CSCI 780 Advanced Topics in Systems and Security

11:00AM-12:20PM TR
McGlothlin-Street Hall 002


--------------------

1/18 (W) class starts
1/19 Th  First class
Paxos (you only need to read the basic Paxos protocol), Paxos made simple (for reference, not required to read)

1/24 T
R. P. Gabriel, The Rise of ``Worse is Better''
J.H. Saltzer, D.P. Reed, and D.D. Clark, "End-to-end arguments in system design," ACM TCS, November 1984
L. Lamport, "Time, Clock, and the Ordering of Events in a Distributed System," CACM, July 1978 (you do not have to read the proof)
Vector clock
1/26 Th
Leases: An Efficient Fault-Tolerant Mechnism for Distributed File Cache Consistency, SOSP 1989
J.H. Howard, M.L. Kazar, S.G. Menees, D.A. Nichols, M. Satyanarayanan, N. Sidebotham, and M.J. West, "Scale and Performance in a Distributed File System," ACM Transactions on Computer Systems, February 1988.

1/31
M.K. McKusick, W.N. Joy, S.J. Leffler, and R.S. Fabry, "A Fast File System for UNIX," Computer Systems, vol 2, no 3, 1984.
M. Rosenblum and J.K. Ousterhout, "The Design and Implementation of a Log-Structured File System," 13th ACM SOSP, 1992.
2/2
J.J. Kistler and M. Satyanarayanan, "Disconnected Operation in the Coda File System," ACM Transactions on Computer Systems, February 1992.
A. Muthitacharoen, B. Chen, and D. Mazieres, "A Low-Bandwidth Network File System," SOSP 2001

2/7
C.A. Waldspurger, "Memory Resource Management in VMware ESX Server," OSDI 2002.
2/9
A. W. Appel and Kai Li, "Virtual Memory Primitives for User Programs"


2/14
S. Savage, M. Burrows, G. Nelson, P. Sobalvarro, and T. Anderson, "Eraser: A Dynamic Data Race Detector for Multithreaded Programs," SOSP 1997
2/16
Eliminating Receive Livelock in an Interrupt-driven Kernel, USENIX 1996

2/21
MapReduce: Simplified Data Processing on Large Clusters
M. Burrows, "The Chubby lock service for loosely-coupled distributed systems," OSDI 2006

2/23
R. v. Behren, J. Condit, F. Zhou, G. C. Necula, and E. Brewer, "Capriccio: Scalable Threads for Internet Services," SOSP 2003
Exokernel: An Operating System Architecture for Application Level Resource Management

2/28
J.G. Steiner, C. Neuman, and J.I. Schiller, "Kerberos: An Authentication Service for Open Network Systems," USENIX Winter Conference, February 1988.

3/2

3/7  no class (3/4-3/12 Spring Break)
3/9  no class

3/14
Woosub Jung
Domain-Z: 28 Registrations Later
Pengfei Su
HDFI: Hardware-Assisted Data-Flow Isolation
3/16
Stephen Feldman
Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS
Shiya Wang
Verena: End-to-End Integrity Protection for Web Applications


3/21
Shuangquan Wang
Inferring User Routes and Locations using Zero-Permission Mobile Sensors
Haoran Lu
Prepose: Privacy, Security, and Reliability for Gesture-Based Programming
3/23
Xinqian Huang
Security Analysis of Emerging Smart Home Applications
Linnan Wang
TensorFlow: A System for Large-Scale Machine Learning, OSDI'16


3/28
He Zhang
Beauty and the Beast: Diverting modern web browsers to build unique browser fingerprints
Tao Zhang
pASSWORD tYPOS and How to Correct Them Securely
3/30
Yifang Liu
No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis
Zhen Peng
Users Really Do Plug in USB Drives They Find


4/3
Xianglai Meng
TriggerScope: Towards Detecting Logic Bombs in Android Applications
Lishan Yang
Sending out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways
4/6 no class

4/11
Alexander Powell
PhotoProof: Cryptographic Image Authentication for Any Set of Permissible Transformations
Xiaoran Peng
Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks
4/13
Sunil Manandhar
You Get Where You're Looking For: The Impact Of Information Sources On Code Security
Qi Xia
LAVA: Large-scale Automated Vulnerability Addition


4/18
Yiyang Zhao
Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks
Xiaoyang Li
SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam
4/20
Xianchen Meng
I Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security


4/25
4/27

4/28 class ends

5/12 commencement
















B. W. Lampson and D. D. Redell, "Experience with Processes and Monitors in Mesa," Communications of the ACM, February 1980.

H.M. Levy and P.H. Lipman, "Virtual Memory Management in the VAX/VMS Operating System," IEEE Computer, March 1982.

B. W. Lampson, "Hints for Computer System Design," 9th ACM SOSP.

Van Jacobson and M.J. Karels, "Congestion Avoidance and Control," SIGCOMM 1988, revised.

R. Anderson, "Why Cryptosystems Fail," 1st Conf. Computer and Comm. Security, 1993.
K. Thompson, "Reflections on Trusting Trust," Turing Award Lecture, CACM, August 1984.

S. Ghemawat, H. Gobioff, and S.-T. Leung, "The Google File System," SOSP 2003.



Boris Dragovic, Keir Fraser, Steve Hand, Tim Harris, Alex Ho, Ian Pratt, Andrew Warfield, Paul Barham, and Rolf Neugebauer, "Xen and the Art of Virtualization" SOSP 2003.
A comparison of software and hardware techniques for x86 virtualization
Reference: Intel Virtualization Technology


Arvind Seshadri, Mark Luk, Ning Qu, Adrian Perrig. "SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes" SOSP 2007

Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems, ASPLOS 2008



Boris Dragovic, Keir Fraser, Steve Hand, Tim Harris, Alex Ho, Ian Pratt, Andrew Warfield, Paul Barham, and Rolf Neugebauer, "Xen and the Art of Virtualization" SOSP 2003.
A comparison of software and hardware techniques for x86 virtualization
Reference: Intel Virtualization Technology

Arvind Seshadri, Mark Luk, Ning Qu, Adrian Perrig. "SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes" SOSP 2007

Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems, ASPLOS 2008