Lectures

Date Lectures Topics Speakers & Notes Reading
Mon 5.6 Program analysis Hao EXE: Automatically Generating Inputs of Death http://www.stanford.edu/~engler/exe-ccs-06.pdf Dynamic Taint Analysis: Automatic Detection, Analysis, and Signature Generation of Exploit Attacks on Commodity Software. http://www.cs.berkeley.edu/%7Edawnsong/papers/taintcheck.pdf
Mon 5.7 Program analysis in action Hao Intrusion Detection via Static Analysishttp://www.cs.berkeley.edu/~daw/papers/ids-oakland01.ps A secure environment for untrusted helper applications:confining the wily hacker.http://www.cs.berkeley.edu/~daw/papers/janus-usenix96.ps
Mon 5.13 Android Security Hao TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphoneshttp://appanalysis.org/tdroid10.pdf AppsPlayground: Automatic Security Analysis of Smartphone Applications http://www.enck.org/pubs/codaspy13.pdf Android Security and Permissions http://developer.android.com/guide/topics/security/security.html Android Permissions Demystified http://www.cs.berkeley.edu/~daw/papers/androidperm-ccs11.pdf
Sun 5.19 Android Security Hao Permission Re-Delegation: Attacks and Defenses http://www.cs.berkeley.edu/~afelt/felt_usenixsec2011.pdf AdDroid: Privilege Separation for Applications and Advertisers in Android http://www.cs.berkeley.edu/~afelt/addroid.pdf AdRob: Examining the Landscape and Impact of Android Application Plagiarism http://www.cs.ucdavis.edu/~hchen/paper/mobisys12uecon.pdf
Mon 6.3 Openflow Background [OpenFlow]
Yan
OpenFlow:enabling innovation in campus networks, McKeown, Nick, et al., ACM SIGCOMM Computer Communication Review 38.2 (2008).
[Ref]NOX:towards an operating system for networks, Gude, Natasha, et al.,  ACM SIGCOMM Computer Communication Review 38.3 (2008).
SDN Background [Slides by Shenker]
Yan
The Future of Networking, and the Past of Protocols, Scott Shenker (video of talk at Ericsson)
[Ref]Fabric: A Retrospective on Evolving SDN, Mart锟絥 Casado, Teemu Koponen, Scott Shenker, Amin Tootoonchian, HotSDN 2012
Mon 6.10 OpenFlow Security Services [OF Sec Services]
Yan
FRESCO: Modular Composable Security Services for Software-Defined Networks, Shin, Seugwon, et al., in the Network and Distributed System Security Symposium, (NDSS), 2013.
[Ref] A security enforcement kernel for OpenFlow networks, Porras, Philip, et al., in the Proc. of the first Workshop on Hot Topics in Software Defined Networks (SDN), ACM, 2012.
OpenFlow App Testing [OF App Testing]
Yan
A NICE Way to Test OpenFlow Applications, by Canini, Marco, et al., in the Proc. of NSDI, 2012.
Mon 6.17 WWW security background [browser_security]
Yan
Browser Security Handbook, part 1 (Basic concepts)
Web origins and the same origin policy [flowfox][gazelle]
Yan
FlowFox: a Web Browser with Flexible and Precise Information Flow Control, Willem De Groef, Dominique Devriese, Nick Nikiforakis and Frank Piessens, CCS 2012.
[Ref] The Multi-Principal OS Construction of the Gazelle Web Browser, Helen Wang, Chris Grier, Alexander Moshchuk, Samuel T. King, Piali Choudhury, and Herman Venter, USENIX Security 2009.
Mon 6.24 Browser Extension Vulnerabilities [VEX.pptx]
Yan
Bandhakavi, Sruthi, et al. "VEX: Vetting browser extensions for security vulnerabilities." Usenix Security. 2010. [video of the authors' talk]
Project Presentation Yan

Notes: You may find the brochure useful: Efficient reading of papers in Science and Technology by Michael J. Hanson, 1990, revised 2000 Dylan McNamee.