Date | Topic | Reading |
Thur. 1/9 | Security Concepts | No written synopsis
required. Complete the reading by 1/14: How to Read a Paper, S. Keshav, University of Waterloo, 2013. Writing reviews for systems conferences, Timothy Roscoe, ETH Zurich, 2007. |
Tues. 1/14 | Capabilities and Access | Capsicum: Practical Capabilities for UNIX, R.N.M. Watson, J. Anderson, B. Laurie, K. Kennaway, USENIX Sec 2010.Background (no written synopsis required):The Confused Deputy: (or why capabilities might have been invented), N. Hardy, OSR 1988. |
Thurs. 1/16 | Privilege Separation | Preventing Privilege Escalation, N. Provos, USENIX Sec 2002. |
Tues. 1/21 | Low-level SW Attacks & Defenses | StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks, C. Cowan, USENIX Sec 1998.Background (no written synopsis required):Smashing The Stack For Fun And Profit, Aleph One, Phrack 1996.Basic Integer Overflows, blexim, Phrack 2002.Exploiting Format String Vulnerabilities, scut / team teso, 2001. |
Thurs. 1/23 | Low-level SW Attacks & Defenses | The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86), H. Shacham, CCS 2007. |
Tues. 1/28 | Class Canceled | |
Thurs. 1/30 | Inline Reference Monitor | Project proposals due.A Secure Environment for Untrusted Helper Applications (Confining the Wily Hacker), I. Goldberg, D. Wagner, R. Thomas, E. Brewer, USENIX Sec 1996.Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools, T. Garfinkel, NDSS 2003. |
Tues. 2/4 | Sandboxing | Efficient Software-based Fault Isolation, R. Wahbe, S. Lucco, T.E. Anderson, S.L. Graham, SOSP 1993. |
Thurs. 2/6 | Sandboxing | First security review
due. Native Client: A Sandbox for Portable, Untrusted x86 Native Code, Yee et al., IEEE S&P 2009. |
Tues. 2/11 | Control-Flow Integrity | Control-Flow Integrity Principles, Implementations, and Applications, M. Abadi, M. Budiu, U. Erlingsson, J. Ligatti, CCS 2005. |
Thurs. 2/13 | Snow day: class canceled. Yinqian Zhang |
"Security Threats and Defenses in Multi-Tenant Public Clouds---A
Side-Channel Security Perspective" Background (no written synopsis required): Cross-VM Side Channels and Their Use to Extract Private Keys, Y. Zhang, et al., CCS 2012. HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis, Y. Zhang, et al., IEEE S&P 2011. |
Tues. 2/18 | Guest Lecture by Robby Cochran |
"Verification of Client Behavior in Distributed Applications" Background (no written synopsis required): Server-side Verification of Client Behavior in Online Games, D. Bethea, R.A. Cochran, M.K. Reiter, TISSEC 2011. |
Thurs. 2/20 | Browser Security | The Multi-Principal OS Construction of the Gazelle Web Browser, H.J. Wang, et al., USENIX Sec 2009.The Security Architecture of the Chromium Browser, A. Barth et al., TR 2008. |
Tues. 2/25 | Browser Security | Verified
Security for Browser Extensions, A. Guha, M. Fredrikson, B. Livshits,
N. Swamy, IEEE S&P
2011. VEX: Vetting Browser Extensions for Security Vulnerabilities, S. Bandhakavi, S.T. King, P. Madhusudan, M. Winslett, USENIX Sec 2010. |
Thurs. 2/27 | Static Analysis | A System and Language for
Building System-Specific, Static Analyses, S. Hallem, B. Chelf, Y. Xie,
D. Engler, PLDI 2002. Additional reading (no synopsis required): A Few Billion Lines of Code Later: Using Static Analysis to Find Bugs in the Real World, A. Bessey, et al. CACM 2010. |
Tues. 3/4 | Dynamic Analysis | Purify: Fast Detection of Memory Leaks and Access Errors, R. Hastings, B. Joyce, USENIX 1992. |
Thurs. 3/6 | Information Flow | TaintDroid:
An Information-Flow Tracking System for Realtime Privacy Monitoring on
Smartphones, W. Enck, et al. OSDI 2010. PiOS: Detecting Privacy Leaks in iOS Applications, M. Egele, C. Kruegel, E. Kirda, G. Vigna, NDSS 2011. |
Tues. 3/11 | No class | Spring Break. |
Thurs. 3/13 | No class | Spring Break. |
Tues. 3/18 | New: Guest Lecture by Yinqian Zhang |
Second security review due. Project status report due. "Security Threats and Defenses in Multi-Tenant Public Clouds---A Side-Channel Security Perspective" Background (no written synopsis required): Cross-VM Side Channels and Their Use to Extract Private Keys, Y. Zhang, et al., CCS 2012. HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis, Y. Zhang, et al., IEEE S&P 2011. |
Thurs. 3/20 | Symbolic Execution | FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution, D. Davidson, B. Moench, S. Jha, T. Ristenpart, USENIX Security 2013. |
Tues. 3/25 | Software Verification | Modular Verification of Software Components in C, S. Chaki, et al. ICSE 2003. |
Thurs. 3/27 | Web Security | Toward Automated Detection of Logic Vulnerabilities in Web Applications, V. Felmetsger, L. Cavedon, C. Kruegel, G. Vigna, USENIX Security 2010. |
Tues. 4/1 | OS Security | seL4: From General Purpose to a Proof of Information Flow Enforcement, T. Murray, et al., IEEE SP 2013. |
Thurs. 4/3 | Hypervisor as TCB | TrustVisor: Efficient TCB Reduction and Attestation, J.M. McCune, et al., IEEE SP 2010. |
Tues. 4/8 | Trusted Path | Building Verifiable Trusted Path on Commodity x86 Computers, Z. Zhou, V.D. Gligor, J. Newsome, J.M. McCune, IEEE SP 2012. |
Thurs. 4/10 | Hardware Design | FANCI:
Identification of Stealthy Malicious Logic Using Boolean Functional
Analysis, A. Waksman, M. Suozzo, S. Sethumadhavan, CCS 2013. Background (no written synopsis required): Defeating UCI: Building Stealthy and Malicious Hardware, C. Sturton, M. Hicks, D. Wagner, S.T. King, IEEE SP 2011. |
Tues. 4/15 | Authentication | The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes, J. Bonneau, C. Herley, P.C. van Oorschot, F. Stajano, IEEE SP 2012. |
Thurs. 4/17 | Malware | Measuring Pay-per-Install: The Commoditization of Malware Distribution, J. Caballero, C. Grier, C. Kreibich, V. Paxson, USENIX Security 2011. |
Tues. 4/22 | Security Review: Electronic Voting | Security Analysis of the Diebold AccuVote-TS Voting Machine, A.J. Feldman, J.A. Halderman, E.W. Felten, EVT 2007. |
Thurs. 4/24 | Presentations | Please fill out the online Carolina Course Evaluation. Bring your laptops to class; we will end early so you can complete the evaluation during class time. |
Fri. 4/25 | No class | Final project reports due by 11:59 PM. |