the class logo
CS G357 - Reading List

Lecture 1 - May 04 : Introduction to Security, Privacy and Usability

Definitions and Goals of Computer Security Understanding Privacy: data disclosure, fair information practices, etc. Usability: What is it?

Assignment #1

Part 1: Create your own definition of security. Use no more than 1 paragraph. Submit on the class website before 4pm, May 6th

Part 2: Write a 950-word essay describing a security incident in which you were personally involved. Be sure to include relevant details including what happened, the outcome, lessons learned, and how the organization recovered. Ideally the incident should involve computer security, but if you cannot think of one, then just pick any security incident --- for example, a theft at school or a case of cheating. Print on paper and bring to class


Network Card Theft Causes Internet Outage
Lecture #01

Lecture 2 - May 06 : Security Policies and Privacy Policies

What is a security policy? Who writes it? What does it include? What does it not include? Perimeter definition and Risk assessment. Attack classification. Examination of some sample policies. Discussion of security incidents. Formulation of a security policy for the class website. Military vs. Commercial objectives. Role of Audit and verification. Codes of Ethics.

Assignment #1 collected

Assignment #2 released

Read the privacy policies for, a website belonging to a federal agency, a website belonging to a university, and one other organization. Write an unbiased 3-page memo comparing the features of each. Do not present your opinion.

Bring three copies of this assignment to class on Tuesday, May 11th. Two copies will be shared with your classmates; one will be turned in for a grade.


Chapter 5 (pp. 33-44), "Special Pub 800-12 -- An Introduction to Computer Security: The NIST Handbook," Computer Security Resource Center (CSRC), National Institute of Standards and Technology, 1996. Download from

ACM Code of Ethics


ISCS - Faculty & Staff

Electronic Communications Privacy Act of 1986

Children's Online Privacy Protection Act of 1998 (COPPA)

HIPAA Privacy Rule and It's Impacts on Research

Lecture 3 - May 11 : Introduction to HCI Usability

What makes interfaces good and bad Affordances User models

Assignment #2 collected and distributed to classmates

Bradley W. Goldstein
Jackie Pournaras

Assignment #3 released

Rewrite assignment #2, paying special attention to graphical presentation of comparison (table or diagram)


Apple Human Interface Guidelines, Apple Computer


The UI Hall of Shame

Pixelcentric Interface Hall of Shame

Lecture 4 - May 13 : Today's Information Security Landscape

Computing devices: Desktop computers, handhelds, cell phones, sensor nets, etc. Servers. Ethernet: Transport, addressing, ARP, usability, management. The Internet: evolution of security. Firewalls. Other networks.


Good, Nathaniel S., Krekelberg, Aaron, Usability and privacy: a study of Kazaa P2P file-sharing

Whitten, Alma, J. D. Tygar, Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. USENIX Security Symposium 1999.

Assignment #2 returned

Lecture 5 - May 18 : Physical Security and Information Leakage

Locks and master keys. Tempest. Soft tempest. Optical Tempest.


M. Blaze. "Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks." March 2003. IEEE Security and Privacy. March/April 2003. [GZIPed PostScript], [PDF].

Robinson, Sara, Master-Keyed Mechanical Locks Fall to Cryptographic Attack, SIAM News, Volume 36, Number 2, 2003.

Kuhn, Markus G., Anderson, Ross, "Soft Tempest: Hidden Data Transmissions Using Electromagnetic Emanations, David Aucsmith (Ed.): Information Hiding 1998, LNCS 1525, pp. 124-142, 1998.

Kuhn, Markus, G., Optical Time-Domain Eavesdropping Risks of CRT Displays, Proceedings 2002 IEEE Symposium on Security and Privacy, 12-15 May 2002, Berkeley, CA., pp. 3-18. [FAQ]

Loughry, Joe., Umphress, D., "Information Leakage from Optical Emanations, ACM Transactions on Information System Security, Vol 5, No 3., August 2002.

