Schedule

Date Topic Reading
Thur. 1/9 Security Concepts No written synopsis required. Complete the reading by 1/14:

How to Read a Paper, S. Keshav, University of Waterloo, 2013.
Writing reviews for systems conferences, Timothy Roscoe, ETH Zurich, 2007.
Tues. 1/14 Capabilities and Access Capsicum: Practical Capabilities for UNIX, R.N.M. Watson, J. Anderson, B. Laurie, K. Kennaway, USENIX Sec 2010.

Background (no written synopsis required):
The Confused Deputy: (or why capabilities might have been invented), N. Hardy, OSR 1988.
Thurs. 1/16 Privilege Separation Preventing Privilege Escalation, N. Provos, USENIX Sec 2002.
Tues. 1/21 Low-level SW Attacks & Defenses StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks, C. Cowan, USENIX Sec 1998.

Background (no written synopsis required):
Smashing The Stack For Fun And Profit, Aleph One, Phrack 1996.
Basic Integer Overflows, blexim, Phrack 2002.
Exploiting Format String Vulnerabilities, scut / team teso, 2001.
Thurs. 1/23 Low-level SW Attacks & Defenses The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86), H. Shacham, CCS 2007.
Tues. 1/28 Class Canceled

Thurs. 1/30 Inline Reference Monitor Project proposals due.

A Secure Environment for Untrusted Helper Applications (Confining the Wily Hacker), I. Goldberg, D. Wagner, R. Thomas, E. Brewer, USENIX Sec 1996.
Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools, T. Garfinkel, NDSS 2003.
Tues. 2/4 Sandboxing Efficient Software-based Fault Isolation, R. Wahbe, S. Lucco, T.E. Anderson, S.L. Graham, SOSP 1993.
Thurs. 2/6 Sandboxing First security review due.

Native Client: A Sandbox for Portable, Untrusted x86 Native Code, Yee et al., IEEE S&P 2009.
Tues. 2/11 Control-Flow Integrity Control-Flow Integrity Principles, Implementations, and Applications, M. Abadi, M. Budiu, U. Erlingsson, J. Ligatti, CCS 2005.
Thurs. 2/13 Snow day: class canceled.

Guest Lecture by
Yinqian Zhang
"Security Threats and Defenses in Multi-Tenant Public Clouds---A Side-Channel Security Perspective"

Background (no written synopsis required):
Cross-VM Side Channels and Their Use to Extract Private Keys, Y. Zhang, et al., CCS 2012.
HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis, Y. Zhang, et al., IEEE S&P 2011.
Tues. 2/18 Guest Lecture by
Robby Cochran
"Verification of Client Behavior in Distributed Applications"

Background (no written synopsis required):
Server-side Verification of Client Behavior in Online Games, D. Bethea, R.A. Cochran, M.K. Reiter, TISSEC 2011.
Thurs. 2/20 Browser Security The Multi-Principal OS Construction of the Gazelle Web Browser, H.J. Wang, et al., USENIX Sec 2009.
The Security Architecture of the Chromium Browser, A. Barth et al., TR 2008.
Tues. 2/25 Browser Security Verified Security for Browser Extensions, A. Guha, M. Fredrikson, B. Livshits, N. Swamy, IEEE S&P 2011.
VEX: Vetting Browser Extensions for Security Vulnerabilities, S. Bandhakavi, S.T. King, P. Madhusudan, M. Winslett, USENIX Sec 2010.
Thurs. 2/27 Static Analysis A System and Language for Building System-Specific, Static Analyses, S. Hallem, B. Chelf, Y. Xie, D. Engler, PLDI 2002.

Additional reading (no synopsis required):
A Few Billion Lines of Code Later: Using Static Analysis to Find Bugs in the Real World, A. Bessey, et al. CACM 2010.
Tues. 3/4 Dynamic Analysis Purify: Fast Detection of Memory Leaks and Access Errors, R. Hastings, B. Joyce, USENIX 1992.
Thurs. 3/6 Information Flow TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones, W. Enck, et al. OSDI 2010.
PiOS: Detecting Privacy Leaks in iOS Applications, M. Egele, C. Kruegel, E. Kirda, G. Vigna, NDSS 2011.
Tues. 3/11 No class Spring Break.
Thurs. 3/13 No class Spring Break.
Tues. 3/18 New:
Guest Lecture by
Yinqian Zhang
Second security review due.
Project status report due.

"Security Threats and Defenses in Multi-Tenant Public Clouds---A Side-Channel Security Perspective"

Background (no written synopsis required):
Cross-VM Side Channels and Their Use to Extract Private Keys, Y. Zhang, et al., CCS 2012.
HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis, Y. Zhang, et al., IEEE S&P 2011.
Thurs. 3/20 Symbolic Execution FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution, D. Davidson, B. Moench, S. Jha, T. Ristenpart, USENIX Security 2013.
Tues. 3/25 Software Verification Modular Verification of Software Components in C, S. Chaki, et al. ICSE 2003.
Thurs. 3/27 Web Security Toward Automated Detection of Logic Vulnerabilities in Web Applications, V. Felmetsger, L. Cavedon, C. Kruegel, G. Vigna, USENIX Security 2010.
Tues. 4/1 OS Security seL4: From General Purpose to a Proof of Information Flow Enforcement, T. Murray, et al., IEEE SP 2013.
Thurs. 4/3 Hypervisor as TCB TrustVisor: Efficient TCB Reduction and Attestation, J.M. McCune, et al., IEEE SP 2010.
Tues. 4/8 Trusted Path Building Verifiable Trusted Path on Commodity x86 Computers, Z. Zhou, V.D. Gligor, J. Newsome, J.M. McCune, IEEE SP 2012.
Thurs. 4/10 Hardware Design FANCI: Identification of Stealthy Malicious Logic Using Boolean Functional Analysis, A. Waksman, M. Suozzo, S. Sethumadhavan, CCS 2013.

Background (no written synopsis required):
Defeating UCI: Building Stealthy and Malicious Hardware, C. Sturton, M. Hicks, D. Wagner, S.T. King, IEEE SP 2011.
Tues. 4/15 Authentication The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes, J. Bonneau, C. Herley, P.C. van Oorschot, F. Stajano, IEEE SP 2012.
Thurs. 4/17 Malware Measuring Pay-per-Install: The Commoditization of Malware Distribution, J. Caballero, C. Grier, C. Kreibich, V. Paxson, USENIX Security 2011.
Tues. 4/22 Security Review: Electronic Voting Security Analysis of the Diebold AccuVote-TS Voting Machine, A.J. Feldman, J.A. Halderman, E.W. Felten, EVT 2007.
Thurs. 4/24 Presentations Please fill out the online Carolina Course Evaluation. Bring your laptops to class; we will end early so you can complete the evaluation during class time.
Fri. 4/25 No class Final project reports due by 11:59 PM.