Study Guide To Information Security
Study Guide To Information Security
Daniel Bosk
Department of Information Systems and Technology
Mid Sweden University, Sundsvall
School of Computer Science and Communication
KTH Royal Institute of Technology, Stockholm
Abstract
The study guide covers provides an overview of the course: the scope
and intended learning outcomes, how the teaching is organized to achieve
that, what is studied when, what to do if you miss the due times for
assignments etc.
1
Contents
1 Scope and aims 3
1.1 Intended learning outcomes . . . . . . . . . . . . . . . . . . . . . 3
3 Course contents 4
3.1 S0 What’s up with security? . . . . . . . . . . . . . . . . . . . . . 4
3.2 Foundations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.3 Managing information security . . . . . . . . . . . . . . . . . . . 7
3.3.1 MSB part I . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.3.2 M1 Information security management system . . . . . . . 7
3.3.3 MSB part II . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.3.4 M2 and S3 Assessment and risk analysis . . . . . . . . . . 7
3.3.5 Information security from a records management perspect-
ive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.4 Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.5 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.5.1 L4 Evaluating and designing authentication . . . . . . . . 9
3.6 Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.6.1 L5 Private communication . . . . . . . . . . . . . . . . . . 10
3.7 Access control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.8 Accountability . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.9 Differential privacy . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.10 Software security . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.11 Trusted computing . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.12 P6 Applying security and usability in practice . . . . . . . . . . . 13
4 Assessment 13
4.1 Handed-in assignments . . . . . . . . . . . . . . . . . . . . . . . . 14
4.2 ‘What if I’m not done in time?’ . . . . . . . . . . . . . . . . . . . 14
2
1 Scope and aims
The aim of the course is that after the course you should be able to make high-
level designs for secure solutions, i.e. combine relevant research results based on
their high-level properties into a solution with the desired security, privacy and
usability properties. The problems and solutions can be in both the technical
or organizational domain.
• navigate the field of information security, distinguish your own limits and
where to search for solutions, e.g. experts or published research results
that are relevant to the solution of a given problem.
• analyse and apply the results of published research in the security field.
Grade C You fulfil the criteria for E. Additionally, your evaluations and designs
are good with some base in theory and, where applicable, the research lit-
erature. Gaps and errors are allowed if they only render your solution less
optimal.
Grade A You fulfil the criteria for C. However, your evaluations and designs
must be extensive and well-founded in theory and, where applicable, the
research literature. Gaps and errors are not allowed in the solution unless
they have been properly addressed and you have given a suggestion on an
approach to how to start resolve the issue.
The grades B and D are intermediary grades.
3
2 Course structure and overview
The course is divided into three parts. The first part of the course covers the
foundations of security: what it is, how to evaluate new knowledge in the field.
This covers both purely technical aspects, but also includes human aspects such
as usability — even if a system is proved secure, it will offer no security if its
human users cannot use it.
The second part of the course covers information security on a strategic level,
this concerns organizational management systems for information security: how
to implement these and how to continuously run them in an organization. It also
includes threat and risk analysis. The main material is produced by the Swedish
Civil Contingencies Agency (MSB) and is based on the ISO 27000 standard.
The third part of the course covers the technical aspects: how to design
security (and not to design security). The focus in this part of the course is on
security mechanisms and how to use these in secure systems.
2.2 Schedule
In Table 1 you will find an overview of the schedule for the course. The detailed
schedule can be found in the University’s central scheduling system. The details
for each session can be found in Section 3.
3 Course contents
This section summarizes each of the learning sessions, i.e. what they cover, what
you are expected to learn and its reading material.
