Basic Course Details:
|
| Discussion Date | Topic/Theme/Papers |
| Tuesday, March 29 | Intro to the Class and a Case Study no reading yet |
| Thursday, March 31 |
Insider Threats
Guest Speaker: Matt Bishop, UC Davis |
| Tuesday, April 5 |
Insider Threats
Christian W. Probst, Jeffrey Hunker, Matt Bishop, and Dieter Gollmann, Countering Insider Threats (Dagstuhl Seminar Proceedings), 2008. Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, and Christian W. Probst, Insider Threats: Strategies for Prevention, Mitigation, and Response (Dagstuhl Seminar Proceedings), 2010. |
| Thursday, April 7 |
Insider Threats
Matt Bishop, Sophie Engle, Deborah A. Frincke, Carrie Gates, Frank L. Greitzer, Sean Peisert, and Sean Whalen, "A Risk Management Approach to the 'Insider Threat,'" Insider Threats in Cyber Security, pp. 115–138, Springer Verlag, 2010. Frank L. Greitzer and Deborah A. Frincke, "Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation," Insider Threats in Cyber Security, pp. 85–113, Springer Verlag, 2010.
|
| Tuesday, April 12 3:10pm |
Insider Threats
Lizzie Coles-Kemp and Marianthi Theoharidou, "Insider Threat and Information Security Management," Insider Threats in Cyber Security, pp. 45–71, Springer Verlag, 2010. A. Beautement, M. A. Sasse, and M. Wonham, "The compliance budget: Managing security behaviour in organisations," Proc. of NSPW 2008. |
| Thursday, April 14 4:40pm |
Control Systems
R. Krishnan, "Meters of Tomorrow," IEEE Power and Energy Magazine, pp. 92-94, Mar. 2008. A. Ipakchi and F. Albuyeh, "Grid of the future", IEEE Power and Energy Magazine, pp. 52-62, Mar. 2009. H. Khurana, M. Hadley, N. Lu, and D.A. Frincke, "Smart-Grid Security Issues," IEEE Security & Privacy Magazine, 8(1):81–85, 2010. |
| Tuesday, April 19 3:10pm |
Control Systems
M.D. Ilic, et al., "From hierarchical to open access electric power systems," Proceedings of the IEEE, 95(5):1060–1084, 2007. The Smart Grid Interoperability Panel Cyber Security Working Group, Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security, Sept. 2010. Sections: 3.1–3.3, 3.7–3.25 (skim!)
|
| Thursday, April 21 3:10pm |
Critical Systems
Guest Speaker: Christian Kreibich, ICSI |
| Tuesday, April 26 3:10pm |
Control Systems
Symantec, "W32.Stuxnet Dossier (v.1.4)," February 2011. |
| Thursday, April 28 4:40pm |
Control Systems
D. Salmon, M. Zeller, A. Guzma n, V. Mynam, and M. Donolo, "Mitigating the Aurora Vulnerability With Existing Technology," Tech report, Schweitzer Engineering Lab, 2009. M. Zeller, "Myth or Reality – Does the Aurora Vulnerability Pose a Risk to My Generator?" Tech report, Schweitzer Engineering Laboratories, Inc., 2010. R. S. Boyer, M. W. Green and J S. Moore, "The Use of a Formal Simulator to Verify a Simple Real Time Control Program," Beauty is Our Business, Springer-Verlag, 1990, pp. 54-66. |
| Tuesday, May 3 3:10pm |
Control Systems
Guest Speaker: Charles McParland, Berkeley Lab |
| Thursday, May 5 3:10pm |
Critical Systems
Guest Speaker: Ed Talbot, Sandia National Laboratories |
| Tuesday, May 10 3:10pm |
Control Systems
M. Pipattanasomporn, H. Feroze, S. Rahman, "Multi-Agent Systems in a Distributed Smart Grid: Design and Implementation," Proc. IEEE PES 2009 Power Systems Conference and Exposition, Mar. 2009. R. Anderson and S. Fuloria, "Who controls the off switch?" Proc. of IEEE SmartGridComm, October 2010. R. Anderson and S. Fuloria, "On the security economics of electricity metering," Proc. of WEIS, 2010.
|
| Thursday, May 12 3:10pm |
Control Systems
Guest Speaker: Steven Templeton, UC Davis |
| Tuesday, May 17 3:10pm | Control Systems
T. Denning, A. Borning, B. Friedman, B.T. Gill, T. Kohno, and W.H. Maisel, "Patients, Pacemakers, and Implantable Defibrillators: Human Values and Security for Wireless Implantable Medical Devices," Proc. of CHI, 2010. W.H. Maisel and T. Kohno, "Improving the Security and Privacy of Implantable Medical Devices," New England Journal of Medicine, 362(13), April 2010. K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, "Experimental Security Analysis of a Modern Automobile," Proc. of IEEE Security & Privacy, Oakland, May 2010. H. K. Prasad, J. A. Halderman, R. Gonggrijp, S. Wolchok, E. Wustrow, A. Kankipati, S. K. Sakhamuri, V. Yagati, "Security Analysis of India's Electronic Voting Machines," Proc. of ACM CCS, 2010. |
| Thursday, May 19 3:10pm |
Red Teaming, Data Sanitization & Critical Systems
Guest Speaker: Matt Bishop, UC Davis |
| Tuesday, May 24
| No Class: Oakland Conference |
| Thursday, May 26
| No Class: Oakland Conference & GGCS Spring Research Forum |
| Tuesday, May 31 3:10pm | Student Presentations |
| Thursday, June 2 3:10pm | Student Presentations |