CSC/ECE 774 Advanced Network Security

Class Schedule

Note: This is a tentative schedule, and will be updated. Please check frequently.

Date Topics Reading Assignments
Handouts
01/10/08

Topic 1. Introduction

Topic 2. Network Security Primitives

Topic 2.1 Absolute Basics

 

Topic 1

Topic 2.1

01/15/08

Topic 2.2 Hash-Based Primitives

R. Merkle. "A certified digital signature." In Advances in Cryptology -CRYPTO '89, pages 218-239, 1990.

Bloom filter (Wikipedia)

A. Juels and J. Brainard, "Client puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks." in: Proceedings of NDSS '99, 1999, pp. 151--165.

Topic 2.2 (pps)

Topic 2.2.x-ClientPuzzle (ppt)

01/17/08 Topic 2.2 (Cont'd)

T. Aura, P. Nikander, and J. Leiwo, "DoS-Resistant Authentication with Client Puzzles." In Proceedings of the 8th International Workshop on Security Protocols, LNCS 2133, 170-177.

B. Waters, A. Juels, J. Halderman, and E. Felten, "New Client Puzzle Outsourcing Techniques for DoS Resistance." In Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS '04), 246-256.

 

01/22/08

Topic 2.3 Secret Sharing

Topic 2.4 Rabin's Information Dispersal Algorithms

A. Shamir, How to share a secret, Communications of the ACM, Vol. 22, No. 11, pages 612-613, 1970.

Secret Sharing on Wikipedia

Michael O. Rabin. "Efficient dispersal of information for security, load balancing, and fault tolerance." In Journal of the ACM, Vol. 36, No. 2, 1989.

Topic 2.4 (pps)

01/24/08

 

Topic 2.5 Secret Handshake

 

D. Balfanz, G. Durfee, N. Shankar, D.K. Smetters, J. Staddon, and H.C.Wong."Secret handshakes from pairing-based key agreements." In IEEE Symposium on Security and Privacy, 2003.

C. Castelluccia, S. Jarecki and G. Tsudik. "Secret Handshakes from CA-oblivious Encryption." IACR AsiaCrypt'04, December 2004.

Topic 2.5
01/29/08

 

   
01/31/08

Topic 2.5 (Cont'd)

 

 

02/05/08

Topic 2.6 ID-Based Cryptography

Adi Shamir. "Identity-Based Cryptosystems and Signature Schemes." Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science, 7:47--53, 1984.

Dan Boneh, Matthew K. Franklin, "Identity-Based Encryption from the Weil Pairing." Advances in Cryptology - Proceedings of CRYPTO 2001 (2001).

Topic 2.6.1

Topic 2.6.2

02/07/08

Topic 3. Electronic Payment Systems

Topic 3.1 NetBill

Benjamin Cox, J.D. Tygar, and Marvin Sirbu. "Netbill Security and Transaction Protocol," In The First USENIX Workshop on Electronic Commerce, pages 77--88, July 1995.

Topic 3.1

02/12/08

Topic 3.2 Micropayment

R.L. Rivest, A. Shamir, "PayWord and MicroMint: Two simple micropayment schemes," In Proceedings of Security Protocols Workshop, pages 69 - 87, 1996.

(optional) Silvio Micali and Ronald Rivest. Micropayments revisited. In Bart Preneel, editor, Progress in Cryptology --- CT-RSA 2002, volume 2271 of Lecture Notes in Computer Science. Springer-Verlag, February 18-22 2002.

Topic 3.2
02/14/08

Mid-term Exam #1

Topics 1-2  
02/19/08

Topic 3.3 Fair Exchange

N. Asokan, M. Schunter, and M. Waidner."Optimistic Protocols for Fair Exchange," In Proceedings of 4th ACM Conference on Computer and Communications Security, Zurich, April 1997.

Topic 3.3
02/21/08

Topic 4. Broadcast Authentication

Topic 4.1 TESLA and EMSS

A. Perrig, R. Canetti, D. Song, and D. Tygar, “Efficient Authentication and Signing of Multicast Streams over Lossy Channels,” in Proc. of IEEE Security and Privacy Symposium, May 2000.

(Optional) A. Perrig, R. Canetti, D. Song, and D. Tygar, “Efficient and Secure Source Authentication for Multicast,” in Proceedings of Network and Distributed System Security Symposium, February 2001.

(Optional) Guy Fawkes Protocol -- R. Anderson, F. Bergadano, B. Crispo, J.H. Lee, C. Manifavas,and R. Needham, "A New Family of Authentication Protocols".

Topic 4.1
02/26/08

Topic 4.1 (Cont'd)

Topic 4.2 BiBa

Adrian Perrig, "The BiBa One-Time Signature and Broadcast Authentication Protocol," in Proceedings of the ACM Conference on Computer and Communications Security, November, 2001.

Topic 4.2
02/28/08

Topic 4.2 (Cont'd)

Topic 4.3 Message Specific Puzzles

Peng Ning, An Liu, Wenliang Du, "Mitigating DoS Attackes against Broadcast Authentication in Wireless Sensor Networks," in ACM Transactions on Sensor Networks (TOSN), Vol. 4, No. 1, February 2008.

