; Hand this in to: tdumitra@umiacs.umd.edu ; Required Readings @inproceedings{ Weak_Keys, Author = {Nadia Heninger and Zakir Durumeric and Eric Wustrow and J. Alex Halderman}, Booktitle = {Proceedings of the 21st {USENIX} Security Symposium}, Month = {August}, Title = {Mining Your {P}s and {Q}s: {D}etection of Widespread Weak Keys in Network Devices}, Year = 2012 studentfirstname ="", studentlastname ="", summary = "", contribution1 ="", contribution2 ="", contribution3 ="", contribution4 ="", contribution5 ="", weakness1 = "", weakness2 = "", weakness3 = "", weakness4 = "", weakness5 = "", interesting = "high/med/low", opinions = "", }