CSCI 8260 - Computer Network Attacks and DefensesFall 2012 |
This is
the course calendar for the Fall 2012 semester. Please notice that the
schedule is not definitive and will be updated as the course
progresses.
Students are responsible for visiting this page often to stay informed
on
the latest reading assignments and other information. Of course, I will
also inform you of significant changes during the lectures, but this
page is the one place you should refer to for all the details. |
Date |
Topic |
Lecture / Reading Assignments |
Other
Assignments |
8/14 |
Syllabus |
CSCI-6900 Syllabus [slides] |
Subscribe to mailing list; Introduce yourself via email (by 8/21) |
8/15 |
Intro |
Introduction to Computer and Network Security |
|
8/16 |
Intro |
Introduction to Computer and Network Security [slides] |
|
8/21 |
Topics |
Overview of Research Topics | Choose 3 papers (by 8/27) |
8/22 |
Topics |
Overview of Research Topics [slides] | |
8/23 |
Pattern Recognition |
Brief introduction to Pattern Recognition/Machine Learning concepts [slides] |
|
8/28 |
Botnet detection |
G. Gu, R. Perdisci, J. Zhang, W. Lee. BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection. USENIX'08: Proceedings of the 17th conference on Security symposium. Presenter: Prof. Perdisci [slides] |
Read each assigned papers before in-class presentation! |
8/29 |
Malware Behavrior |
R. Perdisci, W. Lee, and N. Feamster. Behavioral Clustering of HTTP-based Malware and Signature Generation using Malicious Network Traces. USENIX Symposium on Networked Systems Design and Implementation, NSDI 2010. Presenter: Prof. Perdisci [slides] | |
8/30 |
Search Poisoning |
L. Lu, R. Perdisci, W. Lee. SURF: Detecting and Measuring Search Poisoning. ACM Conference on Computer and Communications Security, ACM CCS 2011 Presenter: Prof. Perdisci [slides] | (no review required for the first 3 papers) |
9/4 |
5 minutes project topic/goals presentations |
Send me a PDF copy of your presentation by 9/3, 8pm! |
|
9/5 |
J.
Oberheide, E. Cooke, and F. Jahanian. CloudAV: N-Version Antivirus in the Network Cloud. USENIX'08: Proceedings of the 17th conference on Security symposium. PRESENTER: Terrance Medina [slides] |
||
9/6 |
Y. Wang , D. Beck , X. Jiang , R. Roussev, C. Verbowski,
S. Chen, and S. King Automated Web Patrol with Strider HoneyMonkeys NDSS 2006 PRESENTER: Jordan Marchetto [slides] |
Review due by Fri 9/7 11:59pm (late reviews will be penalized). Use the review template. |
|
9/11 |
B.
Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R.
Kemmerer, C. Kruegel, G. Vigna. Your botnet is my botnet: analysis of a botnet takeover. CCS '09: Proceedings of the 16th ACM conference on Computer and communications security. PRESENTER: Bo Li [slides] |
||
9/12 |
Yajin Zhou, Xuxian Jiang Dissecting Android Malware: Characterization and Evolution IEEE Symposium on Security and Privacy 2012 PRESENTER: Lee Harrison [slides] |
||
9/13 |
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G.
Hulten, and I. Osipkov. Spamming Botnets: Signatures and Characteristics. SIGCOMM'08. PRESENTER: Babak Rahbarinia [slides] |
Review due by Fri 9/14 11:59pm (late reviews will be penalized). Use the review template. | |
9/18 |
K. Levchenko et al. Click Trajectories: End-to-End Analysis of the Spam Value Chain IEEE Symposium on Security and Privacy 2011 PRESENTER: Yu Qiu [slides] |
||
9/19 |
Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, Dawn Song Design and Evaluation of a Real-Time URL Spam Filtering Service IEEE Symposium on Security and Privacy 2011 PRESENTER: Yue Yin [slides] |
||
9/20 |
H.
Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: capturing system-wide information flow for malware detection and analysis. CCS '07: Proceedings of the 14th ACM conference on Computer and communications security PRESENTER: Yibin Liao [slides] |
Review due by Fri 9/21 11:59pm (late reviews will be penalized). Use the review template. | |
9/25 |
G. Jacob et al. JACKSTRAWS: Picking Command and Control Connections from Bot Traffic. USENIX Security 2011 PRESENTER: Babak Rahbarinia [slides] |
||
9/26 |
H.
