COMPSCI 725 LEC C FS 2003 Paper Assignments
Paper # Topic Author Student 1 Student 2 Student 3
1 WM Adelsbach et al., "Zero-Knowledge Watermark Detection and Proof of Ownership"  
2 WM Atallah et al., “Natural Language Watermarking and Tamperproofing” Ou, Chaoli 34
3 WM Benedens, “Robust Watermarking and Affine Registration of 3D Meshes” Lun, Qing-Shan 2 Bagby, Kurt 17
4 WM Bern et al., “Trustworthy Paper Documents”  
5 WM Jensen, “Fingerprinting Text in Logical Markup Languages”  Xie, William 1 Wang, Bo(b) 19 Jampana, Sasank 45
6 WM Yoshiura et al., “Secure Fingerprinting Using Public-Key Cryptography (Position Paper)”  
7 OBF Barak et al., “On the (Im)possibility of Obfuscating Programs (Extended Abstract)”  
8 OBF Chow et al., “An approach to the obfuscation of control-flow of sequential computer programs”  
9 OBF Jacob et al., “Attacking an obfuscated cipher by injecting faults” Markowitz, Sidney 7 Stay, Mike 28
10 TR Aucsmith, “Tamper Resistant Software: An Implementation"  
11 TR Chen et al., “Oblivious Hashing: A Stealthy Software Integrity Verification Primitive”  
12 TR Ogiso et al., “Software Tamper Resistance Based on the Difficulty of Interprocedural Analysis”  
13 TR Wang et al., “Software Tamper Resistance: Obstructing Static Analysis of Programs”  
14 TR Lie et al., “Architectural support for copy and tamper resistant software”  Jin, Xing 18
15 CD Wong et al., “Computational Forensic Techniques for Intellectual Property Protection” Mahawatte, Gayani 25 Butters, Diana 27
16 DRM Budd, “Protecting and Managing Electronic Content with a Digital Battery” Lord, John 32 Phillips, Iain 49
17 DRM Halderman, “Evaluating New Copy-Prevention Techniques for Audio CDs” Lee, Sau Fan 14 Bolitho, Matthew 23
18 DRM Mana et al., “An Efficient Software Protection Scheme” Guo, Sheng Lin 30 Barrett, Matthew 40 Yang, Xiaodong 50
19 DRM Maude et al., “Hardware protection against software piracy” Liu, Qiang 35 Ramakrishnan, Gayathri 41
20 DRM Schneck, “Persistent Access Control to Prevent Piracy of Digital Information”  
21 DRM Zhao, “A WWW service to embed and prove digital copyright watermarks”  
22 SS Armington et al., “Biometric Authentication in Infrastructure Security”  Stilinovic, Ana 44 Dewan, Anupam 46
23 SS Beneš, “The Strong Eternity Service,” Zhou, Sylvia 15
24 SS Boldyreva et al., “Theft protected proprietary certificates”  
25 SS Canvel, “Password Interception in a SSL/TLS Channel,” Zhang, Honglei 13 Rambach, Franz 42 Stoeckigt, Kewin 48
26 SS De Clercq, “Single Sign-On Architectures”  
27 SS Ellison, “The Trust Shell Game (Position Paper)” Karl, Gareth 29 Poh, Jerrold 36
28 SS Mallard, “E-Government: Authentication of Identity” Mehra, Akhil 21 Dinakarn, Gopi 37
29 SS Yahalom, “Optimistic Trust with Realistic eNvestigators”   
30 PROT Gollmann, “Insider Fraud”   
31 NET McHugh, “Intrusion and Intrusion Detection” Chan, Tak 8 Lu, Hao 9 Peng, Po-Yuan 24
32 NET Nikander, “Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World Vutukuri, Aditya 4 Carpenter, Craig 20 Yap, Nelson Yuen 52
33 NET Tan et al., “Hiding Intrusions: From the Abnormal to the Normal and Beyond”  
34 APP Bond et al., “Decimalisation Table Attacks for PIN Cracking” Chai, Carvin 26 Sun, Ji 31 Yang, Rui 39
35 APP Clulow, “The Financial Cryptographic API”  
36 APP Landwehr, “Computer Security”  
37 APP Lee et al., “Learning Fingerprints for a Database Intrusion Detection System” Huang, Yuman 5 Wang, Lixin 6 Vinkovska, Irena 11
38 APP Reifer et al., “Estimating the Cost of Security for COTS Software.”  
39 APP Somayaji and S. Forrest, “Automated Response Using System-Call Delays."  
40 APP Yoshiura et al., “A Multi-OS Approach to Trusted Computer Systems” Pearson, Kenji 33 Anand, Sandeep 54
41 WM Venkatesan, V Vazirani, S Sinha, “A Graph Theoretic Approach to Software Watermarking”   
42 Bechtold, "From Copyright to Information Law - Implications of Digital Rights Management"  
43 van Eck, "Electomagnetic Radiation from Video Display Units: An Eavesdropping Risk" Johnson, Adam 3 Shotbolt, Paul 12 Cheung, Alex 16
 
Unassigned:       Crockett, Anne 43
Zhen, Wei Xue 47
Xia, Lu 51
Reddy, Adavalli 53