CS551: Security and Privacy on the Internet, Fall 2000 |
Manifest: Wednesday 29 November - Monday 4 December
Assignments Due
- Wednesday 29 November, before class (or Friday 1 December, 5:00pm for early project presenters): Problem Set 4
- Wednesday 29 November: Team 1-3, 10-12 Project Presentations
- Monday, 4 December: Team 4-9 Project Presentations
- Wednesday, 6 December (before class): Project Reports
- Monday, 11 December (5:00pm): Final Due
Project Presentations
Wednesday, 29 November
Team 3: ISIS Online
Adam Spanberger, Kristen Rae Olvera, Mike Lanouette, Ryan HammondTeam 2: Internet Credit Card Security Issues
Adam Scott Trost, Dev Batta, Son Truong HoTeam 1: Securing Internet Chat
Aaron Bajek, Daniel George Loffredo, Jae Woo Pak, William GJ HalfondTeam 12: Smart Card Security
Gregory Kish, Jamie Walls, Rob RexTeam 11: Bluetooth Security
Gerlando Falauto, Greg Lamm, Jagadesh Gadiyaram, Jorge Estrada ColladoTeam 10: Digital Millenium Act and the DCSS Case
Elizabeth Partridge, Timothy Catlett, Victor Von Ludwig, William Haubert
Monday, 4 December
Team 7: Requirements for Building a Secure System for Online Performance Evalutions
Dan Rubin, James Tsai, James Watson, Philip VarnerTeam 9: Copyright Protection with Fair Use
David Dobbs, Jennifer Kahng, Virginia Volk, William GreenwellTeam 8: Password-Reminder Systems
Dave Rubens, Jermaine McDonald, Jon Axisa, Ryan PersaudTeam 6: Server Side Macro Virus Filter
Christopher Hayden, John Loizeaux, Matthew Keller, William FosterTeam 5: A Study of the Secure Digital Music Initiative
Brandon Sutler, Jesse Robinson, Sachin Kamath, Vineet AggarwalTeam 4: User Attacks
Andrew Snyder, Carl Morris, Tran Ngoc ("Ken") NguyenWhen you begin the Activation process, Microsoft Reader first checks to see if you are signed in on Microsoft Passport. Once you are signed in, Microsoft Reader collects unique information about your computer and sends it to a Microsoft Activation Server. The following information is transmitted:
- A Hardware Identification code, computed using serial numbers and other information unique to your computer. The code is computed in such a way that it is not possible to reconstruct your computer's unique information from the code, using a technique known as a "one-way hash function." In this way, Microsoft respects the privacy of information about your computer hardware while still providing you with access to copy protected content from eBook publishers.
Microsoft Reader Guidebook
Several years ago Microsoft made a big deal about Windows NT getting a C2 security rating. They were much less forthcoming with the fact that this rating only applied if the computer was not attached to a network and had no network card, had its floppy drive epoxied shut, and was running on a Compaq 386.
Bruce Schneier, Secrets and Lies
University of Virginia Department of Computer Science CS 551: Security and Privacy on the Internet |
David Evans evans@virginia.edu |