Garfinkel., S., Shelat, A., Remembrance of Data Passed: A Study of Disk Sanitization Practices, IEEE Security and Privacy, January 2003.

Assignment #3 collected

Ruopeng Ye

Assignment #4 released:

Revised 5/17/2004
Revised 5/19/2004

In two pages catalog the number of passwords that you use and the restrictions for each one. Be sure to include an introduction, a table, a examples. End with a set of recommendations for developers of password-based authentication systems.

Assignment #5 released:

Obtain a USB flash device from yourself or a friend. Image the device's memory and write a 2 page sanitized report about what you find. Be sure to discuss the tools you used, the files, deleted files, and data in the slack space. If you are unable to find a USB flash device, you may use one of the images on the class website. (Images will be posted by Thursday, May 20th.)


"Engineering and Design - Electromagnetic Pulse (EMP) and Tempest Protection for Facilities", EP 1110-3-2, 31 December 1990.

Politrix Tempest Archive

The Complete, Unofficial TEMPEST Information Page,

Brian Carrier: Digital Forensics

The Sleuth Kit & Autopsy: Forensics Tools for Linux and other Unixes

Lecture 6 - May 20 : Personnel Security and Social Engineering

Are people really the weakest link? Background checks. Social engineering. Training. Worker monitoring: What's appropriate, what's not?


Granger, Sarah. "Social Engineering Fundamentals, Part I: Hacker Tactics",, December 18, 2001

Granger, Sarah. "Social Engineering Fundamentals, Part II: Combat Strategies",, January 9, 2002

CERT Advisory CA-1991-04 Social Engineering

Marx, Gary T., Sherizen, Sanford, Monitoring On The Job: How to Protect Privacy as Well as Property, Technology Review, November-December 1986.

Marx, Gary T., Measuring Everything That Moves: The New Surveillance at Work(In I. and R. Simpson (ed.) The Workplace and Deviance, JAI series on Research in the Sociology of Work, 1999.)


Welcome to the Home Page of Professor Gary T. Marx

Office of Personnel Management Q&A about OPM Background Invesgiations, May 2002.

Background Investigations, Comptroller of the Currency, Washington DC, June 2002.

Jonathan J. Rusch, href="">The note: URL currently unreachable
"Social Engineering" of Internet Fraud, The Internet Society,INET'99, San Jose, California, June 22-25, 1999. note: URL currently unreachable

SANS InfoSec Reading Room, href="">Social note: URL currently unreachable
Engineering, Featuring 8 papers as of May 18, 2004.

Inspector General, Central Intelligence Agency, href="">, REPORT OF note: URL currently unreachable
M. DEUTCH (1998-0028-IG)

Lecture 7 - May 25 : Hash Functions, Fingerprints, and Binary Data.

One-way functions and the random oracle model. MD5 and SHA-1. Uses of hash functions for data identification. MACs. Display of hash fingerprints. Visual hashes.

Slides: [PDF] [Keynote]

Referenced papers in class:
Maheshwari, Umesh, Vingralek, Radek, and Shapiro, William, "How to Build a Trusted Database System on Untrusted Storage"

Assignment #4 collected

Dan Ziminski
Bradley W. Goldstein


RSA Laboratories Crypto FAQ Chapter 3.

The Crypto FAQ, Questions 94, 95, 96, 97, 98, 99, 100, 101.


FIPS180-1: SHA-1

FIPS180-2: The Secure Hash Standard


A file system using hash trees for integrity

Lamport's One-Time Passwords

Hash cash (Adam Back)

Lecture 8 - May 27 : Encryption Algorithms

One-time pads. Creating a key. Stream ciphers. Block ciphers. Modes of Operation.


The rest of the RSA Crypto FAQ. Please be sure to read in particular:

Marcus J. Ranum's One Time Pad FAQ

NIST AES Home Page


Slides on the relative speed of hardware implementations of AES finalists and DES, 3DES

FIPS 197: The Advanced Encryption Standard

NIST 800-67: Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher

Lecture 9 - Jun 01 : User Authentication 1: Passwords and Password Management

Why do we use passwords? Password policies. How to store passwords: the pros and cons of hashing. Cracking Passwords. Recovering Passwords; EBAI.

