Secure Systems - What it's all about |
26/9 |
Introduction |
sotiris |
Secure Systems - What it's all about |
28/9 |
Introduction |
sotiris |
Csrf |
3/10 |
Robust Defenses for Cross-Site Request Forgery |
chinis |
Worms |
5/10 |
History of worm development |
sotiris |
Forensics |
10/10 |
Forensic Triage for Mobile Phones with DEC0DE |
metalidis |
Spamming |
12/10 |
Click Trajectories: End-to-End Analysis of the Spam Value Chain |
mylonak |
Malware detection |
17/10 |
SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks |
kpaliouras |
Botnets |
19/10 |
BOTMAGNIFIER: Locating Spambots on the Internet |
hassapis |
General |
24/10 |
Discussion: ICT in India |
sotiris |
Internet Security |
26/10 |
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis |
gavalet |
Internet Security |
31/10 |
Losing Control of the Internet: Using the Data Plane to Attack the Control Plane |
dstamat |
Botnets |
2/11 |
JACKSTRAWS: Picking Command and Control Connections from Bot Traffic |
grammatik |
Operating Systems |
7/11 |
Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions |
mylonak |
Operating Systems |
9/11 |
Efficient Monitoring of Untrusted Kernel-Mode Execution |
kosifidis |
Information Flow |
14/11 |
Towards Static Flow-Based Declassification for Legacy and Untrusted Programs |
metallidis |
Honeypots |
16/11 |
Discussion: Polymorphic and metamorphic malware |
sotiris |
Privacy |
21/11 |
Efficient Privacy-Preserving Biometric Identification |
hassapis |
Discussion |
28/11 |
Project Introduction |
sotiris |
Cloud |
30/11 |
Enabling Security in Cloud Storage SLAs with CloudProof |
dstamat |
Testing |
5/12 |
Usability Testing a Malware-Resistant Input Mechanism |
gavalet |
CSRF |
7/12 |
A Server- and Browser-Transparent CSRF Defense for Web 2.0 Applications |
mylonak |