Difference between revisions of "White Paper Projects"

From CyberSecurity
Jump to: navigation, search
 
(55 intermediate revisions by 20 users not shown)
Line 1: Line 1:
 
'''PLEASE READ'''<br>
 
'''PLEASE READ'''<br>
 
Following is a list of suggested project topics. Please add your name for the topic(s) that you may be interested in. Try to add your name in only one or a few topics at most. Also feel free to add additional topics at the end. In order to meet the team formation guidelines [http://www.cs.washington.edu/education/courses/csep590/05au/project.pdf] ''please clearly indicate if you think you are a "policy" student''.
 
Following is a list of suggested project topics. Please add your name for the topic(s) that you may be interested in. Try to add your name in only one or a few topics at most. Also feel free to add additional topics at the end. In order to meet the team formation guidelines [http://www.cs.washington.edu/education/courses/csep590/05au/project.pdf] ''please clearly indicate if you think you are a "policy" student''.
 +
 +
 +
*'''[[Full vs. Responsible Disclosure of Vulnerabilities]]:''' Vulnerabilities are associated with computer software and hardware. Does it make technical or economic sense to make a limited disclosure of vulnerabilities only to the manufacturer or software author? Does "Open Source" necessarily mean full disclosure? What are the tradeoffs?
 +
**[[Tony Chan]] (UW)
 +
**[[Kelvin Yu]] (UW)
 +
**[[Andrew Cencini]] (UW)
 +
** ***''Looking for policy student(s)''***
  
 
*'''Nuclear Weapons'''
 
*'''Nuclear Weapons'''
**..
+
**[[Elena Rodriguez-Vieitez]] (UCB)
 
*'''Chemical Weapons'''
 
*'''Chemical Weapons'''
 
**..
 
**..
Line 10: Line 17:
 
*'''Radiological Weapons'''
 
*'''Radiological Weapons'''
 
**..
 
**..
*'''Privacy and Data'''
+
*'''[[Privacy and Data]]'''
**..
+
**[[User:Santtu|Santtu Voutilainen]]
 +
** ***''Seeking policy student(s)''***
 
*'''Encryption Policy'''
 
*'''Encryption Policy'''
 
**..
 
**..
 
*'''Open Source and Cybersecurity'''
 
*'''Open Source and Cybersecurity'''
 +
**[[Russell Clarke]]
 +
**[[Rob Nash]]
 +
**[[David Dorwin]]
 
**..
 
**..
 
*'''Interrogation & Torture'''
 
*'''Interrogation & Torture'''
**[http://cubist.cs.washington.edu/CyberSecurity/index.php/User:Gorchard Genevieve Orchard]
+
**[http://cubist.cs.washington.edu/CyberSecurity/index.php/User:Eiman Zolfaghari]
 +
**[http://cubist.cs.washington.edu/CyberSecurity/index.php/User:Dg Dennis Galvin]
 +
**[[User:Chris DuPuis|Chris DuPuis]]
 +
**Sean Cardeno (UCB)
 +
**Barbra Ramos (UCB)
 +
 
 +
Interrogation and Torture Group 2: Katie Veazey (UCB),
 +
Ian Richardson (UCB),
 +
Justin Delacruz (UCB),
 +
Cameron Mckenzie (UCB),
 +
 
 +
 
 
*'''State-Sponsored Hacking'''
 
*'''State-Sponsored Hacking'''
 
**..
 
**..
Line 25: Line 47:
 
**..
 
**..
 
*'''Cybersecurity and Law'''
 
*'''Cybersecurity and Law'''
**..
+
**[http://cubist.cs.washington.edu/CyberSecurity/index.php/User:Gorchard Genevieve Orchard]
*'''[[Cyber Criminal Activity]]'''
+
**[[Altin Dastmalchi, UCB]]
 +
*'''[[Cyber Criminal Activity]]''' - group closed
 
**[[User:Avichal|Avichal Singh]]
 
**[[User:Avichal|Avichal Singh]]
 
**[[Chris Fleizach]]
 
**[[Chris Fleizach]]
 
**[[Pravin Mittal]]
 
**[[Pravin Mittal]]
**..
+
**[[Hemavathy Alaganandam]]
 +
*'''[[Cyber Criminal Activity (group 2)]]''' - We still need one to three students(at least one policy student)
 +
**[[James Xiao]]
 +
**[[Ted Zuvich]]
 +
**[[Michael A. Laurenzano]]
 +
**[[Elijah Esquibel]]
 +
*'''[[Cyber Criminal Activity (group 10)]]''' - group closed
 +
**[[Khaled Sedky]]
 +
**[[Manish Mittal]]
 +
**[[Ahmed Tolba]]
 +
**[[Pamela Mae Davis]]
 +
**[[Nilkund Aseef]]
 
*'''Liability'''
 
*'''Liability'''
 
**..
 
**..
Line 36: Line 70:
 
**..
 
**..
 
*'''Offense vs. Defense'''
 
*'''Offense vs. Defense'''
**..
+
**[[Yi-Kai Liu]]
 +
**Drew Hoskins
 +
**Anil Relkuntwar
 +
**WhiteTeam3: [[User:roba|Rob Anderson]], [[Bhavjit Walha]], [[Brian Lum]], [[Josefina Valdez]]
 +
**Looking for a policy student... anyone interested?
 +
 
 
*'''[[Rootkits]]'''
 
*'''[[Rootkits]]'''
 
**[[Grant Musick]]
 
**[[Grant Musick]]
 
**[[Somnath Banerjee]]
 
**[[Somnath Banerjee]]
 
**[[Rares Saftoiu]]
 
**[[Rares Saftoiu]]
**..
+
**[[Jameel Alsalam]] (policy)
 +
*'''The proliferation of wireless networks/devices and their security implications/vulnerabilities'''
 +
**[[User:ngsingh|Noor-E-Gagan Singh]]
 +
**Jeff Bilger
 +
**Holly M Watson
 +
**We are looking for one public policy student.
  
 +
*'''[[Soft Targets]]''': Topic covers the threats, vulnerabilities, and countermeasures against attacks aimed at Soft Targets.
 +
**[[Steve Crockett]]
 +
**[[User:Keunwoo Lee|Keunwoo Lee]]
 +
**[[User:Steven Huang|Steven Huang]]
 
This page has been created by a student for students to assist in the process of team formation and bring together like-minded folks.
 
This page has been created by a student for students to assist in the process of team formation and bring together like-minded folks.

Latest revision as of 08:08, 4 December 2005

PLEASE READ
Following is a list of suggested project topics. Please add your name for the topic(s) that you may be interested in. Try to add your name in only one or a few topics at most. Also feel free to add additional topics at the end. In order to meet the team formation guidelines [1] please clearly indicate if you think you are a "policy" student.


  • Full vs. Responsible Disclosure of Vulnerabilities: Vulnerabilities are associated with computer software and hardware. Does it make technical or economic sense to make a limited disclosure of vulnerabilities only to the manufacturer or software author? Does "Open Source" necessarily mean full disclosure? What are the tradeoffs?

Interrogation and Torture Group 2: Katie Veazey (UCB), Ian Richardson (UCB), Justin Delacruz (UCB), Cameron Mckenzie (UCB),


This page has been created by a student for students to assist in the process of team formation and bring together like-minded folks.