Difference between revisions of "White Paper Projects"
From CyberSecurity
m |
|||
(62 intermediate revisions by 22 users not shown) | |||
Line 1: | Line 1: | ||
'''PLEASE READ'''<br> | '''PLEASE READ'''<br> | ||
Following is a list of suggested project topics. Please add your name for the topic(s) that you may be interested in. Try to add your name in only one or a few topics at most. Also feel free to add additional topics at the end. In order to meet the team formation guidelines [http://www.cs.washington.edu/education/courses/csep590/05au/project.pdf] ''please clearly indicate if you think you are a "policy" student''. | Following is a list of suggested project topics. Please add your name for the topic(s) that you may be interested in. Try to add your name in only one or a few topics at most. Also feel free to add additional topics at the end. In order to meet the team formation guidelines [http://www.cs.washington.edu/education/courses/csep590/05au/project.pdf] ''please clearly indicate if you think you are a "policy" student''. | ||
+ | |||
+ | |||
+ | *'''[[Full vs. Responsible Disclosure of Vulnerabilities]]:''' Vulnerabilities are associated with computer software and hardware. Does it make technical or economic sense to make a limited disclosure of vulnerabilities only to the manufacturer or software author? Does "Open Source" necessarily mean full disclosure? What are the tradeoffs? | ||
+ | **[[Tony Chan]] (UW) | ||
+ | **[[Kelvin Yu]] (UW) | ||
+ | **[[Andrew Cencini]] (UW) | ||
+ | ** ***''Looking for policy student(s)''*** | ||
*'''Nuclear Weapons''' | *'''Nuclear Weapons''' | ||
− | ** | + | **[[Elena Rodriguez-Vieitez]] (UCB) |
*'''Chemical Weapons''' | *'''Chemical Weapons''' | ||
**.. | **.. | ||
Line 10: | Line 17: | ||
*'''Radiological Weapons''' | *'''Radiological Weapons''' | ||
**.. | **.. | ||
− | *'''Privacy and Data''' | + | *'''[[Privacy and Data]]''' |
− | ** | + | **[[User:Santtu|Santtu Voutilainen]] |
+ | ** ***''Seeking policy student(s)''*** | ||
*'''Encryption Policy''' | *'''Encryption Policy''' | ||
**.. | **.. | ||
*'''Open Source and Cybersecurity''' | *'''Open Source and Cybersecurity''' | ||
+ | **[[Russell Clarke]] | ||
+ | **[[Rob Nash]] | ||
+ | **[[David Dorwin]] | ||
**.. | **.. | ||
*'''Interrogation & Torture''' | *'''Interrogation & Torture''' | ||
− | **.. | + | **[http://cubist.cs.washington.edu/CyberSecurity/index.php/User:Eiman Zolfaghari] |
+ | **[http://cubist.cs.washington.edu/CyberSecurity/index.php/User:Dg Dennis Galvin] | ||
+ | **[[User:Chris DuPuis|Chris DuPuis]] | ||
+ | **Sean Cardeno (UCB) | ||
+ | **Barbra Ramos (UCB) | ||
+ | |||
+ | Interrogation and Torture Group 2: Katie Veazey (UCB), | ||
+ | Ian Richardson (UCB), | ||
+ | Justin Delacruz (UCB), | ||
+ | Cameron Mckenzie (UCB), | ||
+ | |||
+ | |||
*'''State-Sponsored Hacking''' | *'''State-Sponsored Hacking''' | ||
**.. | **.. | ||
Line 25: | Line 47: | ||
**.. | **.. | ||
*'''Cybersecurity and Law''' | *'''Cybersecurity and Law''' | ||
− | **.. | + | **[http://cubist.cs.washington.edu/CyberSecurity/index.php/User:Gorchard Genevieve Orchard] |
− | *'''Cyber Criminal Activity''' | + | **[[Altin Dastmalchi, UCB]] |
+ | *'''[[Cyber Criminal Activity]]''' - group closed | ||
**[[User:Avichal|Avichal Singh]] | **[[User:Avichal|Avichal Singh]] | ||
**[[Chris Fleizach]] | **[[Chris Fleizach]] | ||
− | **. | + | **[[Pravin Mittal]] |
+ | **[[Hemavathy Alaganandam]] | ||
+ | *'''[[Cyber Criminal Activity (group 2)]]''' - We still need one to three students(at least one policy student) | ||
+ | **[[James Xiao]] | ||
+ | **[[Ted Zuvich]] | ||
+ | **[[Michael A. Laurenzano]] | ||
+ | **[[Elijah Esquibel]] | ||
+ | *'''[[Cyber Criminal Activity (group 10)]]''' - group closed | ||
+ | **[[Khaled Sedky]] | ||
+ | **[[Manish Mittal]] | ||
