Seminars, Courses, and Student Presentations Covering Cryptovirology

  1. New York Institute of Technology (NYIT) - Amman Campus, Intrusion Detection and Hacker Exploits (INCS 745), Instructor: Dr. Lo'ai A. Tawalbeh, Winter 2007, Fall 2006, Summer 2006, Presentation entitled "Backdoors & Remote Administration programs" by Ammar Mahmood (Backdoor.pdf), covers asymmetric backdoors (RSA key generation) and kleptography.

  2. Hong Kong Polytechnic University, Department of Computing, Internet Infrastructure Security (COMP444), Prof. Rocky K. C. Chang, Spring 2007, Course Project entitled "Using Microsoft's Crypto API for Cryptoviral Extortion".

  3. University of California, Los Angeles (UCLA), Computer Science Department, System Security - CS 259, Prof. Miodrag Potkonjak, Fall 2003, Midterm touches on Cryptovirology.

  4. University of California, San Diego (UCSD), Department of Mathematics, Math 187: Introduction to Cryptography, Prof. Adriano Garsia, Student Project: Cryptography and Viruses, Student: Simone McCloskey, Spring 2005, Project touches on cryptovirology.

  5. University of California, Irvine, Secure Computing and Networking Center (SCONCE), Winter Seminar '03, February 21, 2003, Cryptovirology: the use of cryptography in viruses by Einar Mykletun.

  6. California State University, East Bay, Department of Mathematics and Computer Science, CS 6520 - Cryptography and Data Security, Instructor: Ping Wah Wong, Winter, 2003, Research Project: Cryptography and Computer Viruses (includes overview of Young-Yung IEEE S&P, 1996), student: Marian Kim.

  7. Saint Joseph's University, Philadelphia, PA, Mathematics and Computer Science Department, CSC 5985: Cryptography and Virology, Prof. Babak Forouraghi, Spring 2006, Course covers Cryptovirology (Required Textbook: Malicious Cryptography - Exposing Cryptovirology).

  8. Florida State University, Department of Computer Science, CIS 5371 - Cryptography, Fall 2005, Prof. Mike Burmester, Presentation by John Kerski & Kenny Zahn on Kleptographic attacks on RSA key generation and Diffie-Hellman, Presentation date: Dec 6th 2005.

  9. Brigham Young University, Utah, Department of Computer Science, CS 465 - Computer Security, Winter 2006, Prof. Kent E. Seamons, Course covers cryptoviral extortion.

  10. University of Missouri, Rolla, Department of Electrical and Computer Engineering, CpE 349 - Trustworthy, Survivable Networks, Fall 2005, Prof. Ann Miller, Course covers cryptoviral extortion, October, 2005.

  11. University of Texas at Austin, Department of Computer Sciences, Advanced Computer Security - CS 5369X, Prof. Mark Grechanik, Spring 2005, Supplemental Course Text: Malicious Cryptography: Exposing Cryptovirology.

  12. University of Texas at San Antonio, Department of Computer Science, Applied Cryptography CS 6973, Prof. Shouhuai Xu, Fall 2005, Student Project options include Cryptovirology and Kleptography.

  13. Rutgers University, Department of Computer Science, Cryptography and Computer Security - CS 475, Prof. Jean-Camille Birget, Spring 2006, Supplemental Course Text: Malicious Cryptography: Exposing Cryptovirology.

  14. Virginia Tech, Department of Computer Science CS3604 - Professionalism in Computing , Instructor: Dr. Dunlap, Spring 2006, Student Presentation on "Computer Viruses" that covers cryptoviral extortion, student: Andrew Mark Mildorf.

  15. University of Connecticut, Department of Computer Science and Engineering , CSE 298/353 Computer Security, Prof. Aggelos Kiayias, Spring 2006, Course Lecture, Apr. 20: Cryptoviruses and Malicious Cryptography.

  16. University of Connecticut, Department of Computer Science and Engineering CSE300 - Modern Cryptography, Prof. Alexander Russell, Spring 2000, Cryptovirology by Charles Phillips.

  17. Indiana University - Purdue University, Fort Wayne, School of Engineering, CS 306 Computers in Society, Prof. Emmanuel Udoh, Spring 2006, Final exam covers cryptoviral extortion.

  18. Indiana University, School of Informatics, I400: Issues in Security and Privacy, Prof. Markus Jakobsson, Fall 2004, The syllabus covers cryptovirology and kleptography.

  19. City University of New York, CSc 85030 - Topics in Cryptography and Computer Security: Algebraic Foundations of Contemporary Cryptography, Prof. Michael Anshel, Fall 2004, Cryptovirology.

  20. New York University, Courant Institute, Cryptographic Protocols (G22.3033-001), Dr. Markus Jakobsson, Summer 2003, Cryptovirology, TA: Shabsi Walfish.

  21. New York University, Courant Institute, Cryptographic Protocols (G22.3033-001), Dr. Markus Jakobsson, Summer 2002, Cryptovirology.

  22. Rensselaer Polytechnic Institute, Troy, New York Network Security II (CSCI-4973-01 & 6973-01), Prof. Bulent Yener Spring 2007, Lecture during weeks 9-12 cover Malicious Cryptography.

