Sotiris Ioannidis <sotiris@ics.forth.gr>
Teaching Assistant:
Lazaros Koromilas <koromil@csd.uoc.gr>
Subscribe to the mailing list:
echo subscribe hy557-list | mail majordomo@csd.uoc.gr
All students are going to present some papers. Presentations are booked through the mailing list in a first come first served basis. The current schedule follows.
Topic | Date | Title | Name |
---|---|---|---|
General | 2012-09-24 | Introduction to Secure Systems | sotiris |
Tainting Analysis | 2012-09-26 | Minemu: The World's Fastest Taint Tracker | loutsis |
Spam | 2012-10-01 | B@bel: Leveraging Email Delivery for Spam Mitigation | pgaref |
Online Ads | 2012-10-03 | PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs | panpap |
Privacy | 2012-10-08 | Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud | ladakis |
Trusted Computing | 2012-10-10 | Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services | mhortis |
Cellular Networks | 2012-10-15 | Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks | vervelak |
Cellular Networks | 2012-10-17 | SMS of death: from analyzing to attacking mobile phones on a large scale | jprokop |
Encrypted Storage | 2012-10-22 | Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory | trigirak |
Authentication | 2012-10-24 | Progressive Authentication: Deciding When to Authenticate on Mobile Phones | jsaveta |
Social Networks | 2012-10-29 | You are what you like! Information leakage through users' Interests | dpoulios |
Code Injection | 2012-10-31 | Countering Code-Injection Attacks With Instruction-Set Randomization | loutsis |
Social Networks | 2012-11-05 | Towards Online Spam Filtering in Social Networks | ladakis |
P2P | 2012-11-07 | I Know Where You Are and What You Are Sharing: Exploiting P2P Communications to Invade Users' Privacy | jprokop |
Privacy | 2012-11-12 | STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud | pgaref |
Privacy | 2012-11-14 | New Cache Designs for Thwarting Software Cache-based Side Channel Attacks | mhortis |
Confidentiality | 2012-11-19 | Abstractions for Usable Information Flow Control in Aeolus | vervelak |
Containment | 2012-11-21 | Treehouse: Javascript Sandboxes to Help Web Developers Help Themselves | panpap |
Memory Protection | 2012-11-26 | Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation | dpoulios |
Secure Applications | 2012-11-28 | Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems | jsaveta |
Progress Reports | 2012-12-03 | loutsis pgaref |
|
Progress Reports | 2012-12-05 | panpap ladakis |
|
Progress Reports | 2012-12-10 | mhortis vervelak |
|
Progress Reports | 2012-12-12 | jprokop | |
Progress Reports | 2012-12-19 | jsaveta dpoulios |