CS 4401 (A10): Software Security Engineering
Presentation Expectations

Home | Staff | Syllabus | Assignments | MyWPI | Policies


Each presentation should consume half of a class meeting. You should prepare a 20-minute presentation, leaving a few minutes for questions and discussion. You and your partner can split this time however you want (including having one of you do all the talking). However, you should give one cohesive presentation, rather than two separately-prepared segments. The goal of having you work in teams is to get stronger presentations. You should design the presentation (content, structure, etc) as a team.


Initial References

Here are some starting links relevant to each topic (I'll be getting them up for all topics over the next few days). You don't have to present exactly the content of these papers, but I expect these to figure into your presentation to some extent unless you clear different references with me beforehand. (This is mainly to ensure that presentations are aiming for the appropriate technical depth). Some of the papers contain references to other useful information, so check those out in preparing your presentation.

To access links into ACM's Digital Library, you will need to be inside the WPI network (either directly or via VPN).

Android security Model (Sep 14)

Google Chrome security architecture (Sep 14)

Mobile banking (security aspects) (Sep 20)

Look into socio-technical issues as well as how mobile banking works technically.

Electronic Voting (Sep 20)

Privacy on Facebook (Sep 21)

Generally a rich topic with lots to be found. No need to stick to these, but do bring socio-technical dimensions into the discussion.

Data Aggregation across Social Networks (Sep 21)

E-passports (Sep 27)

Hijacking a modern car (Sep 27)

Denial of Service (Sep 28)

A case study or two on successful attacks and their broader implications would make sense here.

Tor Anonymity tool (Sep 28)

Rootkits (Oct 4)

Digital Rights Management (Oct 4)

VPNs (Oct 5)

Cyber-war (between nations) (Oct 5)

Richard Clarke and Herbert Lin are two useful names from which to start searches on this topic.

Online Games (Oct 7)

Stealing and securing open-access wifi connections (Oct 7)

Presentation should include how to steal someone's data in a public wifi hotspot.