Difference between revisions of "White Paper Projects"
From CyberSecurity
(65 intermediate revisions by 23 users not shown) | |||
Line 1: | Line 1: | ||
− | *Nuclear Weapons | + | '''PLEASE READ'''<br> |
− | ** | + | Following is a list of suggested project topics. Please add your name for the topic(s) that you may be interested in. Try to add your name in only one or a few topics at most. Also feel free to add additional topics at the end. In order to meet the team formation guidelines [http://www.cs.washington.edu/education/courses/csep590/05au/project.pdf] ''please clearly indicate if you think you are a "policy" student''. |
− | *Chemical Weapons | + | |
− | ** | + | |
− | *Biological Weapons | + | *'''[[Full vs. Responsible Disclosure of Vulnerabilities]]:''' Vulnerabilities are associated with computer software and hardware. Does it make technical or economic sense to make a limited disclosure of vulnerabilities only to the manufacturer or software author? Does "Open Source" necessarily mean full disclosure? What are the tradeoffs? |
− | ** | + | **[[Tony Chan]] (UW) |
− | *Radiological Weapons | + | **[[Kelvin Yu]] (UW) |
− | ** | + | **[[Andrew Cencini]] (UW) |
− | *Privacy and Data | + | ** ***''Looking for policy student(s)''*** |
− | ** | + | |
− | *Encryption Policy | + | *'''Nuclear Weapons''' |
− | ** | + | **[[Elena Rodriguez-Vieitez]] (UCB) |
− | *Open Source and Cybersecurity | + | *'''Chemical Weapons''' |
− | ** | + | **.. |
− | *Interrogation & Torture | + | *'''Biological Weapons''' |
− | ** | + | **.. |
− | *State-Sponsored Hacking | + | *'''Radiological Weapons''' |
− | ** | + | **.. |
− | *Cyberterrorism | + | *'''[[Privacy and Data]]''' |
− | ** | + | **[[User:Santtu|Santtu Voutilainen]] |
− | *Cybersecurity and National Infrastructure | + | ** ***''Seeking policy student(s)''*** |
− | ** | + | *'''Encryption Policy''' |
− | *Cybersecurity and Law | + | **.. |
− | ** | + | *'''Open Source and Cybersecurity''' |
− | *Cyber Criminal Activity | + | **[[Russell Clarke]] |
− | ** | + | **[[Rob Nash]] |
− | *Liability | + | **[[David Dorwin]] |
− | ** | + | **.. |
− | *Education, Exploits, Cyberculture | + | *'''Interrogation & Torture''' |
− | ** | + | **[http://cubist.cs.washington.edu/CyberSecurity/index.php/User:Eiman Zolfaghari] |
− | *Offense vs. Defense | + | **[http://cubist.cs.washington.edu/CyberSecurity/index.php/User:Dg Dennis Galvin] |
− | ** | + | **[[User:Chris DuPuis|Chris DuPuis]] |
+ | **Sean Cardeno (UCB) | ||
+ | **Barbra Ramos (UCB) | ||
+ | |||
+ | Interrogation and Torture Group 2: Katie Veazey (UCB), | ||
+ | Ian Richardson (UCB), | ||
+ | Justin Delacruz (UCB), | ||
+ | Cameron Mckenzie (UCB), | ||
+ | |||
+ | |||
+ | *'''State-Sponsored Hacking''' | ||
+ | **.. | ||
+ | *'''Cyberterrorism''' | ||
+ | **.. | ||
+ | *'''Cybersecurity and National Infrastructure''' | ||
+ | **.. | ||
+ | *'''Cybersecurity and Law''' | ||
+ | **[http://cubist.cs.washington.edu/CyberSecurity/index.php/User:Gorchard Genevieve Orchard] | ||
+ | **[[Altin Dastmalchi, UCB]] | ||
+ | *'''[[Cyber Criminal Activity]]''' - group closed | ||
+ | **[[User:Avichal|Avichal Singh]] | ||
+ | **[[Chris Fleizach]] | ||
+ | **[[Pravin Mittal]] | ||
+ | **[[Hemavathy Alaganandam]] | ||
+ | *'''[[Cyber Criminal Activity (group 2)]]''' - We still need one to three students(at least one policy student) | ||
+ | **[[James Xiao]] | ||
+ | **[[Ted Zuvich]] | ||
+ | **[[Michael A. Laurenzano]] | ||
+ | **[[Elijah Esquibel]] | ||
+ | *'''[[Cyber Criminal Activity (group 10)]]''' - group closed | ||
+ | **[[Khaled Sedky]] | ||
+ | **[[Manish Mittal]] | ||
+ | **[[Ahmed Tolba]] | ||
