Course Calendar

Below is the calendar for this semester course. This is the preliminary schedule, which may need to be altered as the semester progresses. It is the responsibility of the students to frequently check this web-page for schedule, readings, and assignment changes. As the professor, I will attempt to announce any change to the class, but this web-page should be viewed as authoritative. If you have any questions, please contact me (contact information is available at the course homepage).

Date Topic Assignments Due Readings/Discussions
(do readings before class)
Slides
08/23/18 Introduction Syllabus (link)

Homework 1 Assigned (link)

Intro
08/28/18 Security Basics Traynor et al., Chapter 2

Sec Basics
08/30/18 Security Basics HW 1
09/04/18 Project Ideas Project
09/06/18 Cellular Basics Traynor et al., Chapter 1

Cell Basics
09/11/18 Cellular Basics
09/13/18 Cellular Basics
09/18/18 Cellular Networking Traynor et al., Chapter 3.1-3.3

Homework 2 Assigned (link)

Cell Networking
09/20/18 Project Mini-presentations Project Slides Due
09/25/18 Cellular Networking
09/27/18 Cellular Networking HW 2
10/02/18 GSM Air Interface GSM Air
10/04/18 GSM Air Interface Homework 3 Assigned (link)

10/09/18 Academic Writing Writing
10/11/18 3G Air Interface HW 3 Cellular Data
10/16/18 NO CLASS
10/18/18 Midterm Exam
10/23/18 Cellular Data Networking Traynor et al., Chapter 3.4

Cellular Data
10/25/18 Cellular Authentication Auth
10/30/18 Classical Telco Security Problems Traynor et al., Chapter 4

M. Sahin, A. Francillon, P. Gupta, M. Ahamad. SoK: Fraud in Telephony Networks, Proceedings of IEEE EURO Security and Privacy, 2017.

Classics
11/01/18 Overload in GSM Traynor et al., Chapters 5 and 6

P. Traynor, M. Lin, M. Ongtang, V. Rao, T. Jaeger, T. La Porta and P. McDaniel, On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core, Proceedings of the ACM Conference on Computer and Communications Security (CCS), November 2009.

Overload
11/06/18 Exam Review

11/08/18 End-to-End-Authentication V. Balasubramaniyan, A. Poonawalla, M. Ahamad, M. Hunter and P. Traynor, PinDr0p: Using Single-Ended Audio Features to Determine Call Provenance, Proceedings of the ACM Conference on Computer and Communications Security (CCS), November 2010.

H. Tu, A. Doupe, Z. Zhao, and G. Ahn. Toward Authenticated Caller ID Transmission: The Need for a Standardized Authentication Scheme in Q.731.3 Calling Line Identification Presentation, Proceedings of the ITU Kaleidoscope (ITU), November, 2016.

E-to-E
11/13/18 End-to-End Authentication Abstract/Intro B. Reaves, L. Blue and P. Traynor, AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels, In Proceedings of the USENIX Security Symposium (SECURITY), 2016.

B. Reaves, L. Blue, H. Abdullah, L. Vargas, P. Traynor and T. Shrimpton. AuthentiCall: Efficient Identity and Content Authentication for Phone Calls, In Proceedings of the USENIX Security Symposium (SECURITY), 2017.

11/15/18 Eavesdropping and In-band Signaling R. Rosenbaum, Secrets of the Little Blue Box, Esquire Magazine, 1971 (link)

M. Sherr, E. Cronin, S. Clark and M. Blaze, Signaling Vulnerabilities in Wiretapping Systems, IEEE Security and Privacy. November/December 2005.

Eavesdropping
11/20/18 Thanksgiving Holiday
11/22/18 Thanksgiving Holiday
11/27/18 Privacy and Tracking D. F. Kune, J. Koelndorfer, N. Hopper, Y. Kim, Location Leaks on the GSM Air Interface, Proceedings of the Network and Distributed Systems Security (NDSS) Symposium, 2012.

B. Hong, S. Bae and Y. Kim, GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier, Proceedings of the Network and Distributed Systems Security (NDSS) Symposium, 2018.

11/29/18 Project Presentations
12/04/18 Bypass Fraud Methodology M. Sahin and A. Francillon, Over-the-top bypass: Study of a recent telephony fraud, Proceedings of ACM CCS, 2016.

12/11/18 Final Project Write-Up - Noon