CSCI 8260 - Computer Network Attacks and Defenses

Fall 2012

This is the course calendar for the Fall 2012 semester. Please notice that the schedule is not definitive and will be updated as the course progresses. Students are responsible for visiting this page often to stay informed on the latest reading assignments and other information. Of course, I will also inform you of significant changes during the lectures, but this page is the one place you should refer to for all the details.

Date
Topic
Lecture / Reading Assignments
Other Assignments
8/14
Syllabus
CSCI-6900 Syllabus [slides]
Subscribe to mailing list;
Introduce yourself via email (by 8/21)
8/15
Intro
Introduction to Computer and Network Security

8/16
Intro
Introduction to Computer and Network Security [slides]

8/21
Topics
Overview of Research Topics Choose 3 papers (by 8/27)
8/22
Topics
Overview of Research Topics [slides]
8/23
Pattern Recognition
Brief introduction to Pattern Recognition/Machine Learning concepts [slides]

8/28
Botnet detection
G. Gu, R. Perdisci, J. Zhang, W. Lee. BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection. USENIX'08: Proceedings of the 17th conference on Security symposium. Presenter: Prof. Perdisci [slides] Read each assigned papers before in-class presentation!
8/29
Malware Behavrior
R. Perdisci, W. Lee, and N. Feamster. Behavioral Clustering of HTTP-based Malware and Signature Generation using Malicious Network Traces. USENIX Symposium on Networked Systems Design and Implementation, NSDI 2010. Presenter: Prof. Perdisci [slides]
8/30
Search Poisoning
L. Lu, R. Perdisci, W. Lee. SURF: Detecting and Measuring Search Poisoning. ACM Conference on Computer and Communications Security, ACM CCS 2011 Presenter: Prof. Perdisci [slides] (no review required for the first 3 papers)
9/4

5 minutes project topic/goals presentations
Send me a PDF copy of your presentation by 9/3, 8pm!
9/5

J. Oberheide, E. Cooke, and F. Jahanian.
CloudAV: N-Version Antivirus in the Network Cloud
.
USENIX'08: Proceedings of the 17th conference on Security symposium.
PRESENTER: Terrance Medina [slides]

9/6

Y. Wang ,  D. Beck ,  X. Jiang ,  R. Roussev, C. Verbowski, S. Chen, and S. King
Automated Web Patrol with Strider HoneyMonkeys
NDSS 2006 PRESENTER: Jordan Marchetto [slides]
Review due by Fri 9/7 11:59pm (late reviews will be penalized). Use the review template.
9/11

B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, G.  Vigna.
Your botnet is my botnet: analysis of a botnet takeover.
CCS '09: Proceedings of the 16th ACM conference on Computer and communications security. PRESENTER: Bo Li [slides]

9/12

Yajin Zhou, Xuxian Jiang
Dissecting Android Malware: Characterization and Evolution
IEEE Symposium on Security and Privacy 2012
PRESENTER: Lee Harrison [slides]

9/13

Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov.
Spamming Botnets: Signatures and Characteristics.
SIGCOMM'08.
PRESENTER: Babak Rahbarinia [slides]
Review due by Fri 9/14 11:59pm (late reviews will be penalized). Use the review template.
9/18

K. Levchenko et al.
Click Trajectories: End-to-End Analysis of the Spam Value Chain
IEEE Symposium on Security and Privacy 2011
PRESENTER: Yu Qiu [slides]

9/19

Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, Dawn Song
Design and Evaluation of a Real-Time URL Spam Filtering Service
IEEE Symposium on Security and Privacy 2011
PRESENTER: Yue Yin [slides]

9/20

H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda.
Panorama: capturing system-wide information flow for malware detection and analysis.
CCS '07: Proceedings of the 14th ACM conference on Computer and communications security PRESENTER: Yibin Liao [slides]
Review due by Fri 9/21 11:59pm (late reviews will be penalized). Use the review template.
9/25

G. Jacob et al.
JACKSTRAWS: Picking Command and Control Connections from Bot Traffic.
USENIX Security 2011 PRESENTER: Babak Rahbarinia [slides]

9/26

H. Shacham.
The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls (on the x86).  Proceedings of ACM CCS 2007.
PRESENTER: Yuchen Ying [slides]

