Vous êtes sur la page 1sur 2

Project Topics for CSE 4482, Fall 2013

1) Anti-phishing and Anti-pharming Techniques


Samuel Ip and Benjamin Haastrup
http://ahmedabbasi.com/uploads/AbbasiChen_Computer.pdf
http://docs.apwg.org/reports/200603_NCL_Phishing_Report.pdf
http://docs.apwg.org/reports/APWG_GlobalPhishingSurvey_2H2012.pdf
http://www.eset.com/us/resources/white-papers/Pretty_Kettle_of_Phish.pdf

2) Web Bugs and Honeytokens: Who is tracking who?!


Armin Slopek and Dilara Cakir
http://resources.infosecinstitute.com/means-and-methods-of-web-tracking-its-
effects-on-privacy-and-ways-to-avoid-getting-tracked/
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4076930
http://software-security.sans.org/blog/2009/06/04/my-top-6-honeytokens/

3) Botnets: Current Trends


Dan Palero, Nimrat Virk and Adrian Ng
http://dl.acm.org/citation.cfm?id=2501659
http://www.eset.com/us/resources/white-papers/Trends-for-2011.pdf
http://www.geant.net/Media_Centre/Media_Library/Media%20Library/botnet_tren
ds_M2.pdf
http://www.mcafee.com/ca/resources/white-papers/wp-new-era-of-botnets.pdf

4) Puppetnets and Social-DDoS Attacks


Abdulaziz Busbate and Simeon Lee
http://cryptosec.ucsd.edu/miscpapers/puppetnets-ccs06.pdf
http://www.cs.rutgers.edu/research/technical_reports/report.php?report_id=646&
series_id=1.

5) Privacy and Security in Online Social Networks


Nnamdi George Okafor and Vadzim Staradzetka
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5510913
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6309700
http://www.cse.msu.edu/~soodadit/papers/ISACA_JAN_2011_Chain%20Exploita
tion.pdf
http://www.iseclab.org/papers/sonda-TR.pdf

6) Security and Privacy in Cloud Computing


Stephen Luk and Alexander Tran
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5487489
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5655238
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6123700
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6238281
7) Virtual Private Networks (VPNs)
Baker El-Hoseiny and Harinder Sheena
Guide to Network Defense and Countermeasures, 3rd edition, pp.385, Ch. 11.
(hardcopy to be provided)

8) Same-Origin-Policy (SOP) and Its Security Implications


http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5959139
http://crypto.stanford.edu/sameorigin/sameorigin.pdf

9) Cross-Site Scripting (XSS) Attack


http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5999631
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.7753&rep=rep1&typ
e=pdf
http://codeprofilers.com/tl_files/codeprofiler/pdf/the_cross_site_scripting_threat.p
df
(more references provided on request)

10) Digital Steganography


Randy Ding and Dmytro Atamanchuk
http://www.sciencedirect.com/science/article/pii/S0165168409003648
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=935180
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4655281

Vous aimerez peut-être aussi