CSCI 780 Advanced Topics in Systems and Security
11:00AM-12:20PM TR
McGlothlin-Street Hall 002
--------------------
1/18 (W) class starts
1/19 Th First class
Paxos
(you only need to read the basic Paxos protocol), Paxos
made simple (for reference, not required to read)
1/24 T
R. P. Gabriel, The Rise of
``Worse is Better''
J.H. Saltzer, D.P. Reed, and
D.D. Clark, "End-to-end arguments in system design," ACM TCS,
November 1984
L. Lamport, "Time, Clock, and the
Ordering of Events in a Distributed System," CACM, July 1978
(you do not have to read the proof)
Vector clock
1/26 Th
Leases: An Efficient Fault-Tolerant
Mechnism for Distributed File Cache Consistency, SOSP 1989
J.H. Howard, M.L. Kazar, S.G. Menees, D.A.
Nichols, M. Satyanarayanan, N. Sidebotham, and M.J. West, "Scale
and Performance in a Distributed File System," ACM Transactions on
Computer Systems, February 1988.
1/31
M.K. McKusick, W.N. Joy, S.J.
Leffler, and R.S. Fabry, "A Fast File System for UNIX," Computer
Systems, vol 2, no 3, 1984.
M. Rosenblum and J.K.
Ousterhout, "The Design and Implementation of a Log-Structured
File System," 13th ACM SOSP, 1992.
2/2
J.J. Kistler and M. Satyanarayanan,
"Disconnected Operation in the Coda File System," ACM Transactions
on Computer Systems, February 1992.
A. Muthitacharoen,
B. Chen, and D. Mazieres, "A Low-Bandwidth Network File System,"
SOSP 2001
2/7
C.A. Waldspurger, "Memory
Resource Management in VMware ESX Server," OSDI 2002.
2/9
A. W. Appel and Kai Li, "Virtual
Memory Primitives for User Programs"
2/14
S. Savage, M. Burrows, G. Nelson, P.
Sobalvarro, and T. Anderson, "Eraser: A Dynamic Data Race Detector
for Multithreaded Programs," SOSP 1997
2/16
Eliminating Receive Livelock in an
Interrupt-driven Kernel, USENIX 1996
2/21
MapReduce:
Simplified Data Processing on Large Clusters
M. Burrows, "The Chubby lock service for
loosely-coupled distributed systems," OSDI 2006
2/23
R. v. Behren, J. Condit, F.
Zhou, G. C. Necula, and E. Brewer, "Capriccio: Scalable Threads
for Internet Services," SOSP 2003
Exokernel: An Operating System
Architecture for Application Level Resource Management
2/28
J.G. Steiner, C. Neuman, and
J.I. Schiller, "Kerberos: An Authentication Service for Open
Network Systems," USENIX Winter Conference, February 1988.
3/2
3/7 no class (3/4-3/12 Spring Break)
3/9 no class
3/14
Woosub Jung
Domain-Z: 28 Registrations Later
Pengfei Su
HDFI: Hardware-Assisted Data-Flow
Isolation
3/16
Stephen Feldman
Following Devil's Footprints:
Cross-Platform Analysis of Potentially Harmful Libraries on
Android and iOS
Shiya Wang
Verena: End-to-End Integrity Protection
for Web Applications
3/21
Shuangquan Wang
Inferring User Routes and Locations
using Zero-Permission Mobile Sensors
Haoran Lu
Prepose: Privacy, Security, and
Reliability for Gesture-Based Programming
3/23
Xinqian Huang
Security Analysis of Emerging Smart Home
Applications
Linnan Wang
TensorFlow: A System for Large-Scale
Machine Learning, OSDI'16
3/28
He Zhang
Beauty and the Beast: Diverting modern
web browsers to build unique browser fingerprints
Tao Zhang
pASSWORD tYPOS and How to Correct Them
Securely
3/30
Yifang Liu
No Pardon for the Interruption: New
Inference Attacks on Android Through Interrupt Timing Analysis
Zhen Peng
Users Really Do Plug in USB Drives They
Find
4/3
Xianglai Meng
TriggerScope: Towards Detecting Logic
Bombs in Android Applications
Lishan Yang
Sending out an SMS: Characterizing the
Security of the SMS Ecosystem with Public Gateways
4/6 no class
4/11
Alexander Powell
PhotoProof: Cryptographic Image
Authentication for Any Set of Permissible Transformations
Xiaoran Peng
Distillation as a Defense to Adversarial
Perturbations against Deep Neural Networks
4/13
Sunil Manandhar
You Get Where You're Looking For: The
Impact Of Information Sources On Code Security
Qi Xia
LAVA: Large-scale Automated
Vulnerability Addition
4/18
Yiyang Zhao
Data-Oriented Programming: On the
Expressiveness of Non-Control Data Attacks
Xiaoyang Li
SoK: Everyone Hates Robocalls: A Survey
of Techniques against Telephone Spam
4/20
Xianchen Meng
I Think They're Trying to Tell Me
Something: Advice Sources and Selection for Digital Security
4/25
4/27
4/28 class ends
5/12 commencement
B. W. Lampson and D. D. Redell,
"Experience with Processes and Monitors in Mesa," Communications
of the ACM, February 1980.
H.M.
Levy and P.H. Lipman, "Virtual Memory Management in the VAX/VMS
Operating System," IEEE Computer, March 1982.
B. W. Lampson, "Hints for
Computer System Design," 9th ACM SOSP.
Van Jacobson and M.J.
Karels, "Congestion Avoidance and Control," SIGCOMM 1988, revised.
R. Anderson, "Why Cryptosystems Fail," 1st
Conf. Computer and Comm. Security, 1993.
K. Thompson, "Reflections on
Trusting Trust," Turing Award Lecture, CACM, August 1984.
S. Ghemawat, H. Gobioff, and
S.-T. Leung, "The Google File System," SOSP 2003.
Boris Dragovic, Keir Fraser, Steve
Hand, Tim Harris, Alex Ho, Ian Pratt, Andrew Warfield, Paul
Barham, and Rolf Neugebauer, "Xen and the Art of Virtualization"
SOSP 2003.
A
comparison of software and hardware techniques for x86
virtualization
Reference: Intel
Virtualization
Technology
Arvind
Seshadri, Mark Luk, Ning Qu, Adrian Perrig. "SecVisor: a tiny
hypervisor to provide lifetime kernel code integrity for commodity
OSes" SOSP 2007
Overshadow:
a virtualization-based approach to retrofitting protection in
commodity operating systems, ASPLOS 2008
Boris
Dragovic, Keir Fraser, Steve Hand, Tim Harris, Alex Ho, Ian Pratt,
Andrew Warfield, Paul Barham, and Rolf Neugebauer, "Xen and the
Art of Virtualization" SOSP 2003.
A
comparison of software and hardware techniques for x86
virtualization
Reference: Intel
Virtualization
Technology
Arvind
Seshadri, Mark Luk, Ning Qu, Adrian Perrig. "SecVisor: a tiny
hypervisor to provide lifetime kernel code integrity for commodity
OSes" SOSP 2007
Overshadow:
a virtualization-based approach to retrofitting protection in
commodity operating systems, ASPLOS 2008