Topic 4.3
03/04/08 No Class
(Spring Break)
   
03/06/08 No Class
(Spring Break)
   
03/11/08

Topic 4.4 Secure and resilient remote Programming in wireless sensor networks -- An application of broadcast authentication

Sangwon Hyun, Peng Ning, An Liu, Wenliang Du, "Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks," To appear in Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), IP Track, April 2008.

Topic 4.4
03/13/08

Topic 4.4 (Cont'd)

Topic 5. Group Key Management

Topic 5.1 Group Key Agreement

M. Steiner, G. Tsudik, and M. Waidner, “Diffie-Hellman Key Distribution Extended to Group Communication,” in Proceedings of the 3rd ACM Conference on Computer and Communications Security, pages 31--37, 1996.

Topic 5.1
03/18/08

TinyOS and nesC

Guest lecture by An Liu

 

 
03/20/08

Topic 5.1 (Cont'd)

Topic 5.2 Tree-Based Group DH

Y. Kim. A. Perrig and G. Tsudik, "Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups." In Proceedings of the 7th ACM Conference on Computer and Communications Security (ACM CCS 2000), ACM Press, Nov. 2000. Topic 5.2 ppt
03/25/08

Topic 5.2 (Cont'd)

Topic 5.3 Group Key Distribution

Suvo Mittra, "Iolus: a framework for scalable secure multicasting," In Proceedings of the ACM SIGCOMM '97, pages 277 - 288, 1997.

D. Wallner, E. Harder, R. Agee, "Key Management for Multicast: Issues and Architectures," IETF RFC 2627, June 1999.

(Optional) Chung Kei Wong, Mohamed Gouda, Simon S. Lam, "Secure group communications using key graphs," In Proceedings of SIGCOMM '98, Pages: 68 - 79.

Topic 5.3 ppt
03/27/08

Topic 5.3 (Cont'd)

Topic 6. Sensor Network Security

Topic 6.1 Random Key Pre-Distribution

L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 41--47, November, 2002. Topic 6.1
04/01/08

Topic 6.1 (Cont'd)

H. Chan, A. Perrig, and D. Song, "Random Key Predistribution Schemes for Sensor Networks," in Proceedings of 2003 IEEE Symposium on Security and Privacy, May 2003.

D. Liu and P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks,” in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pages 52--61, Washington D.C., October, 2003.

 
04/03/08

Topic 6.2 Secure and Resilient Location Estimation

Donggang Liu, Peng Ning, Wenliang Du, "Attack-Resistant Location Estimation in Sensor Networks," in Proceedings of The Fourth International Symposium on Information Processing in Sensor Networks (IPSN '05), pages 99 -- 106, April 2005.

Topic 6.2
04/08/08

Topic 6.3 Secure Clock Synchronization

Kun Sun, Peng Ning, Cliff Wang, An Liu, Yuzheng Zhou, "TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks," in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06), pages 264--277, Alexandria, Virginia, October/November 2006.

Topic 6.3
04/10/08 Topic 6.4 Mitigating DoS Attacks in Broadcast Authentication

Qi Dong, Donggang Liu, Peng Ning, "Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Wireless Sensor Networks," in Proceedings of 1st ACM Conference on Wireless Network Security (WiSec '08), March/April, 2008.

Topic 6.4
04/15/08 Mid-term Exam #2 Topics 3--6.3 (6.4 not included)  
04/17/08 Advanced Topics

1. Apu Kapadia, Nikos Triandopoulos, "Halo-High Assurance Locate for Distributed Hash Tables", in Proceedings of 15th Annual Network & Distributed System Security Symposium (NDSS 2008), February 2008.


Young-Hyun Oh

 

 

 

04/22/08 Advanced Topics

2. Patrick Traynor, Kevin Butler, William Enck and Patrick McDaniel, "Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems," in Proceedings of 15th Annual Network & Distributed System Security Symposium (NDSS 2008), February 2008.

3. David Dagon, Chris Lee, Wenke Lee, Niels Provos, "Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority,"
in Proceedings of 15th Annual Network & Distributed System Security Symposium (NDSS 2008), February 2008.

4. Gilbert Wondracek, Christopher Kruegel, Engin Kirda, Paolo Milani, Scuola Superiore S. Anna, "Automatic Network Protocol Analysis,"
in Proceedings of 15th Annual Network & Distributed System Security Symposium (NDSS 2008), February 2008.

 

Yao Liu

 

 

 

Ahmed Azab

 

 

 

Manas

 

04/24/08 Advanced Topics

5. Zhiqiang Lin, Dongyan Xu, Xiangyu Zhang, Xuxian Jiang, "Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution," in Proceedings of 15th Annual Network & Distributed System Security Symposium (NDSS 2008), February 2008.

6. Radmilo Racic, Hao Chen, Xin Liu, Denys Ma, "Exploiting Opportunistic Scheduling in Cellular Data Networks," in Proceedings of 15th Annual Network & Distributed System Security Symposium (NDSS 2008), February 2008.

7. XiaoFeng Wang, Zhuowei Li, Jong Youl Choi, Ninghui Li, "PRECIP: Practical and Retrofittable Confidential Information Protection Against Spyware Surveillance,"
in Proceedings of 15th Annual Network & Distributed System Security Symposium (NDSS 2008), February 2008.

Sri Siri Vineela Kukkadapu

 

 

Neha Agarwal

 

 

 

Niraj Deosthali

04/29/08      

 

©2009 Peng Ning . All rights reserved.