Graphical Authentication and Visual Passwords.


Jermyn, I., Mayer, A., Monrose, F., Reiter, M. K., & Rubin, A. D. (1999, August). The Design and Analysis of Graphical Passwords. Paper presented at the Proceedings of the 8th USENIX Security Symposium.

Jim Liddell, Karen Renaud and Antonella De Angeli. USING A COMBINATION OF SOUND AND IMAGES TO AUTHENTICATE WEB USERS. Short Paper. HCI 2003. 17th Annual Human Computer Interaction Conference. Designing for Society. Bath, England. 8-12 Sept, 2003."

National Bureau of Standards, Federal Information Processing Standards Publication 112 --- Password Usage, May 30, 1985.

Adams, Anne, and Sasse, Martina Angela, "Users are not the Enemy", Communiations of the ACM, Volume 42, Issue 12, December 1999, pp. 40-46

Garfinkel, S. Email-Based Identification and Authentication: An Alternative to PKI?, IEEE Security and Privacy, November/December 2003.

Assignment #5 collected

Peter Douglass

Assignment #6 released:

1. How long would it take your computer to find a file with an MD5 that starts with the hex string deadbeef?

2. Find such a file. Was your estimate correct? Why or why not?

3. How long would it take your computer to find a file with an MD5 that starts with the string deadbeefdeadbeef?

4. Find a 3-letter word with this MD5: acbd18db4cc2f85cedef654fccc4a4d8

5. Find a word with this MD5: 437b930db84b8079c2dd804a71936b5f

6. Find the multi-digit ASCII number with this MD5: 283f42764da6dba2522412916b031080

7. Crack this Unix password: NEf5XissHxu5o

8. In class it was incorrectly stated that AES is a Feistel cipher. It is not. In one page that includes a diagram, explain how AES works. Do you think that the design of AES is more secure than a Feistel network? Why or why not?

9. In class we briefly discussed two ways of implementing a cryptographic file system. The first approach encrypts each file as the file is written to the disk and decrypts each file as it is read back. A disadvantage of this approach is that is cannot be implemented in hardware.

Design the cryptographic aspects of a hardware-based disk encryption system for encrypting data stored on removable USB drives. Your device should fit between any standard USB drive and any kind of ocmputer. Data written to the USB drive should be automatically encrypted, while data read back should be decrypted. Use a block cipher as your encryption function. Be sure to answer these questions:

Your answer to this problem should be 3 pages.


L0phtcrack - LC5

Crack Password - Password Recovery Software, by Elcomsoft

Lecture 10 - Jun 03 : User Authentication 2: PKI

How RSA works. Certificates and CAs. Smart cards. Single Sign On and Transitive Trust.


RSA Crypto FAQ Section 3.1: RSA

RSA Crypto FAQ Section 3.5: Elliptic Curve Cryptosystems

PKCS #1 (skim)

Simple Public Key Infrastructure (spki) Charter

RFC 2692
RFC 2693

Ellison, Carl. "SPKI/SDSI Certificates See also Web Of Trust


RSA PKCS Standards

Public-Key Infrastructure (X.509)

What is X.509? - A Word Definition From the Webopedia Computer Dictionary
What is digital certificate? - A Word Definition From the Webopedia Computer Dictionary

Lecture 11 - Jun 08 : Biometrics

Pankanti, Sharath, et. all, On the Individuality of Fingerprints.

Tsutomu Matsumoto, Hiroyuki Matsumoto, Koji Yamada, Satoshi Hoshino, Impact of Artificial "Gummy" Fingers on Fingerprint Systems

[Gummy Fingers Slides]

EFF, Biometrics: Who's Watching You

Marchesini, John, Smith, S., Zhao, Meiyuan, KeyJacking: The Surprising Insecurity of Client-side SSL, Technical Report TR2004-489, Department of Computer Science, Dartmouth College, February 13, 2004

Liu, Simon, and Silverman, Mark, A Pradctical Guide to Biometric Security Technology

Assignment #6 collected

Assignment #7 released!

