COMPSCI 725 LEC C FS 2003 Paper Assignments
Paper # Topic Author Student 1 Student 2 Student 3
5 WM Jensen, “Fingerprinting Text in Logical Markup Languages”  Xie, William 1 Ou, Chaoli 34 Jampana, Sasank 45
3 WM Benedens, “Robust Watermarking and Affine Registration of 3D Meshes” Lun, Qing-Shan 2 Bagby, Kurt 17
43 van Eck, "Electomagnetic Radiation from Video Display Units: An Eavesdropping Risk" Johnson, Adam 3 Shotbolt, Paul 12 Cheung, Alex 16
32 NET Nikander, “Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World Vutukuri, Aditya 4 Wang, Bo(b) 19
37 APP Lee et al., “Learning Fingerprints for a Database Intrusion Detection System” Huang, Yuman 5 Wang, Lixin 6 Vinkovska, Irena 11
9 OBF Jacob et al., “Attacking an obfuscated cipher by injecting faults” Markowitz, Sidney 7 Stay, Mike 28 Biswojit, Patsahni 55
31 NET McHugh, “Intrusion and Intrusion Detection” Chan, Tak 8 Lu, Hao 9 Peng, Po-Yuan 24
25 SS Canvel, “Password Interception in a SSL/TLS Channel,” Zhang, Honglei 13 Stoeckigt, Kewin 48
17 DRM Halderman, “Evaluating New Copy-Prevention Techniques for Audio CDs” Lee, Sau Fan 14 Bolitho, Matthew 23 Fisher, Simon 38
23 SS Beneš, “The Strong Eternity Service,” Zhou, Sylvia 15
18 DRM Mana et al., “An Efficient Software Protection Scheme” Jin, Xing 18 Barrett, Matthew 40 Yang, Xiaodong 50
22 SS Armington et al., “Biometric Authentication in Infrastructure Security”  Carpenter, Craig 20 Stilinovic, Ana 44 Dewan, Anupam 46
40 APP Yoshiura et al., “A Multi-OS Approach to Trusted Computer Systems” Mehra, Akhil 21 Pearson, Kenji 33 Anand, Sandeep 54
30 PROT Gollmann, “Insider Fraud”  Mahawatte, Gayani 25
34 APP Bond et al., “Decimalisation Table Attacks for PIN Cracking” Chai, Carvin 26 Sun, Ji 31 Yang, Rui 39
28 SS Mallard, “E-Government: Authentication of Identity” Butters, Diana 27 Dinakarn, Gopi 37 Xia, Lu 51
27 SS Ellison, “The Trust Shell Game (Position Paper)” Karl, Gareth 29 Poh, Jerrold 36
16 DRM Budd, “Protecting and Managing Electronic Content with a Digital Battery” Lord, John 32 Phillips, Iain 49 Reddy, Adavalli 53
19 DRM Maude et al., “Hardware protection against software piracy” Liu, Qiang 35 Ramakrishnan, Gayathri 41
33 NET Tan et al., “Hiding Intrusions: From the Abnormal to the Normal and Beyond” Rambach, Franz 42 Crockett, Anne 43 Yap, Nelson Yuen 52
Unassigned students:       Guo, Sheng Lin 30
Zhen, Wei Xue 47
Unassigned Papers:
1 WM Adelsbach et al., "Zero-Knowledge Watermark Detection and Proof of Ownership"  
4 WM Bern et al., “Trustworthy Paper Documents”  
6 WM Yoshiura et al., “Secure Fingerprinting Using Public-Key Cryptography (Position Paper)”  
7 OBF Barak et al., “On the (Im)possibility of Obfuscating Programs (Extended Abstract)”  
8 OBF Chow et al., “An approach to the obfuscation of control-flow of sequential computer programs”  
10 TR Aucsmith, “Tamper Resistant Software: An Implementation"  
11 TR Chen et al., “Oblivious Hashing: A Stealthy Software Integrity Verification Primitive”  
12 TR Ogiso et al., “Software Tamper Resistance Based on the Difficulty of Interprocedural Analysis”  
13 TR Wang et al., “Software Tamper Resistance: Obstructing Static Analysis of Programs”  
14 TR Lie et al., “Architectural support for copy and tamper resistant software”   
20 DRM Schneck, “Persistent Access Control to Prevent Piracy of Digital Information”  
21 DRM Zhao, “A WWW service to embed and prove digital copyright watermarks”  
24 SS Boldyreva et al., “Theft protected proprietary certificates”  
26 SS De Clercq, “Single Sign-On Architectures”  
29 SS Yahalom, “Optimistic Trust with Realistic eNvestigators”   
35 APP Clulow, “The Financial Cryptographic API”  
36 APP Landwehr, “Computer Security”  
38 APP Reifer et al., “Estimating the Cost of Security for COTS Software.”  
39 APP Somayaji and S. Forrest, “Automated Response Using System-Call Delays."  
41 WM Venkatesan, V Vazirani, S Sinha, “A Graph Theoretic Approach to Software Watermarking”   
42 Bechtold, "From Copyright to Information Law - Implications of Digital Rights Management"  
15 CD Wong et al., “Computational Forensic Techniques for Intellectual Property Protection”  
2 WM Atallah et al., “Natural Language Watermarking and Tamperproofing”