1190 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
1188 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
1191 |
1189 |
1192 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
1190 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
1193 \mode<presentation>{ |
1191 \mode<presentation>{ |
1194 \begin{frame}[c] |
1192 \begin{frame}[c] |
|
1193 \frametitle{\Large\begin{tabular}{c}User-Tracking Without Cookies\end{tabular}} |
|
1194 |
|
1195 Can you track a user {\bf without}: |
|
1196 |
|
1197 \begin{itemize} |
|
1198 \item Cookies |
|
1199 \item Javascript |
|
1200 \item LocalStorage/SessionStorage/GlobalStorage |
|
1201 \item Flash, Java or other plugins |
|
1202 \item Your IP address or user agent string |
|
1203 \item Any methods employed by Panopticlick\\ |
|
1204 \mbox{}\hfill $\rightarrow$ \textcolor{blue}{\url{https://panopticlick.eff.org/}} |
|
1205 \end{itemize} |
|
1206 |
|
1207 Even when you disabled cookies entirely, have Javascript turned off and use a VPN service.\\\pause |
|
1208 And numerous sites already use it. |
|
1209 |
|
1210 \end{frame}} |
|
1211 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
1212 |
|
1213 |
|
1214 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
1215 \mode<presentation>{ |
|
1216 \begin{frame}[c] |
|
1217 \frametitle{\begin{tabular}{c}Web-Protocol\end{tabular}} |
|
1218 |
|
1219 \only<1->{ |
|
1220 \begin{textblock}{1}(2,2) |
|
1221 \begin{tikzpicture}[scale=1.3] |
|
1222 \draw[white] (0,0) node (X) {\includegraphics[scale=0.12]{pics/firefox.jpg}}; |
|
1223 \end{tikzpicture} |
|
1224 \end{textblock}} |
|
1225 |
|
1226 \only<1->{ |
|
1227 \begin{textblock}{1}(11,2) |
|
1228 \begin{tikzpicture}[scale=1.3] |
|
1229 \draw[white] (0,0) node (X) {\includegraphics[scale=0.15]{pics/servers.png}}; |
|
1230 \end{tikzpicture} |
|
1231 \end{textblock}} |
|
1232 |
|
1233 \only<1->{ |
|
1234 \begin{textblock}{1}(5,2.5) |
|
1235 \begin{tikzpicture}[scale=1.3] |
|
1236 \draw[white] (0,0) node (X) {}; |
|
1237 \draw[white] (3,0) node (Y) {}; |
|
1238 \draw[red, ->, line width = 2mm] (X) -- (Y); |
|
1239 \node [inner sep=5pt,label=above:\textcolor{black}{\small GET static.jpg}] at ($ (X)!.5!(Y) $) {}; |
|
1240 \end{tikzpicture} |
|
1241 \end{textblock}} |
|
1242 |
|
1243 \only<2->{ |
|
1244 \begin{textblock}{1}(5,6) |
|
1245 \begin{tikzpicture}[scale=1.3] |
|
1246 \draw[white] (0,0) node (X) {}; |
|
1247 \draw[white] (3,0) node (Y) {}; |
|
1248 \draw[red, <-, line width = 2mm] (X) -- (Y); |
|
1249 \node [inner sep=5pt,label=below:\textcolor{black}{\small ETag: 7b33de1}] at ($ (X)!.5!(Y) $) {}; |
|
1250 \node [inner sep=5pt,label=above:{\includegraphics[scale=0.15]{pics/tvtestscreen.jpg}}] at ($ (X)!.5!(Y) $) {}; |
|
1251 \end{tikzpicture} |
|
1252 \end{textblock}} |
|
1253 |
|
1254 \only<3->{ |
|
1255 \begin{textblock}{1}(4.2,11) |
|
1256 \begin{tikzpicture}[scale=1.3] |
|
1257 \draw[white] (0,0) node (X) {}; |
|
1258 \draw[white] (3,0) node (Y) {}; |
|
1259 \draw[red, ->, line width = 2mm] (X) -- (Y); |
|
1260 \node [inner sep=5pt,label=above:\textcolor{black}{\small GET static.jpg ETag: 7b33de1}] at ($ (X)!.5!(Y) $) {}; |
|
1261 \end{tikzpicture} |
|
1262 \end{textblock}} |
|
1263 |
|
1264 \only<4->{ |
|
1265 \begin{textblock}{1}(4.2,13.9) |
|
1266 \begin{tikzpicture}[scale=1.3] |
|
1267 \draw[white] (0,0) node (X) {}; |
|
1268 \draw[white] (3,0) node (Y) {}; |
|
1269 \draw[red, <-, line width = 2mm] (X) -- (Y); |
|
1270 \node [inner sep=5pt,label=below:\textcolor{black}{\small HTTP/1.1 304 (Not Modified)}] at ($ (X)!.5!(Y) $) {}; |
|
1271 \end{tikzpicture} |
|
1272 \end{textblock}} |
|
1273 |
|
1274 \end{frame}} |
|
1275 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
1276 |
|
1277 |
|
1278 |
|
1279 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