For this assignment, you must identify a partner for you final project and write a 2-page proposal explaining what you intend to do. Your final project in this class will consist of the following:

Your project can either be technical or policy. That is, you can develop and test a piece of technology, or you can write an indepth analysis of a policy issue discussed in this class. The best projects will combine an aspect of both technology development and policy analysis.

Here are some topics that would be worthy of a final project:

For more ideas, you might check out Final Project Ideas from 6.857, the MIT course I helped teach in Fall 2003.


Biometrics: The Journal of the International Biometric Society

The Biometric Consortium

NIST: The Biometrics Resource Center Website

EPIC: "Biometric Identifiers"

United States General Accounting Office, Using Biometrics for Border Security, November 2002.

Lecture 12 - Jun 10 : Special lecture on hash functions

Lecture 13 - Jun 15 : Worms, Viruses and Automated Spoofing

Trojan Horses and Trusted Path. History of computer viruses and worms. Melissa and ILOVEYOU. Relied on people to propagate them. Dartmouth research. "Is it safe to enter my password into this window?".

Assignment #7 collected

Boutin, Paul. Slammed! An inside view of the worm that crashed the Internet in 15 minutes.

E. Ye, S.W. Smith., "Trusted Paths for Browsers."11th Usenix Security Symposium. August 2002

Staniford, Stuart, Paxson, Vern, and Weaver, Nicholas. How to 0wn the Internet in Your Spare Time. Proceedings of the 11th USENIX Security Symposium (Security '02)

eEye Digital Security: Analysis of the Code Red Worm

The "stacheldraht" distributed denial of service attack tool


Trust Management for Humans -- Waterken YURL

Lecture 14 - Jun 17 : Quiz #1

Covers all material through June 15th

Lecture 15 - Jun 22 : Secure Messaging

PEM, PGP and S/MIME Opportunistic Encryption in SSH and SSL. Adding opportunistic encryption to SMTP. Adding opportunistic encryption to email.


D. Wagner and B. Schneier, Analysis of the SSL 3.0 Protocol , The Second USENIX Workshop on Electronic Commerce Proceedings, USENIX Press, November 1996, pp. 29-40.


The GNU Privacy Guard -
MIT distribution site for PGP
OpenSSL: The Open Source toolkit for SSL/TLS

Lecture 16 - Jun 24 : Design for Secure Interaction

Can desktop software be designed in such a way as to promote interaction that is inherently more secure than is commonly seen today? We will focus on two proposals: Ka-Ping Yee's "User Interaction Design for Secure Systems" and Alma Whitten's "Safe Staging." Please read the first two papers and skim the full Whitten and Tygar report and come prepared to discuss.

Ka-Ping Yee, User Interaction Design for Secure Systems.

Whitten, Alma, and J. D. Tygar, Safe Staging for Computer Security, the CHI 2003 workshop paper introducing safe staging.

Whitten, Alma, and J. D. Tygar, Usability of Security: A Case Study, CMU-CS-98-155, the 26-page version of Why Johnny Can't Encrypt


Interaction Design for End-User Security
Dr. Andrew Patrick

Lecture 17 - Jun 29 : RFID


Stephen A. Weis, Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems

Stephen A. Weis, RFID Privacy Workshop

Garfinkel, Adopting Fair Information Practices to Low Cost RFID Systems

The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy

Assignment #8 (Optional)

This is the optional PGP assignment. If you submit assignment #8, then your grade on your lowest assignment will be dropped when your average is computing.

Download a copy of PGP (freeware is fine) from


Lecture 18 - Jul 01 : Logging, Integrity Management, and Computer Crime (Marathon class)


Part 1: 6:00 - 6:20
Best Practices for Security And Usability. (Preview of Simson's DIMACS talk.)

