Date |
Name(s) |
|
|
Topic |
Wed 29 Apr
2015 |
DiMotto, J. |
|
|
Differential cryptanalysis |
|
Cook, E. |
|
|
Steganography |
|
Spaeth, K. |
|
|
Wireless security: WEP, WPAv1, and WPAv2 and Notes |
Thu 30 Apr
2015 |
Ault, J. |
Moore, A. |
|
ARP Spoofing |
|
Dorn, J. |
|
|
DDoS/DoS attacks |
Fri 1 May
2015 |
|
|
|
|
|
Hoffmann, B. |
|
|
Heartbleed bug |
|
Ramirez, B. |
|
|
Ubiquitous encryption |
Wed 6 May
2015 |
Bitz, S. |
|
|
SQL Injection |
|
Overboe, N. |
|
|
Security in Distributed Systems |
|
Almatrudi, A. |
|
|
Cloud storage (e.g., Dropbox, iCloud) |
Thu 7 May
2015 |
Krytkowski, A. |
|
|
Automotive RFID Ignition Systems |
|
Jackson, B. |
Wittman, E. |
|
Android security |
Fri 8 May
2015 |
Bartels, B. |
Kimpel, C. |
Loberger, N. |
Mobile platform security (Android, iOS, ...) |
Wed 13 May
2015 |
Pettigrew, T. |
|
|
Apple Pay |
|
Frasier, N. |
|
|
Multi-factor authentication |
|
Durante, M. |
|
|
Multi-level security |
Thu 14 May
2015 |
Suckow, M. |
Zvarych, R. |
|
Hacktivism |
|
Donohew, E. |
Sparks, J. |
|
Social Engineering |
Fri 15 May
2015 |
Maki, J. |
Vogel, M. |
|
Cyberphysical security in networked control systems |
|
Voller, J. |
|
|
NSA asking corporations to insert backdoors |
|
Herman, M. |
|
|
Cyber warfare |
|
|
|
|
|