Mon, Wed, (Fri) at 13:00–15:00, room H.204
Professor:
Sotiris Ioannidis <sotiris@ics.forth.gr>
Teaching assistant:
Lazaros Koromilas <koromil@csd.uoc.gr>
Subscribe to the mailing list:
echo subscribe hy557-list | mail majordomo@csd.uoc.gr
Past semesters:
All students are going to present some papers. Presentations are booked through the mailing list in a first come first served basis. The current schedule follows.
Topic | Date | Title | Name |
---|---|---|---|
General | 2013-10-07 Mon |
Introduction to Secure Systems | koromil |
Mobile Security | 2013-10-11 Fri |
Securing Embedded User Interfaces: Android and Beyond | papoulas |
Mobile Security | 2013-10-14 Mon |
Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies | nikpapac |
Mobile Security | 2013-10-16 Wed |
Jekyll on iOS: When Benign Apps Become Evil | japostol |
Web Security | 2013-10-18 Fri |
Revolver: An Automated Approach to the Detection of Evasive Web-based Malware | hdiakos |
Web Security | 2013-10-25 Fri |
Language-based Defenses Against Untrusted Browser Origins | ninidak |
Systems Security | 2013-10-30 Wed |
Fides: Selectively Hardening Software Application Components against Kernel-level or Process-level Malware | tzikoulis |
Systems Security | 2013-11-01 Fri |
A Software-Hardware Architecture for Self-Protecting Data | rapousis |
Systems Security | 2013-11-04 Mon |
Vigilare: Toward Snoop-based Kernel Integrity Monitor | deyannis |
Information Flow | 2013-11-06 Wed |
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically | nikpapac |
Hardware Security | 2013-11-13 Wed |
Defeating UCI: Building Stealthy and Malicious Hardware | aglenis |
Hardware Security | 2013-11-15 Fri |
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing | michath |
Control Flow | 2013-11-18 Mon |
Control-Flow Integrity Principles, Implementations, and Applications | diamant |
Control Flow | 2013-11-20 Wed |
Practical Control Flow Integrity & Randomization for Binary Executables | tsirant |
Information Flow | 2013-11-25 Mon |
ShadowReplica: Efficient Parallelization of Dynamic Data Flow Tracking | christou |
Hardware Security | 2013-11-27 Wed |
FANCI: Identification of Stealthy Malicious Logic Using Boolean Functional Analysis | lutsetis |
Hardware Security | 2013-12-02 Mon |
Low-Fat Pointers: Compact Encoding and Efficient Gate-Level Implementation of Fat Pointers for Spatial Safety and Capability-based Security | aglenis |
Hardware Security | 2013-12-04 Wed |
Security Analysis of Integrated Circuit Camouflaging | samatas |
Digital Currency | 2013-12-09 Mon |
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names | hdiakos |
Runtime Analysis | 2013-12-11 Wed |
Lightweight Memory Tracing | japostol |
Mobile Security | 2013-12-16 Mon |
Mobile Malware Detection Based on Energy Fingerprints - A Dead End? | diamant |
Process Isolation | 2013-12-18 Wed |
Practical and Effective Sandboxing for Non-root Users | rapousis |
Process Isolation | 2014-01-08 Wed |
How to Run POSIX Apps in a Minimal Picoprocess | ninidak |
Hardware Security | 2014-01-13 Mon |
Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base | samatas |
KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object | deyannis | ||
Large-Scale Systems | 2014-01-15 Wed |
Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse | papoulas |
Impression Fraud in On-line Advertising via Pay-Per-View Networks | lutsetis | ||
Large-Scale Systems | 2014-01-17 Fri |
The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions | tzikoulis |
You Are How You Click: Clickstream Analysis for Sybil Detection | tsirant | ||
Large-Scale Systems | 2014-01-20 Mon |
Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness | christou |
An Empirical Study of Vulnerability Rewards Programs | michath |