Logistics
Every project group will be given 20 minutes to present and additional 5 minutes for answering questions. Points will be taken off for too long (i.e., over 20 minutes) or too short (under 15 minutes) presentations.
- Q&A time will be also used
- for the presenting group to disconnect their laptop from the projector, and
- for the next group to prepare for their presentation (e.g., load the slides or connect their laptop to the projector).
Awards
Awards will be announced at the end of the mini-conference in the following categories:
- Best design project
- Best analysis project
- Best presentation
- Most holistic approach to security engineering.
Winners of the awards will be decided by the online (trhough WebCT) anonymous majority vote of the ECE 412 students and teaching staff. Voting will be open until 10:25 AM, December 1st. Prizes will be awarded to the winner groups.
Hints For Preparing Your Presentation
Schedule
Starts |
Title and Presenters |
November 29th |
08:00 |
Opening Remarks, Konstantin Beznosov |
08:05 |
Analysis of Bluetooth Security, Stefanie Ho, Brian Ng, Frank Wu, Justin Kwong |
08:30 |
Best Analysis Project!
PC Security using Biometrics, Kit Mun Chan, Ana Pop, Shadi Safarkhah, Gurpreet Virdi |
08:55 |
Analysis of FairPlay Digital Rights Management Scheme in Apple’s iTunes Music Store, Aaron Franks, Stephen LaRoy, Michael Wood, Michael Worth |
09:20 |
Break (10 minutes) |
09:30 |
Access Control List in Operating Systems, Edmund Law, Spencer Shek, Kevin Wong, Cindy Zhu |
09:55 |
Digital Watermarking, Orion Winkelmeyer, Abbas Mehdi, Patrick Lam, Nima Kamoosi |
10:20 |
Improvement of Steganography in TCP Timestamp, Patrick Lee, Dan Anderson |
10:45 |
Closing Remarks, Konstantin Beznosov |
10:50 |
adjourn |
December 1st |
08:00 |
Opening Remarks, Konstantin Beznosov |
08:05 |
Security Analysis of FOB installation at ECE and CS, Justin Fu, Steven Tse, Gavin Yip, Christina Young |
08:30 |
Analysis of FOB Access Control Management System, Gregory Mason, Nikolay Nikiforov, Rupert To, Kevin White |
08:55 |
Best Presentation!
Analysis and Design of a Smartcard Transit Security System, Tim Kinisky, Colleen Qin, Mike Hewitt, Derek Kwei |
09:20 |
Break (5 minutes) |
09:25 |
Simulation of Secondary and Approximate Authorization Recycling, Kyle Zeeuwen |
09:50 |
TOR-Anonymous Internet Communication System, Miljan Cabrilo, Gordon Jesso, Katayon Radkhah, Ivan Tsui |
10:15 |
Best Design Project! & Most Holistic Approach to Security Engineering!
Design and Analysis of a Noise-Based Random Oracle, Albert Wang, Jeff Gebert, Paul Davis |
10:40 |
Break (5 minutes) |
10:45 |
Mini-conference results and awards, Mini-conference jury |
11:00 |
adjourn |
|