+ | **[[Ahmed Tolba]] | ||
+ | **[[Pamela Mae Davis]] | ||
+ | **[[Nilkund Aseef]] | ||
*'''Liability''' | *'''Liability''' | ||
**.. | **.. | ||
Line 35: | Line 70: | ||
**.. | **.. | ||
*'''Offense vs. Defense''' | *'''Offense vs. Defense''' | ||
− | **.. | + | **[[Yi-Kai Liu]] |
+ | **Drew Hoskins | ||
+ | **Anil Relkuntwar | ||
+ | **WhiteTeam3: [[User:roba|Rob Anderson]], [[Bhavjit Walha]], [[Brian Lum]], [[Josefina Valdez]] | ||
+ | **Looking for a policy student... anyone interested? | ||
+ | |||
+ | *'''[[Rootkits]]''' | ||
+ | **[[Grant Musick]] | ||
+ | **[[Somnath Banerjee]] | ||
+ | **[[Rares Saftoiu]] | ||
+ | **[[Jameel Alsalam]] (policy) | ||
+ | *'''The proliferation of wireless networks/devices and their security implications/vulnerabilities''' | ||
+ | **[[User:ngsingh|Noor-E-Gagan Singh]] | ||
+ | **Jeff Bilger | ||
+ | **Holly M Watson | ||
+ | **We are looking for one public policy student. | ||
+ | *'''[[Soft Targets]]''': Topic covers the threats, vulnerabilities, and countermeasures against attacks aimed at Soft Targets. | ||
+ | **[[Steve Crockett]] | ||
+ | **[[User:Keunwoo Lee|Keunwoo Lee]] | ||
+ | **[[User:Steven Huang|Steven Huang]] | ||
This page has been created by a student for students to assist in the process of team formation and bring together like-minded folks. | This page has been created by a student for students to assist in the process of team formation and bring together like-minded folks. |
Latest revision as of 08:08, 4 December 2005
PLEASE READ
Following is a list of suggested project topics. Please add your name for the topic(s) that you may be interested in. Try to add your name in only one or a few topics at most. Also feel free to add additional topics at the end. In order to meet the team formation guidelines [1] please clearly indicate if you think you are a "policy" student.
- Full vs. Responsible Disclosure of Vulnerabilities: Vulnerabilities are associated with computer software and hardware. Does it make technical or economic sense to make a limited disclosure of vulnerabilities only to the manufacturer or software author? Does "Open Source" necessarily mean full disclosure? What are the tradeoffs?
- Tony Chan (UW)
- Kelvin Yu (UW)
- Andrew Cencini (UW)
- ***Looking for policy student(s)***
- Nuclear Weapons
- Elena Rodriguez-Vieitez (UCB)
- Chemical Weapons
- ..
- Biological Weapons
- ..
- Radiological Weapons
- ..
- Privacy and Data
- Santtu Voutilainen
- ***Seeking policy student(s)***
- Encryption Policy
- ..
- Open Source and Cybersecurity
- Interrogation & Torture
- Zolfaghari
- Dennis Galvin
- Chris DuPuis
- Sean Cardeno (UCB)
- Barbra Ramos (UCB)
Interrogation and Torture Group 2: Katie Veazey (UCB), Ian Richardson (UCB), Justin Delacruz (UCB), Cameron Mckenzie (UCB),
- State-Sponsored Hacking
- ..
- Cyberterrorism
- ..
- Cybersecurity and National Infrastructure
- ..
- Cybersecurity and Law
- Cyber Criminal Activity - group closed
- Cyber Criminal Activity (group 2) - We still need one to three students(at least one policy student)
- Cyber Criminal Activity (group 10) - group closed
- Liability
- ..
- Education, Exploits, Cyberculture
- ..
- Offense vs. Defense
- Yi-Kai Liu
- Drew Hoskins
- Anil Relkuntwar
- WhiteTeam3: Rob Anderson, Bhavjit Walha, Brian Lum, Josefina Valdez
- Looking for a policy student... anyone interested?
- Rootkits
- The proliferation of wireless networks/devices and their security implications/vulnerabilities
- Noor-E-Gagan Singh
- Jeff Bilger
- Holly M Watson
- We are looking for one public policy student.
- Soft Targets: Topic covers the threats, vulnerabilities, and countermeasures against attacks aimed at Soft Targets.
This page has been created by a student for students to assist in the process of team formation and bring together like-minded folks.