CS 259: System Security

READING LIST

Cryptography

Watermarking

    Static artifacts

    Functional artifacts


Fingerprinting

Copy Detection


Forensic Engineering

Applied Cryptography

BufferOverflow


Firewalls


Intrusion Detection

Junk Email


Licensing
Metering
Privacy in DB
Privacy in Pervasive
SandBoxing


Trojan Horses
Viruses
Anonymity
Honeypots

Hippocratic databases

Privacy-Preserving Data Mining

Information Sharing across private repositories

Privacy-preserving search