| Topic
| Readings
| Scribe
|
8/24
| Overview, intro
|
| Stephanie
|
8/29
| Memory safety
| Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns, Pincus, Baker.
Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors, Akritidis, Costa, Castro, Hand.
| Max
|
8/31
| Fuzzing, symbolic execution
| EXE: Automatically Generating Inputs of Death, Cadar, Ganesh, Pawlowski, Dill, Engler.
| Casey
|
9/5
| Taint tracking, static analysis
| PiOS: Detecting Privacy Leaks in iOS Applications, Egele et al.
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones, Enck et al.
| Wei
|
9/7
| Inline reference monitors
| Evaluating SFI for a CISC Architecture, McCamant, Morrisett.
Adapting Software Fault Isolation to Contemporary CPU Architectures, Sehr, Muth, Biffle, Khimenko, Pasko, Schimpf, Yee, Chen.
| Michael
|
9/12
| Sandboxing
| A secure environment for untrusted helper applications: confining the wily hacker, Goldberg, Wagner, Thomas, Brewer.
|
|
9/14
| Privilege separation
| The Security Architecture of the Chromium Browser, Barth, Jackson, Reis, Google Chrome Team.
Capsicum: practical capabilities for UNIX, Watson, Anderson, Laurie, Kennaway.
| David
|
9/19
| Privilege management
| Extensible security architectures for Java, Wallach, Balfanz, Dean, Felten.
| Rebecca
|
9/21
| Capabilities
| Paradigm Regained: Abstraction Mechanisms for Access Control, Miller, Shapiro.
Joe-E: A Security-Oriented Subset of Java, Mettler, Wagner, Close.
| George
|
9/26
| Network security
| A look back at Security Problems in the TCP/IP Protocol Suite, Bellovin.
Off-Path TCP Sequence Number Inference Attack How Firewall Middleboxes Reduce Security, Qian and Mao.
| Chris
|
9/28
| Network security
| no readings.
| Sakshi
|
10/3
| DNS security
| Using the Domain Name System for System Break-Ins, Bellovin.
Reliable DNS Forgery in 2008: Kaminsky's Discovery, Matasano blog.
Optional: An Illustrated Guide to the Kaminsky DNS Vulnerability, Friedl.
| Richard
|
10/5
| Web security - browsers
| Robust Defenses for Cross-Site Request Forgery, Barth, Jackson, Mitchell.
Optional background on cross-site request forgeries: Cross-Site Request Forgeries: Exploitation and Prevention, Zeller, Felten.
|
|
10/10
| Web security - servers
| GuardRails: A Data-Centric Web Application Security Framework, Burket et al.
Optional background: Web Security: Are You Part Of The Problem?, Heilman.
Optional background on SQL injection attacks: SQL Injection Attacks by Example, Friedl.
| Wei
|
10/12
| Usable security
| Why Phishing Works, Dhamija, Tygar, Hearst.
You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings, Egelman, Cranor, Hong
| Edward
|
10/17
| Usable security
| So Long, and No Thanks for the Externalities: the Rational Rejection of Security Advice by Users, Herley.
| Antonio
|
10/19
| Cybercrime
| The underground economy: priceless, Thomas, Martin.
Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy, Herley, Florencio.
| Nick
|
10/24
| Cloud security
| A Security Analysis of Amazon's Elastic Compute Cloud Service, Balduzzi et al.
| Haoyuan
|
10/26
| Cryptographic primitives
| Intercepting Mobile Communications: The Insecurity of 802.11, Borisov, Goldberg, Wagner.
Attack of the week: XML Encryption, Green.
If You're Typing The Letters A-E-S Into Your Code, You're Doing It Wrong, Ptacek.
Optional: BEAST Attack on TLS/SSL Encryption, Green.
| Nitesh
|
10/31
| Kerberos
| Designing an Authentication System: a Dialogue in Four Scenes, Bryant.
| Jethro
|
11/2
| E-voting
| Security Analysis of the Diebold AccuVote-TS Voting Machine, Feldman, Halderman, Felten
|
|
11/7
| Cryptographic protocols
| Prudent engineering practice for cryptographic protocols, Abadi, Needham.
| slides
|
11/9
| Cryptography - lessons learned
| Why Cryptosystems Fail, Anderson.
|
|
11/14
| Mobile security
| Android Permissions: User Attention, Comprehension, and Behavior, Felt et al.
How To Ask For Permission, Felt et al.
| Eric
|
11/16
| Chip & PIN
| Chip and Skim: cloning EMV cards with the pre-play attack, Bond et al.
(Optional: Chip and PIN is Broken, Murdoch et al.)
| Sangjin
|
11/21
| Tamper-resistance
| Tamper Resistance-- A cautionary note, Anderson et al.
|
|
11/28
| Privacy
| Privacy Integrated Queries, McSherry.
Optional: Myths and Fallacies of "Personally Identifiable Information", Narayanan, Shmatikov. (blog post summary)
Optional: Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization, Ohm (summary at Ars Technica).
Optional: Privacy, economics, and price discrimination on the internet, Odlyzko.
|
|
11/30
| Economics
| Why Information Security is Hard - An Economic Perspective, Anderson
|
|