Date | Presenter | Food | Paper |
---|---|---|---|
28/09/2011 | Dev | Tom | Eliminating the Hypervisor Attack Surface for a More Secure Cloud Jakub Szefer, Eric Keller, Ruby B. Lee and Jennifer Rexford.(CCS 2011) |
21/09/2011 | Brad | Kevin | Dirty Jobs: The Role of Freelance Labor in Web Service Abuse Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelke.(USENIX 2011) |
05/10/2011 | Vern | Ari | Reflections on Measurement Research: Crooked Lines, Straight Lines, and Moneyshots Vern Paxson. (SIGCOMM 2011 Keynote) |
12/10/2011 | Prateek | Joel | Context-Sensitive Auto-Sanitization in Web Templating Languages Using Type Qualifiers Mike Samuel, Prateek Saxena, Dawn Song.(CCS 2011) |
19/10/2011 | Joel | Dev | Who Wrote this Code? Identifying the Authors of Program Binarie Nathan Rosenblum, Xiaojin Zhu, and Barton P. Miller.(ESORICS 2011) |
02/11/2011 | Ari | Matt | Cyberwar |
09/11/2011 | Chris | Dev | An Auditing File System for Theft-Prone Devices Roxana Geambasu, John P. John, Steven D. Gribble, Tadayoshi Kohno, Henry M. Levy |
30/11/2011 | Ian | Kevin | App Isolation: Get the Security of Multiple Browsers with Just One Eric Y. Chen, Jason Bau, Charles Reis, Adam Barth, Collin Jackson |
You are responsible for leading the discussion. This may include making sure people stay on topic, or reminding someone to give everyone else a chance to speak. Do not be afraid to do either of these things. If you are giving a practice talk and would not like to be interrupted, please tell everyone this before beginning your talk.
Contact Kevin(kevinchn@cs) for any issue on this page or SRG fall 2011.