2022 at 7am4 Points Possible
- [Oct 10] The Geometry of Innocent Flesh on the BoneDue Oct 10, 2022 at 7:01am4 Points Possible
- [Oct 12] Code-Reuse attacks for the webDue Oct 12, 2022 at 7am4 Points Possible
- Project proposalDue Oct 14, 2022 at 6pm10 Points Possible
- [Oct 24] The Android Permissions DemystifiedDue Oct 24, 2022 at 7:01am4 Points Possible
- [Oct 26] MAC Address RandomizationDue Oct 26, 2022 at 7:01am4 Points Possible
- [Oct 28] Robust DeanonymizationDue Oct 28, 2022 at 7:01am4 Points Possible
- [Oct 31] Cryptdb: Encrypted databasesDue Oct 31, 2022 at 7:01am4 Points Possible
- [Nov 7] A sense of self in Unix processesDue Nov 7, 2022 at 7:01am4 Points Possible
- [Nov 9] An Intrusion Detection ModelDue Nov 9, 2022 at 7am4 Points Possible
- [Nov 11] OpenVPN is Open to VPN FingerprintingDue Nov 11, 2022 at 7:01am4 Points Possible
- [Dec 2] Charting the Attack Surface of Trigger-Action IoT PlatformsDue Dec 2, 2022 at 7:01am4 Points Possible
- [Dec 5] Membership inference attacks against ML modelsDue Dec 5, 2022 at 7:01am4 Points Possible
- [Dec 7] Extracting training dataDue Dec 7, 2022 at 7:01am4 Points Possible
- Project presentationDue Dec 15, 2022 at 11:59pm30 Points Possible
- Final Project ReportClosedDue Dec 18, 2022 at 11:59pm35 Points Possible
- Attack presentationDue Dec 9, 2022 at 11:59pm10 Points Possible
- Paper presentationDue Dec 9, 2022 at 11:59pm10 Points Possible
- Mid-project presentation and Peer reviewsDue Nov 6, 2022 at 11:59pm20 Points Possible
- Fill up presentation daysDue Sep 16, 2022 at 11:59pmNo Points Possible