Topic | Date | Paper | Presenter |
Secure Systems - What it's all about | 21/9 | – Introduction – |
si |
– Introduction – |
si | ||
Memory Safety | 23/9 |
Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs | gessiou |
NOZZLE: A Defense Against Heap-spraying Code Injection Attacks | petsas | ||
Network Security | 28/9 |
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine | kondax |
Locating Prefix Hijackers using LOCK | alvanos | ||
JavaScript Security | 30/9 |
GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code | zarras |
Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense ** will be rescheduled ** | sfakiana | ||
National Elections | 5/10 | – No class – |
|
– No class – |
|||
Attacks on Privacy I | 7/10 |
Compromising Electromagnetic Emanations of Wired and Wireless Keyboards | fnikol |
Keystroke Eavesdropping on Multi-User Systems | tsikudis | ||
Securing Web Apps | 12/10 |
xBook: Redesigning Privacy Control in Social Networking Platforms | tzermias |
Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications | sebolani | ||
Applied Crypto | 14/10 |
Vanish: Increasing Data Privacy with Self-Destructing Data | kondax |
VPriv: Protecting Privacy in Location-Based Vehicular Services | sfakiana | ||
Attacks on Privacy II | 19/10 |
Compromising Anonymity Using Packet Spinning | sfakiana |
A Practical Congestion Attack on Tor Using Long Paths | petsas | ||
Cloud Security I | 21/10 |
Ripley: Automatically Securing Web 2.0 Applications Through Replicated Execution | zarras |
HAIL: A High-Availability and Integrity Layer for Cloud Storage | alvanos | ||
Cloud Security II | 26/10 |
Hey, You, Get Off My Cloud! Exploring Information Leakage in Third- Party Compute Clouds | gessiou |
Dynamic Provable Data Possession | fnikol | ||
National Holiday | 28/10 | – No class – |
|
– No class – |
|||
Project-status Presentations I | 2/11 |
IRILP: an Information Retrieval based method for Information Leak Prevention | gessiou |
Accelerating Privacy Preserving Operations using Graphics Hardware | tzermias | ||
Building clouds with web browsers | petsas | ||
Project-status Presentations I | 4/11 |
A Privacy-Preserving data analytics Primitive for a Multi-tenant Cloud Store | kondax |
Building a Secure Web Service | sebolani | ||
Internet Censorship Monitoring | sfakiana | ||
Project-status Presentations I | 9/11 |
CPU x86 processor emulator running on Google | zarras |
High-speed Intrusion Detection | tsikudis | ||
A secure peer-to-peer distributed system with a web front-end | alvanos & fnikol | ||
Holiday - St. Minas | 11/11 | – No class – |
|
– No class – |
|||
Attacks | 16/11 |
ClearShot: Eavesdropping Keyboard Input from Video | tsikoudis |
Compromising Reflections -or- How to Read LCD Monitors Around the Corner | sebolani | ||
Malware | 18/11 |
Exploring Multiple Execution Paths for Malware Analysis | kondax |
BitScope: Automatically Dissecting Malicious Binaries | petsas | ||
Rootkits | 23/11 |
Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing | fnikol |
Countering Persistent Kernel Rootkits Through Systematic Hook Discovery | tzermias | ||
Bots | 25/11 |
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation | alvanos |
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection | tzermias | ||
SPAM | 30/11 |
Spamscatter: Characterizing Internet Scam Hosting Infrastructure | zarras |
On the Spam Campaign Trail | sebolani | ||
Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense (rescheduled) | sfakiana | ||
Phishing | 2/12 |
Modeling and Preventing Phishing Attacks | tsikoudis |
Designing and Conducting Phishing Experiments | gessiou | ||
Project-status Presentations II | 7/12 |
Building clouds with web browsers | petsas |
Project-status Presentations II | 9/12 |
A Privacy-Preserving data analytics Primitive for a Multi-tenant Cloud Store | kondax |
Accelerating Privacy Preserving Operations using Graphics Hardware | tzermias | ||
Project-status Presentations II | 14/12 |
A secure peer-to-peer distributed system with a web front-end | alvanos & fnikol |
High-speed Intrusion Detection | tsikudis | ||
Project-status Presentations II | 16/12 |
IRILP: an Information Retrieval based method for Information Leak Prevention | gessiou |
Building a Secure Web Service | sebolani | ||
CPU processor emulator running on Google | zarras |