4
Course week Work
1 Session: Introduction
Seminar: What’s up with security? (Section 3.1)
Foundations: What is security?, The scientific method, At-
tacking humans, Psychology (Section 3.2)
Session: Foundations
2 Lecture: MSB’s framework, part I (Section 3.3)
Start working on M1 (Section 3.3.2)
Lecture: MSB’s framework, part II
Start working on M2, prepare S3 (Section 3.3.4)
Lecture: Records management
3 Crypto: Shannon entropy, Some applications of info theory
(Section 3.4)
Crypto: High-level overview of modern crypto
Authentication (Section 3.5)
Session: Crypto, Authentication
4 Seminar: L4 (Section 3.5.1) part I
Seminar: L4 part II
5 Protocols (Section 3.6)
Seminar: L5 (Section 3.6.1)
Access control (Section 3.7)
Accountability (Section 3.8)
Session: Protocols, Access control, Accountability
6 Differential privacy (Section 3.9)
Software security (Section 3.10)
Trusted computing (Section 3.11)
Session: Differential privacy, Software and Trusted Com-
puting
7 Tutoring: P6 (Section 3.12)
Seminar: S3 (Section 3.3.4)
8 Tutoring: P6 (devel)
9 Tutoring: P6 (devel)
10 Presentation: P6 (devel)
Second grading: M1 (isms), M2 (risk)
Second seminar: S3 (risk), L4 (pwdeval), L5 (pricomlab)
+3 months Second presentation: P6 (devel)
Final grading: M1 (isms), M2 (risk)
Final seminar: S3 (risk), L4 (pwdeval), L5 (pricomlab)
+6 months Final presentation: P6 (devel)
Table 1: A summary of the parts of the course and when they will (or should)
be done. The table is adapted to taking this course at half-time pace, i.e. 20
hours per week for 10 weeks.
5
• to value and argue about the responsibilities of engineers.
Reading: To be able to reason and have a discussion, we will have some ethics
guidelines as a base: Code of Ethics: ACM Code of Ethics and Professional
Conduct [1], Software Engineering Code of Ethics and Professional Practice [2]
and IEEE Code of Ethics [3].
First, you must read up on the influence campaigns during the 2016 US
election [4]. Then you must read up on the Cambridge Analytica scandal [e.g.
5–8] and the Mirai botnet incident [9].
Finally, you should search for and read current news articles of your own
choice illustrating the problem of lacking security.
3.2 Foundations
What is security? Summary: In this learning session we will cover the found-
ations of security. By this we mean what security is all about, e.g. what types
of properties we are interested in and what we want to achieve in our security
work.
Intended learning outcomes: After this session you should be able:
• to understand the what security is generally about.
Reading: You should read Gollmann’s chapter on ‘Foundations of Computer
Security’ [10, Chap. 3]. There he attempts at a definition of Computer Security
and related terms, e.g. confidentiality, integrity, and availability, which we need
for our treatment of the topic. Anderson also covers this in Chapter 1 of [11].
He also treats a wider area than just computer security, which is good for us,
he covers many aspects of security in different examples.
6
Psychology Summary: One important aspect of security, which technical
people tend to forget, is the users’ weaknesses. The psychology of the human
mind is therefore an important subject to discuss in the context of security. And
consequently, we must adapt our systems to those limitations. In this learning
session, we will focus on relevant parts of our psychology.
Intended learning outcomes: After this learning session you should be able:
• to incorporate basic psychology in the design of a system to increase its
security.
7
3.3.5 Information security from a records management perspective
Records and Archives management deals with certain kinds of information that
is related to business processes, and serve as evidence of activities. Why it
can forexample be used for accountability purposes, contracts, regulate busi-
ness relations and more. Therefore it is important to ensure the quality of the
information, and that it is not manipulated for example. The trustworthiness of
the information is central, and development of criteria and practices to ensure
that. The emphasis is on the information, and also to understand the context
in which the information is created and managed. Business process analysis is
therefore a central activity. The National Archives of Sweden and the Swedish
Civil Contingencies Agency has for example had some collaboration in that area.
The lecture will be an introduction to archives and information science, ba-
sic concepts, processes, business process analysis and information mapping. It
covers material from primarily Vägledning för processorienterad informations-
kartläggning [32] and the standard ISO 30300:2011 [33].
