|28/09/2011||Dev||Tom||Eliminating the Hypervisor Attack Surface for a More Secure Cloud Jakub Szefer, Eric Keller, Ruby B. Lee and Jennifer Rexford.(CCS 2011)|
|21/09/2011||Brad||Kevin||Dirty Jobs: The Role of Freelance Labor in Web Service Abuse Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelke.(USENIX 2011)|
|05/10/2011||Vern||Ari||Reflections on Measurement Research: Crooked Lines, Straight Lines, and Moneyshots Vern Paxson. (SIGCOMM 2011 Keynote)|
|12/10/2011||Prateek||Joel||Context-Sensitive Auto-Sanitization in Web Templating Languages Using Type Qualifiers Mike Samuel, Prateek Saxena, Dawn Song.(CCS 2011)|
|19/10/2011||Joel||Dev||Who Wrote this Code? Identifying the Authors of Program Binarie Nathan Rosenblum, Xiaojin Zhu, and Barton P. Miller.(ESORICS 2011)|
|09/11/2011||Chris||Dev||An Auditing File System for Theft-Prone Devices Roxana Geambasu, John P. John, Steven D. Gribble, Tadayoshi Kohno, Henry M. Levy|
|30/11/2011||Ian||Kevin||App Isolation: Get the Security of Multiple Browsers with Just One Eric Y. Chen, Jason Bau, Charles Reis, Adam Barth, Collin Jackson|
You are responsible for leading the discussion. This may include making sure people stay on topic, or reminding someone to give everyone else a chance to speak. Do not be afraid to do either of these things. If you are giving a practice talk and would not like to be interrupted, please tell everyone this before beginning your talk.
Contact Kevin(kevinchn@cs) for any issue on this page or SRG fall 2011.