Topic | Assigned Group | Presentation Time | Material |
Stuxnet and ICS/SACDA security. What is ICS/SCADA? What is ICS/SCADA security and why is it becoming signi cant? What is stuxnet? How does it work? |
Curtis Lee (cuslee@ucsc.edu) [Captin] Neville Morgan (namorgan@ucsc.edu) Jeff LaRocque (jslarocq@ucsc.edu) |
Thursday 25th May 10:50 - 11:20 |
|
Wireless. How good is wireless security? WIFI , WiMAX, GSM? What tools and case studies support your view? Why is it so easy to break GSM and WIFI (WEP) security? |
Maria Vizcaino: mvizcain William C. King: wcking Kazi Rahman: krahman |
Tuesday 30th May 9:50 - 10:20 |
|
Web Application testing. What are the main issues with web security? Are those unique to the web or similar to any application security concerns? What testing tools and guidelines are available to help improve web application security? |
Chris Canchola cmcancho@ucsc.edu (Captain) Kyle Salter - ksalter@ucsc.edu Cameron Wheeler cdwheele@ucsc.edu |
Tuesday 30th May 10:20 - 10:50 |
|
DOS tools and DOS case studies Lithuania Georgia. How can DOS/DDOS attacks be stopped and managed? What lessons can be learnt from the Estonia case study? | Viraj Patel (vispatel@ucsc.edu) - Captain Henry Pan (hepan@ucsc.edu) Gerardo Espinoza (gespino7@ucsc.edu) |
Tuesday 30th May 10:50 - 11:20 |
|
Rootkits. How are root kits installed, built, detected, and removed on both linux and windows? Comparative study. |
rgronber (Captain) mianjohn rymjacob |
Thursday 1st June 9:50 - 10:20 |
|
TOR. How can attackers and privacy seekers hide their activities online? What are the available resources to support this? How can security officers trace and defend their networks against such hiding of information (and source of attack)? Case study needed. | Cameron Johnson cojohnso@ucsc.edu (captain) Philip Guther pguther@ucsc.edu Austen Barker atbarker@ucsc.edu |
Thursday 1st June 10:20 - 10:50 |
|
Password cracking: windows, linux, others. What are the main tools used to password cracking? What are the main principles of operations and assumptions governing such tools? Comparative analysis. | David Aguirre (dgaguirr@ucsc.edu) Garret Ding (gding@ucsc.edu) Michael Garcia (mwgarcia@ucsc.edu) |
Thursday 1st June 10:50 - 11:20 |
|
Log analysis. What is log analysis? What tools are available? How can we correlate multiple sources of information? | |||
Packet injection. What is packet injection? What tools are out there? How can we detected it and defeat it? |
Cole Faust cfaust@ucsc.edu (Captain) William Hight whight@ucsc.edu Alex Henry afhenry@ucsc.edu |
Tuesday 6th June 9:50 - 10:20 |
|
Smart card security. What are smart cards? What are the standards and types of smart cards out there? How secure are they? | Yash Gupta (ygupta) [Captin] Justin Raizes (jraizes) |
Tuesday 6th June 10:20 - 10:50 |
|
Carrier IQ. What is it? How does it work? What can be done about it? Is it the only one of its kind? | |||
Software defined networks, SD storage, SD security, SDX. What are those? What are the impacts on security, privacy, performance? | |||
The ACME protocol. what's it for? How is being used? Is it secure? Good idea? | |||
Digital Money. Bit coins, digital money, and the future of online payments. How it works? What are the encryption techniques used? What are the protocols used? |
Sina Hamedian - shamedia@ucsc.edu (Captain) Ryan Monroe - rmonroe@ucsc.edu Wyatt Smith - wssmith@ucsc.edu |
Tuesday 6th June 10:50 - 11:20 |
|
Google’s ProjectVault. what's it for? How will it be used? Good idea? Is there any other environments exists that have the same functionalities. | Alice Yu (aljyu) [Captain] Cameron Schaefer (cbschaef) Taylor Futral (tfutral) |
Thursday 8th June 9:50 - 10:20 |