CS557 - Secure Systems
Fall 2009
Prof. Sotiris Ioannidis, sotiris [at] ics.forth.gr
TA: Spyros Ligouras, ligouras [at] csd.uoc.gr
hy557 [at] csd.uoc.gr
hy557-list [at] csd.uoc.gr
All students are kindly requested to subscribe to the mailing list and book a presentation as soon
as possible. Presentation schedule is as follows.
(Last update: November 27, 2009)
Legend: Green denotes paper presentation dates, Blue denotes project presentation dates
Topic Date Paper Presenter
Secure Systems - What it's all about 21/9
– Introduction –
si
– Introduction –
si
Memory Safety
23/9
Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs gessiou
NOZZLE: A Defense Against Heap-spraying Code Injection Attacks petsas
Network Security
28/9
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine kondax
Locating Prefix Hijackers using LOCK alvanos
JavaScript Security
30/9
GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code zarras
Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense ** will be rescheduled ** sfakiana
National Elections 5/10
– No class –
 
– No class –
 
Attacks on Privacy I
7/10
Compromising Electromagnetic Emanations of Wired and Wireless Keyboards fnikol
Keystroke Eavesdropping on Multi-User Systems tsikudis
Securing Web Apps
12/10
xBook: Redesigning Privacy Control in Social Networking Platforms tzermias
Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications sebolani
Applied Crypto
14/10
Vanish: Increasing Data Privacy with Self-Destructing Data kondax
VPriv: Protecting Privacy in Location-Based Vehicular Services sfakiana
Attacks on Privacy II
19/10
Compromising Anonymity Using Packet Spinning sfakiana
A Practical Congestion Attack on Tor Using Long Paths petsas
Cloud Security I
21/10
Ripley: Automatically Securing Web 2.0 Applications Through Replicated Execution zarras
HAIL: A High-Availability and Integrity Layer for Cloud Storage alvanos
Cloud Security II
26/10
Hey, You, Get Off My Cloud! Exploring Information Leakage in Third- Party Compute Clouds gessiou
Dynamic Provable Data Possession fnikol
National Holiday 28/10
– No class –
 
– No class –
 
Project-status Presentations I
2/11
IRILP: an Information Retrieval based method for Information Leak Prevention gessiou
Accelerating Privacy Preserving Operations using Graphics Hardware tzermias
Building clouds with web browsers petsas
Project-status Presentations I
4/11
A Privacy-Preserving data analytics Primitive for a Multi-tenant Cloud Store kondax
Building a Secure Web Service sebolani
Internet Censorship Monitoring sfakiana
Project-status Presentations I
9/11
CPU x86 processor emulator running on Google zarras
High-speed Intrusion Detection tsikudis
A secure peer-to-peer distributed system with a web front-end alvanos & fnikol
Holiday - St. Minas 11/11
– No class –
 
– No class –
 
Attacks
16/11
ClearShot: Eavesdropping Keyboard Input from Video tsikoudis
Compromising Reflections -or- How to Read LCD Monitors Around the Corner sebolani
Malware
18/11
Exploring Multiple Execution Paths for Malware Analysis kondax
BitScope: Automatically Dissecting Malicious Binaries petsas
Rootkits
23/11
Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing fnikol
Countering Persistent Kernel Rootkits Through Systematic Hook Discovery tzermias
Bots
25/11
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation alvanos
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection tzermias
SPAM
30/11
Spamscatter: Characterizing Internet Scam Hosting Infrastructure zarras
On the Spam Campaign Trail sebolani
Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense (rescheduled) sfakiana
Phishing
2/12
Modeling and Preventing Phishing Attacks tsikoudis
Designing and Conducting Phishing Experiments gessiou
Project-status Presentations II
7/12
Building clouds with web browsers petsas
   
Project-status Presentations II
9/12
A Privacy-Preserving data analytics Primitive for a Multi-tenant Cloud Store kondax
Accelerating Privacy Preserving Operations using Graphics Hardware tzermias
Project-status Presentations II
14/12
A secure peer-to-peer distributed system with a web front-end alvanos & fnikol
High-speed Intrusion Detection tsikudis
Project-status Presentations II
16/12
IRILP: an Information Retrieval based method for Information Leak Prevention gessiou
Building a Secure Web Service sebolani
CPU processor emulator running on Google zarras

Valid XHTML 1.0 Transitional Valid CSS!