Part 2: 6:20 - 7:50pm: LOGGING
What gets logged? Who are logs for? Logging in Unix and Windows. Logfile management. Data management. Visualization of logfiles Log file policies - who gets to see them. Anonymizing PII

7:50pm - 8:00pm: BREAK

Since it's now kind of late, we'll discuss the truth and hype about "information warfare." (Simson has a nice set of PowerPoint slides on this that were done for a terrorism course.)


Information Warfare (From Technology Review)

Computer Records and the Federal Rules of Evidence

Audit Trails in Evidence - A Queensland Case Study


FBI's Cybercrime Crackdown

Dynamic Instrumentation of Production Systems Paper (PDF - 236K)

Federal Rules of Evidence

SWATCH: The Simple WATCHer of Logfiles


Security Utilities - Logfiles

Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations

The National Strategy to Secure Cyberspace

Additional reading: note: URL currently unreachable

Stanford Website Credibility Project

Lecture 19 - Jul 06 : No Class

Simson will be at the DIMACS Workshop on Usable Privacy and Security Software.

Work on your final projects!


Lecture 20 - Jul 08 : No class

No class as the DIMACS conference continues.

Lecture 21 - Jul 13 : Highlights from the DIMACS conference; Incident Response; Honeynet Project

After a brief discussion of the DIMACS Workshop on Usable Privacy and Security Software, we will discuss incident handling.

Please do all of the reading!

Download and read two of the short papers from the DIMACS Workshop. Bring in 2 copies of each paper and be prepared to discuss them.

The HoneyNet Project:

Know Your Enemy,
Know Your Enemy II,
Know Your Enemy III,
Know Your Enemy: A Forensic Analysis


Honeynet Sebek

Slides from DIMACS

Giving Johnny the Keys, Alma Whitten


Lecture 22 - Jul 15 : Trusted Computing

Hardware vs. Software. Secure co-processors. TCPA. Digital Rights Management Systems. DVD Encryption.



Dartmouth TR2003-476: Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear


Freedom to Tinker

Welcome to the Anti-DMCA Website

Trusted Computing Group: Home

Lecture 23 - Jul 20 : Privacy Protecting Technologies

Onion routing Freedom network Other kinds of PPTs


Tor: The Second-Generation Onion Router

Freenet: A Distributed Anonymous Information Storage and Retrieval System (2000)

Anonymous Connections and Onion Routing (Syverson et al, 1997)

Hushmail - PGP Compatible Secure Free Email - login
Anonymizer - Online Privacy and Security

Detecting Web Bugs With Bugnosis: Privacy Advocacy Through Education (2002) note: URL currently unreachable

Untraceable electronic mail, return addresses, and digital pseudonyms note: URL currently unreachable
David L. Chaum. February 1981. Communications of the ACM note: URL currently unreachable

Onion Routing (CACM 1999)

Lecture 24 - Jul 22 : Watermarking and Steganography



Free Haven (the paper I should have assigned for Tuesday.)

Collusion secure fingerprinting for digital data, D. Boneh, and J. Shaw, IEEE Transactions on Information Theory, Vol 44, No. 5, pp. 1897--1905, 1998.

Steganography Revealed, Kristy Westphal


Hide and Seek: AnIntroduction to Steganography

Lecture 25 - Jul 27 : NO LECTURE DNC

(Lecture 18 was double-length to make up for this lost lecture)

Lecture 26 - Jul 29 : Quiz #2

Covers Lecture 15 (Secure Messaging) through Lecture 22 (Watermarkign and Steganography). Quiz will be posted on the 29th and will be due on August 3rd.

Lecture 27 - Aug 03 : Secure Coding, Testing, and wrap-up

Time Machine Computing (please read website and the first two papers.)

Fuzz Testing If you have the time, please take a look at the 1990 Fuzz Report and the 1995 Fuzz Revisited Report.

Notes: L27.ppt

Lecture 28 - Aug 05 : Presentation of Final Projects

More presentation of projects Papers due by email at beginning of class.