Date Reading Presenter
Thur
Jan. 12
How to Read a Paper, S. Keshav, University of Waterloo, 2013.
Writing reviews for systems conferences, Timothy Roscoe, ETH Zurich, 2007.

Properties and Specifications
Tue
Jan. 17
Recognizing Safety and Liveness, Alpern and Schneider, Distributed Computing 1987. C. Deutschbein
[notes]
Tue
Jan. 24
Hyperproperties, Clarkson and Schneider, JCS 2010. L. Barnett
[notes]
Thur
Jan. 26
Enforceable Security Properties, Schneider, TISSEC 2000. M. Brown
[notes]
Verification Techniques
Tue
Jan. 31
Symbolic Execution and Program Testing, King, CACM 1976. M. Nesfield
[notes]
Thur
Feb. 2
The Beginning of Model Checking: A Personal Perspective, Emerson, 2008. C. Griggs
[notes]
Information Flow
Tue
Feb. 7
Proof of Separability; A Verification Technique for a Class of Security Kernels,
Rushby, Int'l Symp. on Programming 1982.
A. Byrnes
[notes]
Thur
Feb. 9
Traveling

Tue
Feb. 14
seL4: Formal Verification of an OS Kernel, Klein et al., SOSP 2009. A. Wang
[notes]
Thur
Feb. 16
Compositional Information-Flow Security for Interactive Systems,
Rafnsson and Sabelfeld, CSF 2014.
J. Park
[notes]
Tue
Feb. 21
Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study,
Do, Kamburjan, and Wasser, POST 2016.
A. Byrnes
[notes]
Software Security
Thur
Feb. 23
Due: project proposals

Unleashing Mayhem on Binary Code, Cha et al., S&P 2012.
R. Zhang
[notes]
Tue
Feb. 28
Verification with Small and Short Worlds, Sinha et al., FMCAD 2012. J. Park
[notes]
Thur
Mar. 2
RockSalt: Better, Faster, Stronger SFI for the x86, Morrisett et al., PLDI 2012. M. Brown
[notes]
Tue
Mar. 7
Verifying Security Invariants in ExpressOS, Mai et al., ASPLOS 2013. A. Wang
[notes]
Thur
Mar. 9
FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution,
Davidson et al., USENIX Sec. 2013.
R. Zhang
[notes]
Tue
Mar. 14
Spring Break

Thur
Mar. 16
Spring Break

Tue
Mar. 21
Micro-Policies Formally Verified, Tag-Based Security Monitors,
Azevedo de Amorim et al., S&P 2015.
M. Hackett
[notes]
Thur
Mar. 23
A Logic of Programs with Interface-Confined Code, Jia et al., CSF 2015. F. Li
[notes]
Privacy
Tue
Mar. 28
PriCL: Creating a Precedent, a Framework for Reasoning about Privacy Case Law,
Backes et al., POST 2015.
C. Deutschbein
[notes]
Thur
Mar. 30
A Method for Verifying Privacy-Type Properties: The Unbounded Case,
Hirschi, Baelde and Delaune, S&P 2016.
L. Barnett
[notes]
Web and Protocols
Tue
Apr. 4
Automated Analysis of Cryptographic Protocols using Murphi,
Mitchell, Mitchell, and Stern, S&P 1997.
M. Nesfield
[notes]
Thur
Apr. 6
Towards a Formal Foundation of Web Security, Akhawe et al., CSF 2010. C. Griggs
[notes]
Tue
Apr. 11
Verification with Small and Short Worlds, Sinha et al., FMCAD 2012. J. Park
[notes]
Thur
Apr. 13
Traveling

Tue
Apr. 18
Discovering Concrete Attacks on Website Authorization by Formal Analysis,
Bansal, Bhargavan, and Maffeis, CSF 2012.
F. Li
[notes]
Thur
Apr. 20
A Comprehensive Formal Security Analysis of OAuth 2.0, Fett, Kusters, and Schmitz, CCS 2016. M. Hackett
[notes]
Presentations
Tue
Apr. 25
Groups 1--3

Thur
Apr. 27
Groups 4--5