  23. Dartmouth College, New Hampshire, Department of Computer Science, Security and Privacy (CS38), Instructor: Dr. Sergey Bratus, Spring 2005, Book "Malicious Cryptography: Exposing Cryptovirology" on reserve in library for course projects.

  24. University of Memphis, Department of Mathematical Sciences, COMP-7120/ISDS-7670 - Cryptography and Data Security, Instructor: Dr. Dipankar Dasgupta, Summer 1998, Cryptovirology: Extortion-Based Security Threats and Countermeasures.

  25. University of Illinois at Urbana-Champaign, Department of Computer Science, CS 491 CM - Systems and Security Seminar, Prof. Roy H. Campbell, Prof. Dennis M. Mickunas, Fall 1999, Cryptovirology by Seung Yi.

  26. Warsaw University, Poland, Instytut Informatyki, Course: Praktyczne protokoly kryptograficzne, Prof. Stefan Dziembowski, Rok akademicki 2004/2005, Overview of Cryptovirology/Kleptography by Jacek Kolodziej, Krzysztof Nozderko, and Grzegorz Oledzki dated April 24, 2005.

  27. University of Wroclaw, Poland, Instytut Informatyki, Seminarium studenckie i doktoranckie - Zaawansowane metody kryptograficzne, Winter 1998, Kleptography: Using Cryptography Against Cryptography by Daniel Kucner.

  28. Friedrich Alexander University, Germany, Department of Theoretical Computer Science, Cryptography seminar, Winter 1997/1998, Subliminal channels/Kleptography: Using Cryptography Against Cryptography by Thomas's Fischer.

  29. University of Hamburg, Germany, Theoretische Grundlagen der Informatik, Oberseminarvorträge, June 10, 1997, Kleptography: Using Cryptography Against Cryptography by Safuat Hamdy.

  30. Ruhr University, Germany, Faculty for electrical and information technology, Seminar SS, July 2004. Malicious Cryptography / Cryptovirology by Sven Schäge.

  31. National University of Ireland, Maynooth, Dept. of Computer Science/ Computer Security Crypto Group, Project 1, Academic Year 2005-2006, Pre-requisite: SE416 - Cryptography, Dr. Tom Dowling, Project covers survivable malware (cryptovirus/facehugger).

  32. University of Waterloo, Ontario, Canada, School of Computer Science, Winter Semester 2007, CS 758: Cryptography / Network Security, Instructor: Prof. Doug Stinson, Project Group: Tran, Zhang, Project entitled "Kleptography: Malicious Cryptography", Presentation Date: April 3, 2007.

  33. University of Waterloo, Ontario, Canada, Dept. of Combinatorics & Optimization, Academic Year 2004, Master's Student: Jihoon Cho, MMath Essay entitled "Ten Years of RSA Cheating Cryptosystems", Essay covers Kleptography.

  34. University of Guelph, Ontario Canada, Department of Computing and Information Science, DCCT*4080 Cryptography and Network Security, Instructor: Michael Liu, Summer 2006, student presentation on "Cryptoviruses", date: August 1st, 2006, student: Pawel Popowicz.

  35. University of Calgary, Alberta, Canada, Dept. of Computer Science, CPSC 527/627 Computer Viruses and Malware , Fall 2006, Prof. John Aycock, course covers cryptovirology.

  36. University of Calgary, Alberta, Canada, Dept. of Computer Science, CPSC 429 Applied Cryptography, Winter 2007, Instructor: Mike Jacobson, student presentation on April 13 by Ryan Vogt entitled "Quorum Sensing and Cryptovirology".

  37. Central Queensland University, Central City Campus, Australia, Faculty of Informatics and Communication, Research Methods - COIS 19071, Student: Damien Pignat, Subject: Research on "emerging trends in discrete logarithm based kleptography and the need for consideration of these trends in the development of new cryptosystems" in partial fulfilment of Bachelor of Information Technology (Honours), completed May 2005, Supervisors: Emeritus Professor John Dekkers, Dr. Ron Balsys, Lyta Penna, Tim Roberts.

  38. University of Caen, France, Département d'informatique, Topic Proposer: Pascal Paillier, Project Coordinator: Fabien Laguillaumie, Project on Kleptographic attacks on RSA key generation (asymmetric backdoor), Masters Student: Noël Erwan, Project Duration: Nov. 15, 2004 - March 25, 2005.

  39. Federal University of Pernambuco, Brazil, Centro de Informatica, Titulo: Criptovirologia e Cleptografia: Eliminacao de Canais Subliminares, Project 3, Temas do Mestrado 2006, Orientador: Ruy Jose Guerra Barretto de Queiroz, Co-Orientadora: Anjolina Grisi de Oliveira

  40. University of Canterbury, New Zealand, Department of Computer Science and Software Engineering, Special Topic - Information Warfare - COSC 429 - 06S2, Lecturer: Malcolm Shore, Semester Two, 2006, Supplemental Course Text: Malicious Cryptography: Exposing Cryptovirology.