Schedule

Date Topic Reading
Tues. 8/19 Intro None.
Thurs. 8/21 USENIX Security Conference No class.
Tues. 8/26 Propositional Logic None.
Thurs. 8/28 Predicate Logic None.
Tues. 9/2 Temporal Logic None.
Thurs. 9/4 Temporal Logic No written synopsis required.

How to Read a Paper, S. Keshav, University of Waterloo, 2013.
Writing reviews for systems conferences, Timothy Roscoe, ETH Zurich, 2007.
Tues. 9/9 Security Protocols Automated Analysis of Cryptographic Protocols using Murphi, J. C. Mitchell, M. Mitchell, U. Stern, IEEE S&P, 1997.

Background reading (no written synopsis required):
An Attack on the Needham-Schroeder Public-Key Authentication Protocol, Gavin Lowe, Information Processing Letters, 1995.
Thurs. 9/11 Security Protocols ASPIER: An Automated Framework for Verifying Security Protocol Implementations, S. Chaki, A. Datta, IEEE CSF, 2009.
Tues. 9/16 Secure Kernels Design and Verification of Secure Systems, J. Rushby, ACM SOSP, 1981.
Thurs. 9/18 Secure Kernels Verifying the EROS Confinement Mechanism, J. S. Shapiro, S. Weber, IEEE S&P, 2000.

Further reading:
Capsicum: practical capabilities for UNIX.
Tues. 9/23 Individual Group Meetings No reading.
Thurs. 9/25 Guest Lecture by
Robby Cochran
"Verification of Client Behavior in Distributed Applications"

Background (no written synopsis required):
Server-side Verification of Client Behavior in Online Games, D. Bethea, R.A. Cochran, M.K. Reiter, TISSEC 2011.
Tues. 9/30 Secure Kernels seL4: Formal Verification of an OS Kernel, G. Klein et al., ACM SOSP, 2009.

Presentation by Gernot Heiser:
Making Trusted Systems Trustworthy, G. Heiser, Nano-Terra/Artist Summer School 2013.
Thurs. 10/2 Secure Kernels seL4: from General Purpose to a Proof of Information Flow Enforcement, T. Murray, et al., IEEE S&P, 2013.
Tues. 10/7 Hypervisors Project proposals due.

Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework, A.Vasudevan, et al., IEEE S&P, 2013.
Thurs. 10/9 Mobile OS Verifying Security Invariants in ExpressOS, H. Mai et al., ASPLOS, 2013.
Tues. 10/14 SW Model Checking Model Checking One Million Lines of C Code, H. Chen, D. Dean, D. Wagner, NDSS, 2004.

Background reading (no written synopsis required):
MOPS: An Infrastructure for Examining Security Properties of Software, H. Chen, D. Wagner, CCS, 2002.
Thurs. 10/16 Fall Break No class.
Tues. 10/21 SW Model Checking Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size, J. Franklin et al., IEEE S&P, 2010.
Thurs. 10/23 SW Model Checking Verification with Small and Short Worlds, R. Sinha, et al. FMCAD, 2012.
Tues. 10/28 SW Model Checking Automatically Validating Temproal Safety Properties of Interfaces, T. Ball, S. K. Rajamani, SPIN, 2001.
Thurs. 10/30 Verified sandbox Evaluating SFI for a CISC Architecture, S. McCamant, G. Morrisett, USENIX Security, 2006.

Background reading (no written synopsis required):
Efficient Software-Based Fault Isolation, R. Wahbe, S. Lucco, T. E. Anderson, S. L. Graham, SOSP, 1993.
Tues. 11/4 Symbolic Execution Unleashing Mayhem on Binary Code, S. Cha, et al., IEEE S&P, 2012.
Thurs. 11/6 Symbolic execution FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution, D. Davidson, B. Moench, S. Jha, T. Ristenpart, USENIX Security, 2013.
Tues. 11/11 Web Security Towards a Formal Foundation of Web Security, D. Akhawe, et al., IEEE CSF, 2010.
Thurs. 11/13 Web Security Discovering Concrete Attacks on Website Authorization by Formal Analysis, C. Bansal, K. Bhargavan, S. Maffeis, IEEE CSF, 2012.
Tues. 11/18 Privacy Privacy and Contextual Integrity: Framework and Applications, A. Barth, et al., IEEE S&P, 2006.
Thurs. 11/20 Privacy Monitoring security policies with metric first-order temporal logic, D. Basin, F. Klaedtke, S. Muller, ACM SACMAT, 2010.
Tues. 11/25 ModelsExtracting Models of Security-Sensitive Operations using String-Enhanced White-Box Exploratoin on Binaries, J. Caballero, S. McCamant, A. Barth, D. Song, TR UC Berkeley, 2009.

Background reading (no synopsis required):
Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves, A. Barth, J. Caballero, D. Song, IEEE S&P, 2009.
Thurs. 11/27 Thanksgiving No class.
Tues. 12/2 Presentations Please fill out the online Carolina Course Evaluation. Bring your laptops to class; we will end early so you can complete the evaluation during class time.
Thurs. 12/4 Reading Day No class.
Thurs. 12/11 Final project No class. Final project reports due by 11:59 PM.