3.4 Cryptography
Basic information theory The area of Information Theory was founded in
1948 by Claude Shannon. It is a mathematical theory to reason about how much
information is contained in certain data. Equivalently, it is also a measure of
uncertainty in information, and has thus plenty of application in security and
cryptography. This learning session covers the basic concept, Shannon entropy,
and some applications to security and privacy.
After the session you should be able
• to apply Shannon entropy in basic situations related to security and pri-
vacy.
The concept of Shannon entropy, the main part of information theory, is
treated in a few short texts: A Primer on Information Theory and Privacy [34]
and ‘Chapter 6: Shannon entropy’ [35]. You should read on the use of entropy
to estimate identifiability: ‘How Unique Is Your Browser?’ [36].
8
14.7 in [10].) For the remaining topics, however, we refer to the Encyclopedia of
cryptography and security [37] (and cited papers and books).
3.5 Authentication
Authentication is part of the core of security. An entity claims something, a
property or an identity, authentication is about verifying or rejecting any such
claim. We will discuss three aspects of authentication: user-to-machine (and
user-to-user), machine-to-user, machine-to-machine. For user authentication
we will start with the traditional something you know, something you have and
something you are and then look beyond.
More specifically, the session should prepare you to be able to
• understand the authentication and usability problems of authentication
involving users.
• analyse the requirements for authentication in a situation and design an
authentication system with desired authentication properties and usabil-
ity.
Why we want to do this and how we can accomplish this is treated in Chapter
4 in [10]. Anderson also treats this topic [11, Chap. 2], although in a wider
perspective with less technical details. When you have studied this material you
should do exercises 4.2, 4.3, 4.4 and 4.6 in [10]. For the treatment of anonymous
credentials, we refer to ‘Electronic Identities Need Private Credentials’ [38] and
‘Anon-Pass: Practical Anonymous Subscriptions’ [39].
9
3.6 Protocols
As soon as two entities need to interact, there is need for a protocol — be it
inside or between systems, even one entity communicating with itself in different
points in time (which is the case when storing something for use at a later time).
These protocols need different properties. We will explore how to design secure
protocols and introduce some tools for verifying security properties of protocols.
More concretely, after this session you should be able to
• overview the different approaches and their limits to verify the security of
protocols.
Anderson gives an overview of this area in Security Engineering [11], Chapter
3 ‘Protocols’. Gollmann has a more technically oriented treatment of a part of
this topic in Chapter 15 of Computer Security [10].
10
• understand the fundamental access control models and their relations.
• evaluate advantages and disadvantages of different access control solutions.
3.8 Accountability
The need for accountability has been apparent in civilisations for as long as
they have existed. One of today’s institutions which is historically renowned
for keeping strict accounts is the state tax office, another is, of course, the
banks. We will explore some principles in keeping accounts and discuss ways to
implement it in different, sometimes challenging, environments. In particular,
the ILOs are that you are able to:
• evaluate advantages and disadvantages of different levels of accountability.
11
• ‘Challenging Differential Privacy: The Case of Non-interactive Mechan-
isms’ [53],
12
LADOK ECTS Grade Course assignments
I101 1.0 P, F M1, M2
S101 1.0 P, F S3
L101 1.0 P, F L4, L5
R101 3.0 A–F P6
Total 6.0 A–F P6
4 Assessment
This section explains how the course modules are graded and mapped to LADOK.
Table 2 visualizes the relations between modules, credits, grades and LADOK.
The project report is graded from A to F, where A–E are for passing and F
and Fx are for failing. The project also includes an oral presentation which is
13
graded pass (P) or fail (F), and is reported with the project to LADOK. The
grade of the project will also be the grade of the course total.
14
References
[1] Association for Computing Machinery. Code of Ethics: ACM Code of Eth-
ics and Professional Conduct. Accessed on 4 April 2014. url: https :
//www.acm.org/about/code-of-ethics.
[2] Association for Computing Machinery. Software Engineering Code of Eth-
ics and Professional Practice. Accessed on 27 March 2019. url: https:
//ethics.acm.org/code-of-ethics/software-engineering-code/.