Shacham. The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls (on the x86). Proceedings of ACM CCS 2007. PRESENTER: Yuchen Ying [slides] |
||
9/27 |
V. Pappas et al. Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization IEEE Symposium on Security and Privacy 2012 PRESENTER: Kevin Warrick [slides] |
Review due by Fri 9/28 11:59pm (late reviews will be penalized). Use the review template. | |
10/2 |
Jiyong Jang, A. Agrawal, D. Brumley. ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions IEEE Symposium on Security and Privacy 2012 PRESENTER: Lee Harrison [slides] |
(no review for this week) | |
10/3 |
10 minutes Midterm project progress report presentations |
||
10/4 |
10 minutes Midterm project progress report presentations | ||
10/9 |
Wang, K. Parekh, J. J. Stolfo, S. J. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack Recent Advances in Intrusion Detection, 2006 PRESENTER: Sagar Sugandhi [slides] |
||
10/10 |
J.
Mason, S. Small, F. Monrose, and G. MacManus. English shellcode. CCS '09: Proceedings of the 16th ACM conference on Computer and communications security 2009. PRESENTER: Yibin Liao [slides] |
||
10/11 |
C.
Warrender, S. Forrest, B. Pearlmutter. Detecting Intrusions Using System Calls: Alternative Data Models. IEEE Symposium on Security and Privacy 1999. PRESENTER: Yue Yin [slides] |
Review due by Fri 10/12 11:59pm (late reviews will be penalized). Use the review template. | |
10/16 |
Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection USENIX Security 2011 PRESENTER: Terrance Medina [slides] |
||
10/17 |
L. Lu, V. Yegneswaran, P.A. Porras, W. Lee BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections ACM Conference on Computer and Communiations Security, CCS 2010 |
||
10/18 |
Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano The quest to replace passwords: a framework for comparative evaluation of Web authentication schemes IEEE Symposium on Security and Privacy 2012 |
Review due by Fri 10/19 11:59pm (late reviews will be penalized). Use the review template. | |
10/23 |
(no review for this week) | ||
10/24 |
A.
Narayanan, V. Shmatikov. Robust De-anonymization of Large Sparse Datasets. IEEE Symposium on Security and Privacy, 2008. PRESENTER: Bo Li [slides] |
||
10/25 |
S.
Chen, R. Wang, X. Wang, K. Zhang. Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow. IEEE Symposium on Security and Privacy 2010. PRESENTER: Sagar Sugandhi [slides] |
||
10/30 |
10 minutes project progress report presentations | ||
10/31 |
10 minutes project progress report presentations | ||
11/1 |
M. Antonakakis, R. Perdisci, Y. Nadji, N. Vasiloglou, S. Abu-Nimeh, W. Lee, D. Dagon. From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware. USENIX Security 2012 PRESENTER: Prof. Perdisci [slides] |
(no review for this week) | |
11/6 |
S. Jana et al. Memento: Learning Secrets from Process Footprints IEEE Symposium on Security and Privacy 2012 PRESENTER: Phani Vadrevu [slides] |
||
11/7 |
Y. Wang et al. Flash Memory for Ubiquitous Hardware Security Functions: True Random Number Generation and Device Fingerprints IEEE Symposium on Security and Privacy 2012 PRESENTER: Kevin Warrick [slides] |
||
11/8 |
Z. Weinberg et al. I Still Know What You Visited Last Summer: User interaction and side-channel attacks on browsing history IEEE Symposium on Security and Privacy 2011 PRESENTER: Kyle Krafka |
(no review for this week) | |
11/13 |
Fianl project report presentations |
Send me a PDF copy of your presentation by 11/12, 8pm! | |
11/14 |
Fianl project report presentations | ||
11/15 |
Fianl project report presentations | ||
11/27 |
Z. Qian and Z. Morley Mao Off-Path TCP Sequence Number Inference Attack -- How Firewall Middleboxes Reduce Security IEEE Symposium on Security and Privacy 2012 PRESENTER: Yuchen Ying |
(no review for this week) | |
11/28 | S.
Axelsson. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information System Security 3(3), 2000. PRESENTER: Yu Qiu |
||
11/29 |
R. Geambasu, T. Kohno, A. Levy, H. M. Levy. Vanish: Increasing Data Privacy with Self-Destructing Data. In Proceedings of the USENIX Security Symposium 2009. PRESENTER: Kyle Krafka |
Final research paper due on 12/04 at 11:59pm. Page limit = 6 pages. Use IEEE CS LaTeX template |