CS-558 INTERNET SYSTEMS
AND TECHNOLOGIES

Spring 2021

Date

Topic

 

Presenter

15/2

Introduction

Introduction

17/2

Deployment

Jerome H. Saltzer, David P. Reed, and David D. Clark. End-to-End Arguments in System Design. ACM Transactions on Computer Systems 2(4), Nov. 1984, pp. 277-288. [slides]

1/3

Privacy

Invited Talk: Spyros Antonatos

Sweeney, Latanya. "k-anonymity: A model for protecting privacy." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10, no. 05 (2002): 557-570 [slides]

3/3

Security

Steven M. Bellovin. 2004. A Look Back at "Security Problems in the TCP/IP Protocol Suite". In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC '04). [slides]

8/3

Baggy bounds

Invited Talk: Periklis Akritidis

Periklis Akritidis, Manuel Costa, Miguel Castro, and Steven Hand. 2009. Baggy bounds checking: an efficient and backwards-compatible defense against out-of-bounds errors. USENIX Security 2009.

10/3

Passwords

Invited Talk: Elias Athanasopoulos

Georgios Kontaxis, Elias Athanasopoulos, Georgios Portokalidis, and Angelos D. Keromytis. SAuth: protecting user accounts from password database leaks. CCS '13. [slides]

17/3

Leaks

Georgios Kellaris, George Kollios, Kobbi Nissim, Adam O'Neill: Generic Attacks on Secure Outsourced Databases. CCS ’16 [slides]

22/3

Invited Talk: Angelos Keromytis (Starts at 17:00)

A. Keromytis, V. Misra, and D. Rubenstein, "SOS: Secure Overlay Services," SIGCOMM '02

24/3

DoS attacks

Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson. Practical Network Support for IP Traceback. In Proceedings of the 2000 ACM SIGCOMM Conference, pages 295--306, Stockholm, Sweden, August 2000

29/3

Attack surface reduction

Invited Talk: Michalis Polychronakis

Ghavamnia, Seyedhamed, Tapti Palit, Shachee Mishra, and Michalis Polychronakis. "Temporal system call specialization for attack surface reduction." In 29th {USENIX} Security Symposium ({USENIX} Security 20), pp. 1749-1766. 2020.

31/3

Worms

Sumeet Singh, Cristian Estan, George Varghese, and Stefan Savage. 2004. Automated worm fingerprinting. In Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6 (OSDI'04), Vol. 6.

Akritidis
Marchioro

5/4

Passwords

Ari Juels and Ronald L. Rivest, Honeywords: Making Password-Cracking Detectable. CCS 2013 [slides]

Theofanous
Syligardos

7/4

Monitoring

Cristian Estan, George Varghese: New Directions in Traffic Measurement and Accounting. SIGCOMM, August 2002

12/4

DoS attacks

David Moore, Geoffrey M. Voelker, and Stefan Savage, "Inferring Internet Denial-of-Service Activity," Usenix Security Symposium, 2001 [slides]

Gavaletakis
Spiridakis

19/4

Invited Talk: Panos Papadopoulos

Agarwal, Pushkal, Sagar Joglekar, Panagiotis Papadopoulos, Nishanth Sastry, and Nicolas Kourtellis. "Stop tracking me bro! differential tracking of user demographics on hyper-partisan websites." In Proceedings of The Web Conference 2020, pp. 1479-1490. 2020.

21/4

Mobile security

Elias P. Papadopoulos, Michalis Diamantaris, Panagiotis Papadopoulos, Thanasis Petsas, Sotiris Ioannidis, Evangelos P. Markatos: The Long-Standing Privacy Debate: Mobile Websites vs Mobile Apps. WWW 2017 [slides]

Bekos
Plevridi

17/5

Botnets

Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna: Your botnet is my botnet: analysis of a botnet takeover. ACM Conference on Computer and Communications Security 2009: 635-647

Katevenis
Kalochristianakis

19/5

Trust

K. Thomson: Reflections on Trusting Trust (Turing Award Lecture)

24/5

Passwords

Gelernter, Nethanel & Kalma, Senia & Magnezi, Bar & Porcilan, Hen. (2017). The Password Reset MitM Attack. 251-267. 10.1109/SP.2017.9.

Merkouris
Prasantzakis

26/5

Dune

Adam Belay, Andrea Bittau, Ali Mashtizadeh, David Terei, David Mazières, and Christos Kozyrakis, “Dune: Safe User-level Access to Privileged CPU Features”, OSDI 12

Malliotakis
Totomis


Requirements: each student has to give a lecture (one paper) and give a report on that paper.
Grades: Final exam: 80%, report: 10%, lecture: 10%. The final exam will be on the first paper of each date.