cs294s Research Project in Computer Security

Course Syllabus

Spring 2011

 
Lecture 1:
3/29/10
Overview of the Tor system
Reading:
 
Lecture 2:
3/31/10
Tor's bridge design
Reading:
 
Lecture 3:
4/ 5/10
Testing for blocked keywords
Reading:
 
Lecture 4:
4/ 7/10
Blocking misbehaving users in an anonymity network
Reading:
 
Lecture 5:
4/12/10
Applying traffic analysis to Tor
Reading:
 
Lecture 6:
4/14/10
Andrew Bortz
 
Lecture 7:
4/19/10
Roger Dingledine (guest lecture)
 
Lecture 8:
4/21/10
David Fifield
Reading:
 
Lecture 9:
4/26/10
Seminar, Cynthia Sturton
 
Lecture 10:
4/28/10
Ananth: evading blocking with stego
Reading:
 
Lecture 11:
5/ 3/10
Mike Perry: TorButton (guest lecture)
 
Lecture 12:
5/ 5/10
Tor hidden services
Reading:
 
Lecture 13:
5/10/10
P2P anonymous communication: Crowds, Salsa, Halo, ShadowWalker
 
Lecture 14:
5/12/10
Anonymous micropayments: anonymously paying for Tor service
 
Lecture 15:
5/17/10
Content injection attacks on Tor
Reading:
 
Lecture 16:
5/19/10
A new approach to secure randezvous
 
Lecture 17:
5/24/10
A review of course projects: demo session