| Topic | Date | Paper | Presenter |
| Secure Systems - What it's all about | 21/9 | – Introduction – |
si |
– Introduction – |
si | ||
| Memory Safety | 23/9 |
Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs | gessiou |
| NOZZLE: A Defense Against Heap-spraying Code Injection Attacks | petsas | ||
| Network Security | 28/9 |
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine | kondax |
| Locating Prefix Hijackers using LOCK | alvanos | ||
| JavaScript Security | 30/9 |
GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code | zarras |
| Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense ** will be rescheduled ** | sfakiana | ||
| National Elections | 5/10 | – No class – |
|
– No class – |
|||
| Attacks on Privacy I | 7/10 |
Compromising Electromagnetic Emanations of Wired and Wireless Keyboards | fnikol |
| Keystroke Eavesdropping on Multi-User Systems | tsikudis | ||
| Securing Web Apps | 12/10 |
xBook: Redesigning Privacy Control in Social Networking Platforms | tzermias |
| Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications | sebolani | ||
| Applied Crypto | 14/10 |
Vanish: Increasing Data Privacy with Self-Destructing Data | kondax |
| VPriv: Protecting Privacy in Location-Based Vehicular Services | sfakiana | ||
| Attacks on Privacy II | 19/10 |
Compromising Anonymity Using Packet Spinning | sfakiana |
| A Practical Congestion Attack on Tor Using Long Paths | petsas | ||
| Cloud Security I | 21/10 |
Ripley: Automatically Securing Web 2.0 Applications Through Replicated Execution | zarras |
| HAIL: A High-Availability and Integrity Layer for Cloud Storage | alvanos | ||
| Cloud Security II | 26/10 |
Hey, You, Get Off My Cloud! Exploring Information Leakage in Third- Party Compute Clouds | gessiou |
| Dynamic Provable Data Possession | fnikol | ||
| National Holiday | 28/10 | – No class – |
|
– No class – |
|||
| Project-status Presentations I | 2/11 |
IRILP: an Information Retrieval based method for Information Leak Prevention | gessiou |
| Accelerating Privacy Preserving Operations using Graphics Hardware | tzermias | ||
| Building clouds with web browsers | petsas | ||
| Project-status Presentations I | 4/11 |
A Privacy-Preserving data analytics Primitive for a Multi-tenant Cloud Store | kondax |
| Building a Secure Web Service | sebolani | ||
| Internet Censorship Monitoring | sfakiana | ||
| Project-status Presentations I | 9/11 |
CPU x86 processor emulator running on Google | zarras |
| High-speed Intrusion Detection | tsikudis | ||
| A secure peer-to-peer distributed system with a web front-end | alvanos & fnikol | ||
| Holiday - St. Minas | 11/11 | – No class – |
|
– No class – |
|||
| Attacks | 16/11 |
ClearShot: Eavesdropping Keyboard Input from Video | tsikoudis |
| Compromising Reflections -or- How to Read LCD Monitors Around the Corner | sebolani | ||
| Malware | 18/11 |
Exploring Multiple Execution Paths for Malware Analysis | kondax |
| BitScope: Automatically Dissecting Malicious Binaries | petsas | ||
| Rootkits | 23/11 |
Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing | fnikol |
| Countering Persistent Kernel Rootkits Through Systematic Hook Discovery | tzermias | ||
| Bots | 25/11 |
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation | alvanos |
| BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection | tzermias | ||
| SPAM | 30/11 |
Spamscatter: Characterizing Internet Scam Hosting Infrastructure | zarras |
| On the Spam Campaign Trail | sebolani | ||
| Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense (rescheduled) | sfakiana | ||
| Phishing | 2/12 |
Modeling and Preventing Phishing Attacks | tsikoudis |
| Designing and Conducting Phishing Experiments | gessiou | ||
| Project-status Presentations II | 7/12 |
Building clouds with web browsers | petsas |
| Project-status Presentations II | 9/12 |
A Privacy-Preserving data analytics Primitive for a Multi-tenant Cloud Store | kondax |
| Accelerating Privacy Preserving Operations using Graphics Hardware | tzermias | ||
| Project-status Presentations II | 14/12 |
A secure peer-to-peer distributed system with a web front-end | alvanos & fnikol |
| High-speed Intrusion Detection | tsikudis | ||
| Project-status Presentations II | 16/12 |
IRILP: an Information Retrieval based method for Information Leak Prevention | gessiou |
| Building a Secure Web Service | sebolani | ||
| CPU processor emulator running on Google | zarras |