Survey Paper Topics

Topic Assigned Group Presentation Time Material
Stuxnet and ICS/SACDA security. What is ICS/SCADA? What is ICS/SCADA security and why is it becoming signi cant? What is stuxnet? How does it work?  

Curtis Lee (cuslee@ucsc.edu) [Captin]

Neville Morgan (namorgan@ucsc.edu)

Jeff LaRocque (jslarocq@ucsc.edu)

Thursday 25th May

10:50 - 11:20

Paper

Presentation

Wireless. How good is wireless security? WIFI , WiMAX, GSM? What tools and case studies support your view? Why is it so easy to break GSM and WIFI (WEP) security?  

Maria Vizcaino: mvizcain

William C. King: wcking

Kazi Rahman: krahman

 

Tuesday 30th May

9:50 - 10:20

Paper

Presentation

Web Application testing. What are the main issues with web security? Are those unique to the web or similar to any application security concerns? What testing tools and guidelines are available to help improve web application security?  

Chris Canchola cmcancho@ucsc.edu (Captain)

Kyle Salter - ksalter@ucsc.edu

Cameron Wheeler cdwheele@ucsc.edu


Tuesday 30th May

10:20 - 10:50

Paper

Presentation

DOS tools and DOS case studies Lithuania Georgia. How can DOS/DDOS attacks be stopped and managed? What lessons can be learnt from the Estonia case study?  Viraj Patel (vispatel@ucsc.edu) - Captain

Henry Pan (hepan@ucsc.edu)

Gerardo Espinoza (gespino7@ucsc.edu)
 

Tuesday 30th May

10:50 - 11:20

Paper

Presentation

Rootkits. How are root kits installed, built, detected, and removed on both linux and windows? Comparative study.

rgronber (Captain)

mianjohn

rymjacob

 

Thursday 1st June

9:50 - 10:20

Paper

Presentation

TOR. How can attackers and privacy seekers hide their activities online? What are the available resources to support this? How can security officers trace and defend their networks against such hiding of information (and source of attack)? Case study needed. Cameron Johnson cojohnso@ucsc.edu (captain)

Philip Guther  pguther@ucsc.edu

Austen Barker  atbarker@ucsc.edu

Thursday 1st June

10:20 - 10:50

Paper

Presentation

Password cracking: windows, linux, others. What are the main tools used to password cracking? What are the main principles of operations and assumptions governing such tools? Comparative analysis. David Aguirre (dgaguirr@ucsc.edu)

Garret Ding (gding@ucsc.edu)

Michael Garcia (mwgarcia@ucsc.edu)

Thursday 1st June

10:50 - 11:20

Paper

Presentation

Log analysis. What is log analysis? What tools are available? How can we correlate multiple sources of information?      
Packet injection. What is packet injection? What tools are out there? How can we detected it and defeat it?  

Cole Faust cfaust@ucsc.edu (Captain)

William Hight whight@ucsc.edu

Alex Henry afhenry@ucsc.edu

Tuesday 6th June

9:50 - 10:20

Paper

Presentation

Smart card security. What are smart cards? What are the standards and types of smart cards out there? How secure are they? Yash Gupta     (ygupta) [Captin]
Justin Raizes   (jraizes)

Tuesday 6th June

10:20 - 10:50

Paper

Presentation

Carrier IQ. What is it? How does it work? What can be done about it? Is it the only one of its kind?      
Software defined networks, SD storage, SD security, SDX. What are those? What are the impacts on security, privacy, performance?      
The ACME protocol. what's it for? How is being used? Is it secure? Good idea?      
Digital Money. Bit coins, digital money, and the future of online payments. How it works? What are the encryption techniques used? What are the protocols used?  

Sina Hamedian - shamedia@ucsc.edu (Captain)

Ryan Monroe - rmonroe@ucsc.edu

Wyatt Smith - wssmith@ucsc.edu

Tuesday 6th June

10:50 - 11:20

Paper

Presentation

Google’s ProjectVault. what's it for? How will it be used? Good idea? Is there any other environments exists that have the same functionalities. Alice Yu (aljyu) [Captain]
Cameron Schaefer (cbschaef)
Taylor Futral (tfutral)
 

Thursday 8th June

9:50 - 10:20

Paper

Presentation