CS-558 INTERNET SYSTEMS
AND TECHNOLOGIES

Spring 2022

The course will cover papers which deal with Internet Systems and Technologies. We will cover subjects related to networks, security, privacy, etc.

Date

Topic

 

Presenter

15/2

Introduction

Introduction

22/2

Deployment

Saltzer, Jerome H., David P. Reed, and David D. Clark. End-to-end arguments in system design. ACM Transactions on Computer Systems (TOCS) 2.4 (1984): 277-288.

24/2

Trust

K. Thomson: Reflections on Trusting Trust (Turing Award Lecture)

1/3

Passwords

Georgios Kontaxis, Elias Athanasopoulos, Georgios Portokalidis, and Angelos D. Keromytis. SAuth: protecting user accounts from password database leaks. CCS '13.

3/3

Passwords

Juels, Ari, and Ronald L. Rivest. Honeywords: Making password-cracking detectable. Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. 2013.

8/3

Passwords

Wang, Ke Coby, and Michael K. Reiter. Using amnesia to detect credential database breaches. 30th USENIX Security Symposium (USENIX Security 21). 2021.

10/3

Privacy Leaks

Kellaris, Georgios, et al. Generic attacks on secure outsourced databases. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016.

22/3

Passwords

Gelernter, Nethanel & Kalma, Senia & Magnezi, Bar & Porcilan, Hen. (2017). The Password Reset MitM Attack. 251-267. 10.1109/SP.2017.9.

Marios Gavaletakis

24/3

DoS attacks

Angelos D. Keromytis, Vishal Misra, and Dan Rubenstein. 2002. SOS: secure overlay services. In Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM '02).

Andreas Theofanous

29/3

Passwords

Cappos, J., & Torres, S. (2014). PolyPasswordHasher: protecting passwords in the event of a password file disclosure. Dept. Comput. Sci. Eng., New York University, New York, NY, USA, Rep. TR-CSE-2013-02.

Paschalis Bekos

31/3

Invited Talk – Iason Polakis, UIC

Xu Lin, Panagiotis Ilia, Saumya Solanki, and Jason Polakis, Phish in Sheep’s Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting. USENIX Security 2022

Invited Talk

5/4

Audit

Invited Talk – Kostas Chalkias, Facebook

Ji, Yan, and Konstantinos Chalkias. Generalized Proof of Liabilities. Cryptology ePrint Archive (2021).

Invited Talk

7/4

Invited Talk – Alexandros Kapravelos, NCSU

Jueckstock, Jordan, and Alexandros Kapravelos. Visiblev8: In-browser monitoring of javascript in the wild. Proceedings of the Internet Measurement Conference. 2019

Invited Talk

12/4

Privacy

Invited Talk – Spyros Antonatos, Aegis

Sweeney, Latanya. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10, no. 05 (2002): 557-570.

Invited Talk

[slides]

14/4

Attack surface reduction

Invited Talk – Michalis Polychronakis, Stony Brook

Defending against Memory Corruption and Transient Execution Attacks

Invited talk

3/5

Baggy bounds

Periklis Akritidis, Manuel Costa, Miguel Castro, and Steven Hand. 2009. Baggy bounds checking: an efficient and backwards-compatible defense against out-of-bounds errors. USENIX Security 2009

Kostantinos Elaftheriou

5/5

DoS attacks

Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson. Practical Network Support for IP Traceback. In Proceedings of the 2000 ACM SIGCOMM Conference, pages 295--306, Stockholm, Sweden, August 2000

Eleftheria Plevridi

10/5

Mobile security

Elias P. Papadopoulos, Michalis Diamantaris, Panagiotis Papadopoulos, Thanasis Petsas, Sotiris Ioannidis, Evangelos P. Markatos. The Long-Standing Privacy Debate: Mobile Websites vs Mobile Apps. WWW 2017

Dionisis Kalochristianakis

10/5

Tracking

Papadogiannakis, E., Papadopoulos, P., Kourtellis, N., & Markatos, E. P. (2021, April). User tracking in the post-cookie era: How websites bypass gdpr consent to track users. In Proceedings of the Web Conference 2021 (pp. 2130-2141).

Giannis Arakas

19/5

Fake News

Who Funds Misinformation? A Systematic Analysis of the Ad-related Profit Routines of Fake News sites. Emmanouil Papadogiannakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis

Stratos Geronikolakis

19/5

Attacks

Singh, Sumeet, et al. Automated Worm Fingerprinting. OSDI. Vol. 4. 2004.

Evangelia Skouloudi

24/5

Dos Attacks

Moore, David, et al. Inferring internet denial-of-service activity. ACM Transactions on Computer Systems (TOCS) 24.2 (2006): 115-139.

Michail Raptakis

26/5

Security

Steven M. Bellovin. 2004. A Look Back at "Security Problems in the TCP/IP Protocol Suite". In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC '04).

Kostas Spiridakis


Requirements: each student has to give a lecture (one paper) and give a report on that paper.
Grades: Final exam: 80%, report: 10%, lecture: 10%. The final exam will be on the first paper of each date.