Secure Systems

Mon, Wed, (Fri) at 13:00–15:00, room H.204

Professor:

Sotiris Ioannidis <sotiris@ics.forth.gr>

Teaching assistant:

Lazaros Koromilas <koromil@csd.uoc.gr>

Subscribe to the mailing list:

echo subscribe hy557-list | mail majordomo@csd.uoc.gr

Past semesters:

All students are going to present some papers. Presentations are booked through the mailing list in a first come first served basis. The current schedule follows.

Topic Date Title Name
General 2013-10-07
Mon
Introduction to Secure Systems koromil
Mobile Security 2013-10-11
Fri
Securing Embedded User Interfaces: Android and Beyond papoulas
Mobile Security 2013-10-14
Mon
Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies nikpapac
Mobile Security 2013-10-16
Wed
Jekyll on iOS: When Benign Apps Become Evil japostol
Web Security 2013-10-18
Fri
Revolver: An Automated Approach to the Detection of Evasive Web-based Malware hdiakos
Web Security 2013-10-25
Fri
Language-based Defenses Against Untrusted Browser Origins ninidak
Systems Security 2013-10-30
Wed
Fides: Selectively Hardening Software Application Components against Kernel-level or Process-level Malware tzikoulis
Systems Security 2013-11-01
Fri
A Software-Hardware Architecture for Self-Protecting Data rapousis
Systems Security 2013-11-04
Mon
Vigilare: Toward Snoop-based Kernel Integrity Monitor deyannis
Information Flow 2013-11-06
Wed
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically nikpapac
Hardware Security 2013-11-13
Wed
Defeating UCI: Building Stealthy and Malicious Hardware aglenis
Hardware Security 2013-11-15
Fri
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing michath
Control Flow 2013-11-18
Mon
Control-Flow Integrity Principles, Implementations, and Applications diamant
Control Flow 2013-11-20
Wed
Practical Control Flow Integrity & Randomization for Binary Executables tsirant
Information Flow 2013-11-25
Mon
ShadowReplica: Ef´Čücient Parallelization of Dynamic Data Flow Tracking christou
Hardware Security 2013-11-27
Wed
FANCI: Identification of Stealthy Malicious Logic Using Boolean Functional Analysis lutsetis
Hardware Security 2013-12-02
Mon
Low-Fat Pointers: Compact Encoding and Efficient Gate-Level Implementation of Fat Pointers for Spatial Safety and Capability-based Security aglenis
Hardware Security 2013-12-04
Wed
Security Analysis of Integrated Circuit Camouflaging samatas
Digital Currency 2013-12-09
Mon
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names hdiakos
Runtime Analysis 2013-12-11
Wed
Lightweight Memory Tracing japostol
Mobile Security 2013-12-16
Mon
Mobile Malware Detection Based on Energy Fingerprints - A Dead End? diamant
Process Isolation 2013-12-18
Wed
Practical and Effective Sandboxing for Non-root Users rapousis
Process Isolation 2014-01-08
Wed
How to Run POSIX Apps in a Minimal Picoprocess ninidak
Hardware Security 2014-01-13
Mon
Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base samatas
KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object deyannis
Large-Scale Systems 2014-01-15
Wed
Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse papoulas
Impression Fraud in On-line Advertising via Pay-Per-View Networks lutsetis
Large-Scale Systems 2014-01-17
Fri
The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions tzikoulis
You Are How You Click: Clickstream Analysis for Sybil Detection tsirant
Large-Scale Systems 2014-01-20
Mon
Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness christou
An Empirical Study of Vulnerability Rewards Programs michath