Security Reading Group Summer 2011Security Reading Group meets almost every week on Tuesday from 12:00pm to 1:00pm in Soda Hall. We eat and chat for the first 15 minutes, and the presenter presents or leads discussion for the next 45.
|05/31/2011||Chris||Kevin||Click Trajectories: End-to-End Analysis of the Spam Value Chain . Levchenko et al. (Oakland 2011)|
|06/07/2011||Adrienne||Paul||Secure Data Preservers for Web Services. Jayanthkumar Kannan, Petros Maniatis, Byung-Gon Chun. (WebApps 2011)|
|06/14/2011||Kevin||Justin||Collusion Attack on the Permission-Based Security Model and its Implications for Modern Smartphone Systems. Claudio Marforio, Aurélien Francillon, Srdjan Capkun. Technical Report 724, ETH Zurich, System Security Group, April 2011.|
|06/21/2011||Steve||Kevin||Privacy leakage vs. Protection measures: the growing disconnect. Balachander Krishnamurthy, Konstantin Naryshkin, Craig E. Wills.|
|06/28/2011||Paul||Steve||What’s Clicking What? Techniques and Innovations of Today’s Clickbots. Brad Miller, Paul Pearce, and Chris Grier, Christian Kreibich, Vern Paxson. (DIMVA 2011)|
|07/19/2011||Chris||Adrienne||JACKSTRAWS: Picking Command and Control Connections from Bot Traffic. Gregoire Jacob, Ralf Hund, Christopher Kruegel, Thorsten Holz. (USENIX 2011)|
|07/26/2011||Justin||Erika||Telex: Anticensorship in the Network Infrastructure. Eric Wustrow, Scott Wolchok, Ian Goldberg and J. Alex Halderman. (USENIX 2011)|
|08/02/2011||Steve||Cynthia||Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices. Steve Hanna, Rolf Rolles, Andres Molina-Markham, Pongsin Poosankam, Kevin Fu, Dawn Song. (HealthSec 2011)|
|08/09/2011||Chris||Measuring Pay-per-Install: The Commoditization of Malware Distribution. Juan Caballero, Chris Grier, Christian Kreibich, and Vern Paxson. (USENIX 2011)|
|08/16/2011||Giang Nguyen||Adrienne||Cirripede: Circumvention Infrastructure using RouterRedirection with Plausible Deniability. Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesar, Nikita Borisov. (CCS 2011)|
Instructions for presentersYou are welcome to present your own work or somebody else's. The most common strategy seems to be to choose a paper that interests you from a recent conference. Many of the papers we discuss come from CCS, NDSS, Oakland, or USENIX Security, but anything related to security that you find exciting is appropriate.
You are responsible for leading the discussion. This may include making sure people stay on topic, or reminding someone to give everyone else a chance to speak. Do not be afraid to do either of these things. If you are giving a practice talk and would not like to be interrupted, please tell everyone this before beginning your talk.
Contact Kevin(kevinchn@cs) on any issue on this page or SRG summer 2011.