All students are going to present some papers. Presentations are booked through the mailing list in a first come first served basis. The current schedule follows.

Topic Date Title Name
General 2012-09-24 Introduction to Secure Systems sotiris
Tainting Analysis 2012-09-26 Minemu: The World's Fastest Taint Tracker loutsis
Spam 2012-10-01 B@bel: Leveraging Email Delivery for Spam Mitigation pgaref
Online Ads 2012-10-03 PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs panpap
Privacy 2012-10-08 Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud ladakis
Trusted Computing 2012-10-10 Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services mhortis
Cellular Networks 2012-10-15 Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks vervelak
Cellular Networks 2012-10-17 SMS of death: from analyzing to attacking mobile phones on a large scale jprokop
Encrypted Storage 2012-10-22 Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory trigirak
Authentication 2012-10-24 Progressive Authentication: Deciding When to Authenticate on Mobile Phones jsaveta
Social Networks 2012-10-29 You are what you like! Information leakage through users' Interests dpoulios
Code Injection 2012-10-31 Countering Code-Injection Attacks With Instruction-Set Randomization loutsis
Social Networks 2012-11-05 Towards Online Spam Filtering in Social Networks ladakis
P2P 2012-11-07 I Know Where You Are and What You Are Sharing: Exploiting P2P Communications to Invade Users' Privacy jprokop
Privacy 2012-11-12 STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud pgaref
Privacy 2012-11-14 New Cache Designs for Thwarting Software Cache-based Side Channel Attacks mhortis
Confidentiality 2012-11-19 Abstractions for Usable Information Flow Control in Aeolus vervelak
Containment 2012-11-21 Treehouse: Javascript Sandboxes to Help Web Developers Help Themselves panpap
Memory Protection 2012-11-26 Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation dpoulios
Secure Applications 2012-11-28 Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems jsaveta
Progress Reports 2012-12-03 loutsis
pgaref
Progress Reports 2012-12-05 panpap
ladakis
Progress Reports 2012-12-10 mhortis
vervelak
Progress Reports 2012-12-12 jprokop
Progress Reports 2012-12-19 jsaveta
dpoulios