Difference between revisions of "White Paper Projects"
From CyberSecurity
(43 intermediate revisions by 15 users not shown) | |||
Line 1: | Line 1: | ||
'''PLEASE READ'''<br> | '''PLEASE READ'''<br> | ||
Following is a list of suggested project topics. Please add your name for the topic(s) that you may be interested in. Try to add your name in only one or a few topics at most. Also feel free to add additional topics at the end. In order to meet the team formation guidelines [http://www.cs.washington.edu/education/courses/csep590/05au/project.pdf] ''please clearly indicate if you think you are a "policy" student''. | Following is a list of suggested project topics. Please add your name for the topic(s) that you may be interested in. Try to add your name in only one or a few topics at most. Also feel free to add additional topics at the end. In order to meet the team formation guidelines [http://www.cs.washington.edu/education/courses/csep590/05au/project.pdf] ''please clearly indicate if you think you are a "policy" student''. | ||
+ | |||
+ | |||
+ | *'''[[Full vs. Responsible Disclosure of Vulnerabilities]]:''' Vulnerabilities are associated with computer software and hardware. Does it make technical or economic sense to make a limited disclosure of vulnerabilities only to the manufacturer or software author? Does "Open Source" necessarily mean full disclosure? What are the tradeoffs? | ||
+ | **[[Tony Chan]] (UW) | ||
+ | **[[Kelvin Yu]] (UW) | ||
+ | **[[Andrew Cencini]] (UW) | ||
+ | ** ***''Looking for policy student(s)''*** | ||
*'''Nuclear Weapons''' | *'''Nuclear Weapons''' | ||
− | ** | + | **[[Elena Rodriguez-Vieitez]] (UCB) |
*'''Chemical Weapons''' | *'''Chemical Weapons''' | ||
**.. | **.. | ||
Line 10: | Line 17: | ||
*'''Radiological Weapons''' | *'''Radiological Weapons''' | ||
**.. | **.. | ||
− | *'''Privacy and Data''' | + | *'''[[Privacy and Data]]''' |
**[[User:Santtu|Santtu Voutilainen]] | **[[User:Santtu|Santtu Voutilainen]] | ||
− | ** | + | ** ***''Seeking policy student(s)''*** |
*'''Encryption Policy''' | *'''Encryption Policy''' | ||
**.. | **.. | ||
Line 21: | Line 28: | ||
**.. | **.. | ||
*'''Interrogation & Torture''' | *'''Interrogation & Torture''' | ||
− | |||
**[http://cubist.cs.washington.edu/CyberSecurity/index.php/User:Eiman Zolfaghari] | **[http://cubist.cs.washington.edu/CyberSecurity/index.php/User:Eiman Zolfaghari] | ||
+ | **[http://cubist.cs.washington.edu/CyberSecurity/index.php/User:Dg Dennis Galvin] | ||
+ | **[[User:Chris DuPuis|Chris DuPuis]] | ||
+ | **Sean Cardeno (UCB) | ||
+ | **Barbra Ramos (UCB) | ||
+ | |||
+ | Interrogation and Torture Group 2: Katie Veazey (UCB), | ||
+ | Ian Richardson (UCB), | ||
+ | Justin Delacruz (UCB), | ||
+ | Cameron Mckenzie (UCB), | ||
+ | |||
+ | |||
*'''State-Sponsored Hacking''' | *'''State-Sponsored Hacking''' | ||
− | ** | + | **.. |
*'''Cyberterrorism''' | *'''Cyberterrorism''' | ||
**.. | **.. | ||
Line 30: | Line 47: | ||
**.. | **.. | ||
*'''Cybersecurity and Law''' | *'''Cybersecurity and Law''' | ||
− | **[ | + | **[http://cubist.cs.washington.edu/CyberSecurity/index.php/User:Gorchard Genevieve Orchard] |
− | ** | + | **[[Altin Dastmalchi, UCB]] |
− | *'''[[Cyber Criminal Activity]]''' | + | *'''[[Cyber Criminal Activity]]''' - group closed |
**[[User:Avichal|Avichal Singh]] | **[[User:Avichal|Avichal Singh]] | ||
**[[Chris Fleizach]] | **[[Chris Fleizach]] | ||
**[[Pravin Mittal]] | **[[Pravin Mittal]] | ||
**[[Hemavathy Alaganandam]] | **[[Hemavathy Alaganandam]] | ||
− | **. | + | *'''[[Cyber Criminal Activity (group 2)]]''' - We still need one to three students(at least one policy student) |
+ | **[[James Xiao]] | ||
+ | **[[Ted Zuvich]] | ||
+ | **[[Michael A. Laurenzano]] | ||
+ | **[[Elijah Esquibel]] | ||
+ | *'''[[Cyber Criminal Activity (group 10)]]''' - group closed | ||
+ | **[[Khaled Sedky]] | ||