+ | **[[Pamela Mae Davis]] | ||
+ | **[[Nilkund Aseef]] | ||
+ | *'''Liability''' | ||
+ | **.. | ||
+ | *'''Education, Exploits, Cyberculture''' | ||
+ | **.. | ||
+ | *'''Offense vs. Defense''' | ||
+ | **[[Yi-Kai Liu]] | ||
+ | **Drew Hoskins | ||
+ | **Anil Relkuntwar | ||
+ | **WhiteTeam3: [[User:roba|Rob Anderson]], [[Bhavjit Walha]], [[Brian Lum]], [[Josefina Valdez]] | ||
+ | **Looking for a policy student... anyone interested? | ||
+ | |||
+ | *'''[[Rootkits]]''' | ||
+ | **[[Grant Musick]] | ||
+ | **[[Somnath Banerjee]] | ||
+ | **[[Rares Saftoiu]] | ||
+ | **[[Jameel Alsalam]] (policy) | ||
+ | *'''The proliferation of wireless networks/devices and their security implications/vulnerabilities''' | ||
+ | **[[User:ngsingh|Noor-E-Gagan Singh]] | ||
+ | **Jeff Bilger | ||
+ | **Holly M Watson | ||
+ | **We are looking for one public policy student. | ||
+ | |||
+ | *'''[[Soft Targets]]''': Topic covers the threats, vulnerabilities, and countermeasures against attacks aimed at Soft Targets. | ||
+ | **[[Steve Crockett]] | ||
+ | **[[User:Keunwoo Lee|Keunwoo Lee]] | ||
+ | **[[User:Steven Huang|Steven Huang]] | ||
+ | This page has been created by a student for students to assist in the process of team formation and bring together like-minded folks. |
Latest revision as of 08:08, 4 December 2005
PLEASE READ
Following is a list of suggested project topics. Please add your name for the topic(s) that you may be interested in. Try to add your name in only one or a few topics at most. Also feel free to add additional topics at the end. In order to meet the team formation guidelines [1] please clearly indicate if you think you are a "policy" student.
- Full vs. Responsible Disclosure of Vulnerabilities: Vulnerabilities are associated with computer software and hardware. Does it make technical or economic sense to make a limited disclosure of vulnerabilities only to the manufacturer or software author? Does "Open Source" necessarily mean full disclosure? What are the tradeoffs?
- Tony Chan (UW)
- Kelvin Yu (UW)
- Andrew Cencini (UW)
- ***Looking for policy student(s)***
- Nuclear Weapons
- Elena Rodriguez-Vieitez (UCB)
- Chemical Weapons
- ..
- Biological Weapons
- ..
- Radiological Weapons
- ..
- Privacy and Data
- Santtu Voutilainen
- ***Seeking policy student(s)***
- Encryption Policy
- ..
- Open Source and Cybersecurity
- Interrogation & Torture
- Zolfaghari
- Dennis Galvin
- Chris DuPuis
- Sean Cardeno (UCB)
- Barbra Ramos (UCB)
Interrogation and Torture Group 2: Katie Veazey (UCB), Ian Richardson (UCB), Justin Delacruz (UCB), Cameron Mckenzie (UCB),
- State-Sponsored Hacking
- ..
- Cyberterrorism
- ..
- Cybersecurity and National Infrastructure
- ..
- Cybersecurity and Law
- Cyber Criminal Activity - group closed
- Cyber Criminal Activity (group 2) - We still need one to three students(at least one policy student)
- Cyber Criminal Activity (group 10) - group closed
- Liability
- ..
- Education, Exploits, Cyberculture
- ..
- Offense vs. Defense
- Yi-Kai Liu
- Drew Hoskins
- Anil Relkuntwar
- WhiteTeam3: Rob Anderson, Bhavjit Walha, Brian Lum, Josefina Valdez
- Looking for a policy student... anyone interested?
- Rootkits
- The proliferation of wireless networks/devices and their security implications/vulnerabilities
- Noor-E-Gagan Singh
- Jeff Bilger
- Holly M Watson
- We are looking for one public policy student.
- Soft Targets: Topic covers the threats, vulnerabilities, and countermeasures against attacks aimed at Soft Targets.
This page has been created by a student for students to assist in the process of team formation and bring together like-minded folks.