Mini Project On Current Topics in Computer Security: Tips, Resources, Timeline
Mini Project On Current Topics in Computer Security: Tips, Resources, Timeline
The ‘mini project’ requirement for EECS 3482 should be seen as a 4-fold opportunity:
1) To deepen your knowledge about a current and relevant topic in computer/information
security that you are (also) interested and curious about.
2) To perform Internet-based journalism-style information gathering and reporting.
3) To practice you teamwork, leadership and critical-thinking skills.
4) To improve you presentation and public-speaking skills.
GENERAL TIPS
1) When picking the topic:
• Pick a topic/story that you are: 1) passionate about, and 2) comfortable to discuss.
• Take enough time to research the topic. (Ideally a week or more for researching the
topic, and another week for preparing the presentation.)
• Consult a number of different sources/references to obtain a range of different views
and perspectives. (The optimal number of references is 10 or more.)
EVALUATION
The base score for each presentation will be obtained as a weighted sum:
Both the instructor and the audience-students will fill out a performance evaluation sheet and
provide their individual scores for: a) the depth, and b) quality/clarity of the presentation.
To encourage early presentations, another ‘bonus’ weighting scheme will additionally be applied:
𝟎𝟎.𝟐𝟐𝟐𝟐
ActualScore (Team presenting in slot(𝐢𝐢)) = BaseScore * (1.25 – (𝐢𝐢 − 𝟏𝟏))
𝟏𝟏𝟏𝟏
where, i = 1, 2, …, 18 are the days/slots of student presentations, starting January 18 (see course
Web-site).
REFERENCE SITES
Below is a list of assorted recommended reference sites that you may find useful when choosing
and/or researching a particular cyber security topic and/or news story:
• http://www.infosecurity-magazine.com/
• http://securityintelligence.com/
• http://www.darkreading.com/
• http://www.securityweek.com/
• http://www.theregister.co.uk/security
• http://www.technewsworld.com/perl/section/cyber-security
• http://www.informationsecuritybuzz.com/
• http://www.homelandsecuritynewswire.com/topics/cybersecurity
• http://www.infosecnews.org/
• http://www.infosecurity-magazine.com/
• http://www.inforisktoday.eu/
• http://threatpost.com/
• http://www.trendmicro.com/vinfo/us/security/news/
• http://www.wired.com/security/
POTENTIAL TOPICS/STORIES
3. RANSOMWARE EVOLUTION AND CURRENT LANDSCAPE – TEAM 19 (A. KIM, E. LIN, Q. CHEN)
http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-
evolution-of-ransomware.pdf
http://integranetworks.com/wp-content/uploads/2016/07/Integra-Networks-Ransomware-White-
Paper.pdf
https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/iSight-
Ransomware-Threat-Landscape-Overview.pdf
https://www.sans.org/reading-room/whitepapers/incident/enterprise-survival-guide-ransomware-
attacks-36962
10. DNSCHANGER ATTACK (AND ITS USE OF STEGANOGRAPHY) TEAM 14 (E. LAMB, H. TRIVEDI, D.
BICKRAM)
http://arstechnica.com/security/2016/12/home-routers-under-attack-in-ongoing-malvertisement-blitz/
https://www.proofpoint.com/us/threat-insight/post/home-routers-under-attack-malvertising-windows-
android-devices
http://thehackernews.com/2016/12/dnschanger-router-malware.html
https://www.bleepingcomputer.com/news/security/steganography-is-very-popular-with-exploit-kits-all-
of-a-sudden/
11. KILLDISK (AND ITS USE IN HACKS ON UKRAINIAN POWER GRID) TEAM 12 (A. SHAHRAMI, R.
ABOU-NASSAR, M. MORSI)
https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf
http://www.welivesecurity.com/2016/12/13/rise-telebots-analyzing-disruptive-killdisk-attacks/
http://www.nerc.com/pa/CI/ESISAC/Documents/E-ISAC_SANS_Ukraine_DUC_18Mar2016.pdf
12. USB DROP & USB KILL ATTACK TEAM 3 (P. Y. NG, J. Y. OU, W. YAO)
http://www.pcmag.com/news/346755/hey-dummy-drop-that-usb-drive
https://zakird.com/papers/usb.pdf
http://www.computerworld.com/article/3118344/computer-hardware/this-usb-thumb-drive-will-fry-
your-unsecured-computer.html
http://www.techworm.net/2016/09/usb-kill-2-0-sale-destroys-device-plugged.html#prettyPhoto
13. SECURITY AND PRIVACY OF WEARABLE DEVICES TEAM 11 (J. LOJA, S. S. VIRK, S. W. CHOW)
http://aircconline.com/ijnsa/V8N3/8316ijnsa02.pdf
https://www.priv.gc.ca/media/1799/wc_201401_e.pdf
http://www.uknow.com/wp-content/uploads/2014/03/Location-Services_White_Paper.pdf
https://www.symantec.com/content/dam/symantec/docs/white-papers/how-safe-is-your-quantified-
self-en.pdf
https://www.democraticmedia.org/sites/default/files/field/public/2016/aucdd_wearablesreport_final1
21516.pdf
14. DEEP AND DARK WEB TEAM 4 (A. AOLARITEI, D. NOWAK, R. AGYAPONG)
https://www.sans.org/reading-room/whitepapers/covert/ocean-internet-deep-web-37012
https://media.scmagazine.com/documents/224/deeplight_(1)_55856.pdf
https://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-
papers/wp_below_the_surface.pdf
http://www.batblue.com/the-darknet/
15. BITCOIN: WHO INVENTED IT AND HOW IT WORKS TEAM 1 (M. TSYMBAL, M. ABUASAB, C.
REYES)
http://www.sciencealert.com/bitcoin-was-the-best-performing-currency-of-2016
https://bitcoin.org/bitcoin.pdf
http://scitechconnect.elsevier.com/wp-content/uploads/2016/07/Introduction-to-Bitcoin.pdf
http://bravenewcoin.com/assets/Reference-Papers/A-Gentle-Introduction/A-Gentle-Introduction-To-
Bitcoin-WEB.pdf
http://scet.berkeley.edu/wp-content/uploads/BlockchainPaper.pdf
16. SOCIAL MEDIA SECURITY AND PRIVACY TEAM 10 (D. N. XUAN, H. SINGH, M. ASAD)
https://www.russharvey.bc.ca/resources/socialmedia.html
http://www.sciencedirect.com/science/article/pii/S1877050916000211
https://www.bluecoat.com/en-gb/company/press-releases/blue-coat-social-media-security-report-2016
http://cacm.acm.org/magazines/2016/7/204021-the-rise-of-social-bots/fulltext