9/27

V. Pappas et al.
Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization IEEE Symposium on Security and Privacy 2012
PRESENTER: Kevin Warrick [slides]
Review due by Fri 9/28 11:59pm (late reviews will be penalized). Use the review template.
10/2

Jiyong Jang, A. Agrawal, D. Brumley.
ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions
IEEE Symposium on Security and Privacy 2012
PRESENTER: Lee Harrison [slides]
(no review for this week)
10/3

10 minutes Midterm project progress report presentations

10/4

10 minutes Midterm project progress report presentations
10/9

Wang, K. Parekh, J. J. Stolfo, S. J.
Anagram: A Content Anomaly Detector Resistant to Mimicry Attack
Recent Advances in Intrusion Detection, 2006
PRESENTER: Sagar Sugandhi [slides]

10/10

J. Mason, S. Small, F. Monrose, and G. MacManus.
English shellcode.
CCS '09: Proceedings of the 16th ACM conference on Computer and communications security 2009.  PRESENTER: Yibin Liao [slides]

10/11

C. Warrender, S. Forrest, B. Pearlmutter.
Detecting Intrusions Using System Calls: Alternative Data Models.
IEEE Symposium on Security and Privacy 1999.
PRESENTER: Yue Yin [slides]
Review due by Fri 10/12 11:59pm (late reviews will be penalized). Use the review template.
10/16

Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert
ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection
USENIX Security 2011
PRESENTER: Terrance Medina
[slides]

10/17

L. Lu, V. Yegneswaran, P.A. Porras, W. Lee
BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections
ACM Conference on Computer and Communiations Security, CCS 2010
PRESENTER: Phani Vadrevu [slides]

10/18

Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano
The quest to replace passwords: a framework for comparative evaluation of Web authentication schemes
IEEE Symposium on Security and Privacy 2012
PRESENTER: Jordan Marchetto [slides]
Review due by Fri 10/19 11:59pm (late reviews will be penalized). Use the review template.
10/23

Guest Lecture (Dr. Kang Li) (no review for this week)
10/24

A. Narayanan, V. Shmatikov.
Robust De-anonymization of Large Sparse Datasets.
IEEE Symposium on Security and Privacy, 2008.
PRESENTER: Bo Li [slides]

10/25

S. Chen, R. Wang, X. Wang, K. Zhang.
Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow.
IEEE Symposium on Security and Privacy 2010.
PRESENTER: Sagar Sugandhi [slides]

10/30

10 minutes project progress report presentations
10/31

10 minutes project progress report presentations
11/1

M. Antonakakis, R. Perdisci, Y. Nadji, N. Vasiloglou, S. Abu-Nimeh, W. Lee, D. Dagon.
From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware. USENIX Security 2012
PRESENTER: Prof. Perdisci
[slides]
(no review for this week)
11/6

S. Jana et al.
Memento: Learning Secrets from Process Footprints
IEEE Symposium on Security and Privacy 2012
PRESENTER: Phani Vadrevu [slides]

11/7

Y. Wang et al.
Flash Memory for Ubiquitous Hardware Security Functions: True Random Number Generation and Device Fingerprints
IEEE Symposium on Security and Privacy 2012
PRESENTER:
Kevin Warrick [slides]

11/8

Z. Weinberg et al.
I Still Know What You Visited Last Summer: User interaction and side-channel attacks on browsing history
IEEE Symposium on Security and Privacy 2011
PRESENTER: Kyle Krafka
(no review for this week)
11/13

Fianl project report presentations
Send me a PDF copy of your presentation by 11/12, 8pm!
11/14

Fianl project report presentations
11/15

Fianl project report presentations
11/27

Z. Qian and Z. Morley Mao
Off-Path TCP Sequence Number Inference Attack -- How Firewall Middleboxes Reduce Security
IEEE Symposium on Security and Privacy 2012
PRESENTER:
Yuchen Ying
(no review for this week)
11/28
S. Axelsson.
The base-rate fallacy and the difficulty of intrusion detection.
ACM Transactions on Information System Security 3(3), 2000.
PRESENTER: Yu Qiu

11/29

R. Geambasu, T. Kohno, A. Levy, H. M. Levy.
Vanish: Increasing Data Privacy with Self-Destructing Data.
In Proceedings of the USENIX Security Symposium 2009.
PRESENTER: Kyle Krafka
Final research paper due on 12/04 at 11:59pm.

Page limit = 6 pages.
Use IEEE CS LaTeX template