| Aug 26 | Introduction and syllabus | - S. Keshav.
How to Read a Paper. ACM SIGCOMM Computer Communication Review, Volume 37, Number 3, July 2007.
| |
| Aug 28 | Economic view of cybersecurity - Alex Gantman, VP Security Engineering, Qualcomm | | |
| Sep 2 | End users and cybersecurity | | |
| Sep 4 | Cybersecurity as a scientific pursuit - Cormac Herley, Principal Researcher, Microsoft | | |
| Sep 9 | Cybersecurity and risk assessment | | |
| Sep 11 | Passwords | - Blase Ur, Jonathan Bees, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor. Do Users’
Perceptions of Password Security Match Reality? In Proceedings of CHI 2016.
- Optional: Nisenoff, Alexandra, Maximilian Golla, Miranda Wei, Juliette Hainline, Hayley Szymanek, Annika Braun, Annika Hildebrandt, Blair Christensen, David Langenberg, and Blase Ur.
A Two-Decade Retrospective Analysis of a University’s Vulnerability to Attacks Exploiting Reused Passwords. In USENIX Security 2023.
| |
| Sep 16 | The business of attacks, and paying attackers for defense | | |
| Sep 18 | LLMs and their impact on cyberattacks | - Nicholas Carlini, Milad Nasr, Edoardo Debenedetti, Barry Wang, Christopher A. Choquette-Choo, Daphne Ippolito, Florian Tramer, Matthew Jagielski.
LLMs unlock new paths to monetizing exploits. arXiv preprint arXiv:2505.11449 (2025).
- Oege de Moor and Albert Ziegler.
XBOW Unleashes GPT-5’s Hidden Hacking Power, Doubling Performance. XBOW blog, August 15, 2025. (On August 18,
XBOW became #1 ranked, better than all human teams, on HackerOne.)
| |
| Sep 23 | Measuring secure software development practices | - Ruef, Andrew, Michael Hicks, James Parker, Dave Levin, Michelle L. Mazurek, and Piotr Mardziel.
Build it, break it, fix it: Contesting secure development. CCS 2016.
- See also: Long version (with an additional contest, fuller descriptions) in ACM TOPS 2020.
- Votipka, Daniel, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, and Michael Hicks.
Understanding security mistakes developers make: Qualitative analysis from build it, break it, fix it. USENIX Security 2020.
| |
| Sep 25 | Project pitches | Individual students, or groups who wish to work together, should prepare project pitches. See the
syllabus for details. | |
| Sep 30 | Empirical evaluations: Fuzz testing | - Klees, G., Ruef, A., Cooper, B., Wei, S. and Hicks, M., 2018, October.
Evaluating fuzz testing. In CCS 2018.
- Schloegel, Moritz, et al.
Sok: Prudent evaluation practices for fuzzing. In S&P 2024.
- Optional: Blackburn, Steve, et al.
SIGPLAN Empirical Evaluation guidelines. 2018.
| |
| Oct 2 | Statistical tests: Pitfalls | | |
| Oct 7 | Threat modeling - Adam Shostack, Shostack Associates | | |
| Oct 9 | Fall break, no class | Project proposals due. See the
syllabus for details. | |
| Oct 14 | Password managers, ethics of human studies | | |
| Oct 16 | What’s still missing in static analysis? - Mayur Naik, Prof of CIS @ UPenn | Guest lecture about static analysis technology (including for finding security bugs), the influence of LLMs on it, and how we measure progress. | |
| Oct 21 | Building Security in Maturity Model (BSIMM) | - Gary McGraw, Brian Chess, and Sammy Migues.
Building Security In Maturity Model, 2009.
- Recommendation: Watch this
talk by Gary McGraw, and refer to the report to check the details.
- Laurie Williams, Gary McGraw, and Sammy Migues.
Engineering Security Vulnerability Prevention, Detection, and Response. IEEE Software, 2018.
- Alex Gantman.
Retrospective on the BSIMM, personal correspondence, 2025.
| |
| Oct 23 | Economic investment in cybersecurity | | |
| Oct 28 | Usability: Privacy & passwords | | |
| Oct 30 | Measuring security trends; deployment challenges | | |
| Nov 4 | Understanding and simulating users (considering privacy) | - Priyanka Nanayakkara, Mary Anne Smart, Rachel Cummings, Gabriel Kaptchuk, Elissa M. Redmiles.
What Are the Chances? Explaining the Epsilon Parameter in Differential Privacy, USENIX Security 2023.
- Optional (presented by Jiayi Xin): Boyu Qiao, Kun Li, Wei Zhou, Shilong Li, Qianqian Lu, Songlin Hu.
BotSim: LLM-Powered Malicious Social Botnet Simulation, AAAI 2025.
| |
| Nov 6 | Cyber Public Health (CPH), and the quantum crypto transition | | |
| Nov 11 | Finding bugs, and exploiting them | | |
| Nov 13 | Heartbleed’s effects, and gamified security training | - Zakir Durumeric, Frank Li, James Kasten, Nicholas Weaver, Johanna Amann, Jethro Beekman, Mathias Payer, David Adrian, Vern Paxson, Michael Bailey, J. Alex Halderman.
The Matter of Heartbleed, In ACM Internet Measurement Conference 2014.
- Optional (presented by Lucia Kulzer): Silic, M., & Lowry, P. B.
Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance. Journal of Management Information Systems, 37(1), 129-161, 2020.
| |
| Nov 18 | Modeling security risk, efforts at post-quantum mitigation | | |
| Nov 20 | Vulnerability lifetimes; on-line scams | | |
| Nov 25 | TG week: No class | | |
| Nov 27 | TG week: No class | | |
| Dec 2 | Final project presentations | | |
| Dec 4 | Final project presentations | | |
| Dec 12 | Final project report due | | |