-
Why chosen ciphertext security matters
(Technically a handout, but we discussed chosen ciphertext security in
class, and saw several systems that required this property of the
underlying crypto.)
-
Prudent Engineering Practice (PS version)
-
Client Authentication on the Web
(Technically only a handout, but you should be able to spot the kinds
of problems discussed in this paper and in class.)
-
Kerberos
-
Terra
-
Inferring errors in systems
code
-
Address space randomization
-
Software fault isolation
-
Security Architectures for Java
-
Byzantine fault tolerance
-
Listen and Whisper
-
Dynamic Taint Analysis
-
Crowds
-
Electronic Voting