| Week | Topic | Readings | Presenters | Project Deadlines |
| Sept 20 | Introduction | |||
| Sept 27 | Black Hats | How
to 0wn the Internet in Your Spare Time. Stuart
Staniford, Vern Paxson and Nicholas Weaver. The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86) Hovav Shacham Chip and PIN is Broken Steven J. Murdoch, Saar Drimer, Ross Anderson and Mike Bond |
Andres Rodriguez, Kazi Faisal, Sheng Xu |
|
| Oct 4 | Black Hats 2 | Automatic
Patch-Based Exploit Generation is Possible: Techniques and Implications
David Brumley, Pongsin Poosankam, Dawn Song, and Jiang Zhen. All Your iFRAMES Point to Us Niels Provos, Panayiotis Mavrommati, Moheeb Abu Rajab and Fabian Monrose Show Me the Money: Characterizing Spam-advertised Revenue C. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. Voelker and S. Savage |
Richard Abrich, Matthew Thorpe |
Project Proposal |
| Oct 11 | Detecting Exploits | StackGuard:
Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks.
Crispin Cowan, Calton Pu, Dave Maier, Heather Hinton, Peat Bakke, Steve
Beattie, Aaron Grier, Perry Wagle, and Qian Zhang. Detecting past and present intrusions through vulnerability-specific predicates Ashlesha Joshi, Samuel T. King, George W. Dunlap, Peter M. Chen Large-Scale Automatic Classification of Phishing Pages Colin Whittaker, Brian Ryner and Marria Nazif |
Sintujan Panchalingan, Colin Chung, Kristopher Gibbs |
|
| Oct 18 | No Class Instructor Away | |||
| Oct 25 | Midterm Project Presentations | |||
| Nov 1 | Writing Correct Code | Using
Programmer-Written Compiler Extensions to Catch Security Holes.
Ken Ashcraft and Dawson Engler TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection Tielei Wang, Tao Wei, Guofei Gu and Wei Zou TAJ: effective taint analysis of web applications Omer Tripp, Marco Pistoia, Stephen Fink, Manu Sridharan and Omri Weisman |
Midterm Report |
|
| Nov 8 | Mobile Security | Understanding
Android's Security Framework (Tutorial) William Enck PiOS: Detecting Privacy Leaks in iOS Applications Manuel Egele, Christopher Kruegely, Engin Kirdaz and Giovanni Vignay A Study of Android Application SecurityWilliam Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri |
Akshay Kumar, Mani Golafra, Valentin Berbenetz |
|
| Nov 15 | Operating System Security | Terra: A Virtual Machine-Based Platform for Trusted Computing. T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh Fixing Races for Fun and Profit: How to Abuse atime.Nikita Borisov, Rob Johnson, Naveen Sastry and David Wagner Intrusion Recovery Using Selective Re-execution. Taesoo Kim, Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek. |
Reza Mokhtari, Daniel Di Matteo, Kalin Ovtcharov |
|
| Nov 22 | Web Security | Protecting
Browsers from DNS Rebinding Attacks. Collin
Jackson, Adam Barth, Andrew Bortz, Weidong Shao, and Dan Boneh Browser Security: Lessons from Google Chrome Charlie Reis, Adam Barth, Carlos Pizano Trust and Protection in the Illinois Browser Operating System Shuo Tang, Haohui Mai, and Samuel T. King |
Ilian Tili, Antoine Samaha, John Matienzo, Mohammad Sadegh |
|
| Nov 29 | Network Security | Building
a Dynamic Reputation System for DNS. Manos Antonakakis,
Roberto Perdisci, David Dagon, Wenke Lee, and Nick Feamster Let the Market Drive Deployment: A Strategy for Transitioning to BGP SecurityPhillipa Gill, Michael Schapira and Sharon Goldberg Outside the Closed World: On Using Machine Learning For Network Intrusion Detection Robert Sommer and Vern Paxson |
Kianoosh Mokhtarian, Maryam Samizadeh, Ryne Yang |
|
| Dec 6 | Project Presentations | Final Report |