[3] Institute of Electrical and Electronics Engineers. IEEE Code of Ethics. Ac-
cessed on 4 April 2014. url: http://www.ieee.org/about/corporate/
governance/p7-8.html.
[4] Scott Shane and Mark Mazzetti. ‘Inside a 3-Year Russian Campaign to
Influence U.S. Voters’. en-US. In: The New York Times (Nov. 2018). issn:
0362-4331. url: https://www.nytimes.com/2018/02/16/us/politics/
russia-mueller-election.html (visited on 21/01/2019).
[5] Andrea Valdez. ‘Everything You Need to Know About Facebook and Cam-
bridge An alytica’. In: Wired (Mar. 2018). issn: 1059-1028. url: https:
/ / www . wired . com / story / wired - facebook - cambridge - analytica -
coverage/ (visited on 17/01/2019).
[6] Carole Cadwalladr and Emma Graham-Harrison. ‘Revealed: 50 million
Facebook profiles harvested for Cambridge Anal ytica in major data breach’.
en-GB. In: The Guardian (Mar. 2018). issn: 0261-3077. url: https://
www . theguardian . com / news / 2018 / mar / 17 / cambridge - analytica -
facebook-%20influence-us-election (visited on 17/01/2019).
[7] Matthew Rosenberg, Nicholas Confessore and Carole Cadwalladr. ‘How
Trump Consultants Exploited the Facebook Data of Millions ’. en-US.
In: The New York Times (Apr. 2018). issn: 0362-4331. url: https://
www.nytimes.com/2018/03/17/us/politics/cambridge-analytica-
trump-c%20ampaign.html (visited on 17/01/2019).
[8] Ishaan Tharoor. Analysis — The scary truth that Cambridge Analytica
under stands. en. 2018. url: https://www.washingtonpost.com/news/
worldviews/wp/2018/03/22/the-scary-tru%20th-that-cambridge-
analytica-understands/ (visited on 17/01/2019).
[9] Bruce Schneier. Lessons From the Dyn DDoS Attack - Schneier on Secur-
ity. 2016. url: https://www.schneier.com/blog/archives/2016/11/
lessons_from_th_5.html (visited on 17/01/2019).
[10] Dieter Gollmann. Computer Security. 3rd ed. Chichester, West Sussex,
U.K.: Wiley, 2011. isbn: 9780470741153 (pbk.)
[11] Ross J. Anderson. Security Engineering. A guide to building dependable
distributed systems. 2nd ed. Indianapolis, IN: Wiley, 2008. isbn: 978-0-470-
06852-6 (hbk.) url: http://www.cl.cam.ac.uk/~rja14/book.html.
[12] Sean Peisert and Matt Bishop. ‘How to Design Computer Security Exper-
iments’. In: Fifth World Conference on Information Security Education.
Ed. by Lynn Futcher and Ronald Dodge. Boston, MA: Springer US, 2007,
pp. 141–148. isbn: 978-0-387-73269-5.
15
[13] C. Herley and P. C. v. Oorschot. ‘SoK: Science, Security and the Elusive
Goal of Security as a Scientific Pursuit’. In: 2017 IEEE Symposium on
Security and Privacy (SP). May 2017, pp. 99–120. doi: 10 . 1109 / SP .
2017.38.
[14] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Introduktion till metodstödet. Dec. 2011. url: http://www.
informationssakerhet.se.
[15] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Säkra ledningens engagemang. Dec. 2011. url: http://www.
informationssakerhet.se.
[16] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Projektplanering. Dec. 2011. url: http://www.informationssakerhet.
se.
[17] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Gapanalys. Dec. 2011. url: http://www.informationssakerhet.
se.
[18] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Välja säkerhetsåtgärder. Dec. 2011. url: http://www.informationssakerhet.
se.
[19] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Utforma säkerhetsprocesser. Dec. 2011. url: http : / / www .
informationssakerhet.se.
