Difference between revisions of "Lecture 11"

From CyberSecurity
Jump to: navigation, search
 
(One intermediate revision by the same user not shown)
Line 5: Line 5:
 
* Steve Gribble, UW:  Spyware  
 
* Steve Gribble, UW:  Spyware  
 
* Butler Lampson, Microsoft:  Computer Security in the Real World
 
* Butler Lampson, Microsoft:  Computer Security in the Real World
 +
 +
==Readings==
 +
 +
* David Moore, Geoffrey Voelker, and Stefan Savage, “Inferring Internet Denial of Service Activity.” Proc. 2001 USENIX Security Symposium, August 2001.  [http://www.cse.ucsd.edu/users/savage/papers/UsenixSec01.pdf http://www.cse.ucsd.edu/users/savage/papers/UsenixSec01.pdf]
 +
* Stefan Saroiu, Steven D. Gribble, and Henry M. Levy, “Measurement and Analysis of Spyware in a University Environment,” Proc. NSDI 2004, March 2004.  [http://www.cs.washington.edu/homes/gribble/papers/spyware.pdf http://www.cs.washington.edu/homes/gribble/papers/spyware.pdf]
 +
* The Honeynet Project & Research Alliance, “Know your Enemy: Tracking Botnets,” March 2005.  http://www.honeynet.org/papers/bots
 +
* Computer Security in the Real World, [http://www.research.microsoft.com/lampson/64-SecurityInRealWorld/Abstract.html http://www.research.microsoft.com/lampson/64-SecurityInRealWorld/Abstract.html]
  
 
==Discussion==
 
==Discussion==
 
Participate in the [http://cubist.cs.washington.edu/CyberSecurity/index.php/Talk:Lecture_11 wiki-discussion].
 
Participate in the [http://cubist.cs.washington.edu/CyberSecurity/index.php/Talk:Lecture_11 wiki-discussion].

Latest revision as of 23:16, 10 November 2005

Large-Scale Internet Criminal Activity

Speakers

  • Dave Aucsmith, Senior Director, Institute for Advanced Technology in Governments, Microsoft Corp.
  • Steve Gribble, UW: Spyware
  • Butler Lampson, Microsoft: Computer Security in the Real World

Readings

Discussion

Participate in the wiki-discussion.