+ | **[[Manish Mittal]] | ||
+ | **[[Ahmed Tolba]] | ||
+ | **[[Pamela Mae Davis]] | ||
+ | **[[Nilkund Aseef]] | ||
*'''Liability''' | *'''Liability''' | ||
**.. | **.. | ||
*'''Education, Exploits, Cyberculture''' | *'''Education, Exploits, Cyberculture''' | ||
− | ** | + | **.. |
*'''Offense vs. Defense''' | *'''Offense vs. Defense''' | ||
**[[Yi-Kai Liu]] | **[[Yi-Kai Liu]] | ||
− | **.. | + | **Drew Hoskins |
+ | **Anil Relkuntwar | ||
+ | **WhiteTeam3: [[User:roba|Rob Anderson]], [[Bhavjit Walha]], [[Brian Lum]], [[Josefina Valdez]] | ||
+ | **Looking for a policy student... anyone interested? | ||
+ | |||
*'''[[Rootkits]]''' | *'''[[Rootkits]]''' | ||
**[[Grant Musick]] | **[[Grant Musick]] | ||
Line 56: | Line 87: | ||
**We are looking for one public policy student. | **We are looking for one public policy student. | ||
− | *'''Soft Targets'''Topic covers the threats, vulnerabilities, and countermeasures against attacks aimed at Soft Targets. | + | *'''[[Soft Targets]]''': Topic covers the threats, vulnerabilities, and countermeasures against attacks aimed at Soft Targets. |
− | **[[Steve Crockett]] | + | **[[Steve Crockett]] |
− | + | **[[User:Keunwoo Lee|Keunwoo Lee]] | |
+ | **[[User:Steven Huang|Steven Huang]] | ||
This page has been created by a student for students to assist in the process of team formation and bring together like-minded folks. | This page has been created by a student for students to assist in the process of team formation and bring together like-minded folks. |
Latest revision as of 08:08, 4 December 2005
PLEASE READ
Following is a list of suggested project topics. Please add your name for the topic(s) that you may be interested in. Try to add your name in only one or a few topics at most. Also feel free to add additional topics at the end. In order to meet the team formation guidelines [1] please clearly indicate if you think you are a "policy" student.
- Full vs. Responsible Disclosure of Vulnerabilities: Vulnerabilities are associated with computer software and hardware. Does it make technical or economic sense to make a limited disclosure of vulnerabilities only to the manufacturer or software author? Does "Open Source" necessarily mean full disclosure? What are the tradeoffs?
- Tony Chan (UW)
- Kelvin Yu (UW)
- Andrew Cencini (UW)
- ***Looking for policy student(s)***
- Nuclear Weapons
- Elena Rodriguez-Vieitez (UCB)
- Chemical Weapons
- ..
- Biological Weapons
- ..
- Radiological Weapons
- ..
- Privacy and Data
- Santtu Voutilainen
- ***Seeking policy student(s)***
- Encryption Policy
- ..
- Open Source and Cybersecurity
- Interrogation & Torture
- Zolfaghari
- Dennis Galvin
- Chris DuPuis
- Sean Cardeno (UCB)
- Barbra Ramos (UCB)
Interrogation and Torture Group 2: Katie Veazey (UCB), Ian Richardson (UCB), Justin Delacruz (UCB), Cameron Mckenzie (UCB),
- State-Sponsored Hacking
- ..
- Cyberterrorism
- ..
- Cybersecurity and National Infrastructure
- ..
- Cybersecurity and Law
- Cyber Criminal Activity - group closed
- Cyber Criminal Activity (group 2) - We still need one to three students(at least one policy student)
- Cyber Criminal Activity (group 10) - group closed
- Liability
- ..
- Education, Exploits, Cyberculture
- ..
- Offense vs. Defense
- Yi-Kai Liu
- Drew Hoskins
- Anil Relkuntwar
- WhiteTeam3: Rob Anderson, Bhavjit Walha, Brian Lum, Josefina Valdez
- Looking for a policy student... anyone interested?
- Rootkits
- The proliferation of wireless networks/devices and their security implications/vulnerabilities
- Noor-E-Gagan Singh
- Jeff Bilger
- Holly M Watson
- We are looking for one public policy student.
- Soft Targets: Topic covers the threats, vulnerabilities, and countermeasures against attacks aimed at Soft Targets.
This page has been created by a student for students to assist in the process of team formation and bring together like-minded folks.