[20] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Utforma policy och styrdokument. Dec. 2011. url: http : / /
www.informationssakerhet.se.
[21] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Planera genomförande. Dec. 2011. url: http://www.informationssakerhet.
se.
[22] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Konstruera och anskaffa. Dec. 2011. url: http://www.informationssakerhet.
se.
[23] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Införa. Dec. 2011. url: http://www.informationssakerhet.
se.
16
[24] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Övervaka. Dec. 2011. url: http://www.informationssakerhet.
se.
[25] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Granska. Dec. 2011. url: http://www.informationssakerhet.
se.
[26] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Ledningens genomgång. Dec. 2011. url: http://www.informationssakerhet.
se.
[27] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. ‘Utveckla LIS och skyddet’. Dec. 2011. url: http : / / www .
informationssakerhet.se.
[28] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. ‘Kommunicera förbättringar’. Dec. 2011. url: http://www.
informationssakerhet.se.
[29] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. ‘Fortsatt arbete’. Dec. 2011. url: http://www.informationssakerhet.
se.
[30] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Verksamhetsanalys. Dec. 2011. url: http://www.informationssakerhet.
se.
[31] Helena Andersson, Jan-Olof Andersson, Fredrik Björck, Martin Eriksson,
Rebecca Eriksson, Robert Lundberg, Michael Patrickson and Kristina
Starkerud. Riskanalys. Dec. 2011. url: http://www.informationssakerhet.
se.
[32] Myndigheten för samhällsskydd och beredskap (MSB) och Riksarkivet.
Vägledning för processorienterad informationskartläggning. Tech. rep. Nov.
2012. url: https : / / riksarkivet . se / Media / pdf - filer / V % C3 %
A4gledning%20f%C3%B6r%20processorienterad%20informationskartl%
C3%A4ggning.pdf.
[33] Information and documentation – Management systems for records – Fun-
damentals and vocabulary. Standard. Available in Swedish from the library
in database “E-nav SIS standarder“. Geneva, CH: International Organiz-
ation for Standardization, Nov. 2011.
[34] Peter Eckersley. A Primer on Information Theory and Privacy. Jan. 2010.
url: https://www.eff.org/deeplinks/2010/01/primer-information-
theory-and-privacy.
[35] Daniel Ueltschi. ‘Chapter 6: Shannon entropy’. url: http://www.ueltschi.
org/teaching/chapShannon.pdf.
17
[36] Peter Eckersley. ‘How Unique Is Your Browser?’ In: Privacy Enhancing
Technologies. Springer. 2010, pp. 1–18. url: https : / / panopticlick .
eff.org/static/browser-uniqueness.pdf.
[37] Henk CA Van Tilborg and Sushil Jajodia. Encyclopedia of cryptography
and security. Springer Science & Business Media, 2011. url: https://
link.springer.com/referencework/10.1007%2F978-1-4419-5906-5.
[38] J. Camenisch, A. Lehmann and G. Neven. ‘Electronic Identities Need
Private Credentials’. In: IEEE Security Privacy 10.1 (Jan. 2012), pp. 80–
83. issn: 1540-7993. doi: 10.1109/MSP.2012.7.
[39] M. Z. Lee, A. M. Dunn, J. Katz, B. Waters and E. Witchel. ‘Anon-Pass:
Practical Anonymous Subscriptions’. In: IEEE Security Privacy 12.3 (May
2014), pp. 20–27. issn: 1540-7993. doi: 10.1109/MSP.2013.158.
[40] Daniel Bosk. ‘A high-level overview of cryptography’. Lecture. 2016. url:
https://github.com/OpenSecEd/appliedcrypto/releases/tag/v1.1.
[41] Sean Peisert and Matt Bishop. ‘How to Design Computer Security Ex-
periments’. In: Fifth World Conference on Information Security Educa-
tion: Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June
2007, United States Military Academy, West Point, New York, USA. Ed.
by Lynn Futcher and Ronald Dodge. Boston, MA: Springer US, 2007,
pp. 141–148. isbn: 978-0-387-73269-5. doi: 10.1007/978-0-387-73269-
5 _ 19. url: http : / / web . cs . ucdavis . edu / ~peisert / research /
Peisert-WISE2007-SecurityExperiments.pdf.