1280 \mode<presentation>{ |
|
1281 \begin{frame}[c] |
1195 \frametitle{\begin{tabular}{c}Books + Homework\end{tabular}} |
1282 \frametitle{\begin{tabular}{c}Books + Homework\end{tabular}} |
1196 |
1283 |
1197 \begin{itemize} |
1284 \begin{itemize} |
1198 \item there is no single book I am following |
1285 \item There is no single book I am following |
1199 \begin{center} |
1286 \begin{center} |
1200 \includegraphics[scale=0.012]{pics/andersonbook1.jpg} |
1287 \includegraphics[scale=0.012]{pics/andersonbook1.jpg} |
1201 \includegraphics[scale=0.23]{pics/accesscontrolbook.jpg} |
1288 \includegraphics[scale=0.23]{pics/accesscontrolbook.jpg} |
1202 \end{center}\medskip\pause |
1289 \end{center}\medskip\pause |
1203 |
1290 |
1225 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
1312 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
1226 |
1313 |
1227 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
1314 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
1228 \mode<presentation>{ |
1315 \mode<presentation>{ |
1229 \begin{frame}[c] |
1316 \begin{frame}[c] |
1230 \frametitle{\begin{tabular}{c}Thinking as a Defender\end{tabular}} |
|
1231 |
|
1232 \begin{itemize} |
|
1233 \item What are you trying to protect? |
|
1234 \item What properties are you trying to enforce?\medskip |
|
1235 |
|
1236 \item Who are the attackers? Capabilities? Motivations? |
|
1237 \item What kind of attack are we trying to protect? |
|
1238 \item Who can fix any vulnerabilities?\medskip |
|
1239 |
|
1240 \item What are the weaknesses of the system? |
|
1241 \item What will successful attacks cost us? |
|
1242 \item How likely are the attacks? |
|
1243 \end{itemize} |
|
1244 |
|
1245 \small |
|
1246 \textcolor{gray}{Security almost always is {\bf not} free!} |
|
1247 |
|
1248 \end{frame}} |
|
1249 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
1250 |
|
1251 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
1252 \mode<presentation>{ |
|
1253 \begin{frame}[c] |
|
1254 \frametitle{\begin{tabular}{c}The Security Mindset\end{tabular}} |
1317 \frametitle{\begin{tabular}{c}The Security Mindset\end{tabular}} |
1255 |
1318 |
1256 \begin{itemize} |
1319 \begin{itemize} |
1257 \item How things can go wrong. |
1320 \item How things can go wrong? |
1258 \item Think outside the box. |
1321 \item Think outside the box. |
1259 \end{itemize}\bigskip |
1322 \end{itemize}\bigskip |
1260 |
1323 |
1261 The difference between being criminal is to only \alert{\bf think} about how things can go wrong. |
1324 The difference between being criminal is to only \alert{\bf think} about how things can go |
1262 |
1325 wrong, or be very careful with attacks. |
1263 \end{frame}} |
1326 |
1264 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
1327 \end{frame}} |
1265 |
1328 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
1266 |
1329 |
1267 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
1268 \mode<presentation>{ |
|
1269 \begin{frame}[t] |
|
1270 \frametitle{\begin{tabular}{c}Maps in Scala\end{tabular}} |
|
1271 |
|
1272 \begin{itemize} |
|
1273 \item {\bf\texttt{map}} takes a function, say f, and applies it to every element of the list: |
|
1274 \end{itemize} |
|
1275 |
|
1276 \begin{textblock}{15}(2,7) |
|
1277 \fontsize{13}{14}\selectfont |
|
1278 \bf\texttt{List(1, 2, 3, 4, 5, 6, 7, 8, 9)} |
|
1279 \end{textblock} |
|
1280 |
|
1281 \begin{textblock}{15}(2,10) |
|
1282 \fontsize{13}{14}\selectfont |
|
1283 \bf\texttt{List(1, 4, 9, 16, 25, 36, 49, 64, 81)} |
|
1284 \end{textblock} |
|
1285 |
|
1286 \end{frame}} |
|
1287 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
1288 |
1330 |
1289 |
1331 |
1290 \end{document} |
1332 \end{document} |
1291 |
1333 |
1292 %%% Local Variables: |
1334 %%% Local Variables: |