[42] Patrick Gage Kelley, Saranga Komanduri, Michelle L Mazurek, Richard
Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor
and Julio Lopez. ‘Guess again (and again and again): Measuring password
strength by simulating password-cracking algorithms’. In: Security and
Privacy (SP), 2012 IEEE Symposium on. IEEE. 2012, pp. 523–537. doi:
10.1109/SP.2012.38.
[43] Saranga Komanduri, Richard Shay, Patrick Gage Kelley, Michelle L. Mazurek,
Lujo Bauer, Christin Nicolas, Lorrie Faith Cranor and Serge Egelman.
‘Of passwords and people: Measuring the effect of password-composition
policies’. In: CHI. 2011. url: http://cups.cs.cmu.edu/rshay/pubs/
passwords_and_people2011.pdf.
[44] Richard Shay, Saranga Komanduri, Adam L Durity, Phillip Seyoung Huh,
Michelle L Mazurek, Sean M Segreti, Blase Ur, Lujo Bauer, Nicolas Christin
and Lorrie Faith Cranor. ‘Can long passwords be secure and usable?’ In:
Proceedings of the 32nd annual ACM conference on Human factors in
computing systems. ACM. 2014, pp. 2927–2936. url: http://lorrie.
cranor.org/pubs/longpass-chi2014.pdf.
[45] Elizabeth Stobert and Robert Biddle. ‘The Password Life Cycle’. In: ACM
Trans. Priv. Secur. 21.3 (Apr. 2018), 13:1–13:32. issn: 2471-2566. doi:
10.1145/3183341.
[46] Ambarish Karole, Nitesh Saxena and Nicolas Christin. ‘A comparative
usability evaluation of traditional password managers’. In: International
Conference on Information Security and Cryptology. Springer. 2010, pp. 233–
251.
18
[47] Alma Whitten and J Doug Tygar. ‘Why Johnny Can’t Encrypt: A Usab-
ility Evaluation of PGP 5.0.’ In: USENIX Security Symposium. Vol. 348.
1999.
[48] Steve Sheng, Levi Broderick, Colleen Alison Koranda and Jeremy J Hy-
land. ‘Why Johnny still can’t encrypt: Evaluating the usability of email en-
cryption software’. In: Symposium On Usable Privacy and Security. 2006,
pp. 3–4.
[49] Scott Ruoti, Jeff Andersen, Daniel Zappala and Kent Seamons. ‘Why
Johnny still, still can’t encrypt: Evaluating the usability of a modern PGP
client’. In: arXiv preprint arXiv:1510.08555 (2015).
[50] Amir Herzberg and Hemi Leibowitz. ‘Can Johnny finally encrypt?: evalu-
ating E2E-encryption in popular IM applications’. In: Proceedings of the
6th Workshop on Socio-Technical Aspects in Security and Trust. ACM.
2016, pp. 17–28.
[51] Bruce Schneier and John Kelsey. ‘Secure audit logs to support computer
forensics’. In: ACM Transactions on Information and System Security
(TISSEC) 2.2 (1999), pp. 159–176.
[52] Cynthia Dwork and Aaron Roth. ‘The Algorithmic Foundations of Dif-
ferential Privacy’. In: Foundations and Trends® in Theoretical Com-
puter Science 9.3–4 (2014), pp. 211–407. issn: 1551-305X. doi: 10.1561/
0400000042. url: http://dx.doi.org/10.1561/0400000042.
[53] Raghavendran Balu, Teddy Furon and Sébastien Gambs. ‘Challenging Dif-
ferential Privacy: The Case of Non-interactive Mechanisms’. In: Computer
Security — ESORICS 2014 — 19th European Symposium on Research in
Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
Part II. 2014, pp. 146–164. doi: 10.1007/978-3-319-11212-1_9. url:
http://dx.doi.org/10.1007/978-3-319-11212-1_9.
[54] Mohammad Alaggan, Sébastien Gambs and Anne-Marie Kermarrec. ‘Private
Similarity Computation in Distributed Systems: From Cryptography to
Differential Privacy’. In: Principles of Distributed Systems - 15th Inter-
national Conference, OPODIS 2011, Toulouse, France, December 13-16,
2011. Proceedings. 2011, pp. 357–377. doi: 10.1007/978-3-642-25873-
2_25. url: http://dx.doi.org/10.1007/978-3-642-25873-2_25.
[55] Mohammad Alaggan, Sébastien Gambs and Anne-Marie Kermarrec. ‘BLIP:
Non-interactive Differentially-Private Similarity Computation on Bloom
filters’. In: Stabilization, Safety, and Security of Distributed Systems - 14th
International Symposium, SSS 2012, Toronto, Canada, October 1-4, 2012.
Proceedings. 2012, pp. 202–216. doi: 10.1007/978-3-642-33536-5_20.
url: http://dx.doi.org/10.1007/978-3-642-33536-5_20.
[56] Úlfar Erlingsson, Vasyl Pihur and Aleksandra Korolova. ‘RAPPOR: Ran-
domized Aggregatable Privacy-Preserving Ordinal Response’. In: Proceed-
ings of the 2014 ACM SIGSAC Conference on Computer and Communica-
tions Security. CCS ’14. Scottsdale, Arizona, USA: ACM, 2014, pp. 1054–
1067. isbn: 978-1-4503-2957-6. doi: 10 . 1145 / 2660267 . 2660348. url:
http://doi.acm.org/10.1145/2660267.2660348.
19
[57] Giulia Fanti, Vasyl Pihur and Úlfar Erlingsson. ‘Building a RAPPOR
with the unknown: Privacy-preserving learning of associations and data
dictionaries’. In: Proceedings on Privacy Enhancing Technologies 2016.3
(2016), pp. 41–61.
[58] G. McGraw. ‘Four Software Security Findings’. In: Computer 49.1 (Jan.
2016), pp. 84–87. issn: 0018-9162. doi: 10.1109/MC.2016.30.
[59] Daniel Genkin, Itamar Pipman and Eran Tromer. ‘Get your hands off my
laptop: physical side-channel key-extraction attacks on PCs’. In: Journal
of Cryptographic Engineering 5.2 (June 2015), pp. 95–112. issn: 2190-
8516. doi: 10.1007/s13389-015-0100-7.
[60] Daniel Genkin, Adi Shamir and Eran Tromer. ‘RSA Key Extraction via
Low-Bandwidth Acoustic Cryptanalysis’. In: Advances in Cryptology –
CRYPTO 2014. Ed. by JuanA. Garay and Rosario Gennaro. Vol. 8616.
Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2014,
pp. 444–461. isbn: 978-3-662-44370-5. doi: 10.1007/978-3-662-44371-
2_25. url: http://dx.doi.org/10.1007/978-3-662-44371-2_25.
[61] Daniel Genkin, Lev Pachmanov, Itamar Pipman and Eran Tromer. ‘Steal-
ing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on
Windowed Exponentiation’. In: Cryptographic Hardware and Embedded
Systems – CHES 2015. Ed. by Tim Güneysu and Helena Handschuh. Ber-
lin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 207–228. isbn: 978-
3-662-48324-4.
[62] D Graffox. IEEE Citation Reference. Sept. 2009. url: http://www.ieee.
org/documents/ieeecitationref.pdf.
[63] Joshua M. Paiz, Elizabeth Angeli, Jodi Wagner, Elena Lawrick, Kristen
Moore, Michael Anderson, Lars Soderlund, Allen Brizee and Russell Keck.
In-Text Citations: The Basics. Nov. 2013. url: https://owl.english.
purdue.edu/owl/owlprint/560/.
20