CSCI 8260 - Computer Network Attacks and Defenses

Spring 2016

This is the course calendar for the Fall 2014 semester. Please notice that the schedule is not definitive and will be updated as the course progresses. Students are responsible for visiting this page often to stay informed on the latest reading assignments and other information. Of course, I will also inform you of significant changes during the lectures, but this page is the one place you should refer to for all the details.

Date
Topic
Lecture / Reading Assignments
Other Assignments
1/11
Syllabus
CSCI-8260 Syllabus [slides]

1/12

AMICO - Malware Detection

1/14
Intro
Introduction to Computer and Network Security

1/19
Intro
Introduction to Computer and Network Security  Choose 3 papers from the TBD list below by 1/25 (send titles and rank via email)
1/21
Topics Introduction to Computer and Network Security [slides]

1/25
Topics
Overview of Research Topics
1/26
Topics
Overview of Research Topics
1/28
Topics
Overview of Research Topics [slides]

2/1
Networks
Networking concepts (HTTP)

2/2
Networks
Networking concepts (SMTP, DNS) [slides]

2/4
Networks Networking concepts (DNS)
2/8
ML Networking concepts (DNS)
2/9
ML Research presentation by Prof. Perdisci

2/11
Guest Lecture
Prof. Kyu Hyung Lee


2/15
ML Brief introduction to Pattern Recognition/Machine Learning concepts [slides]
2/16
ML
Brief introduction to Pattern Recognition/Machine Learning concepts
2/18
Projects Student research project presentations.
2/22

Guest lecture

2/23

Guest lecture
2/25

Guest lecture
2/29
DNS-based malware detection
Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee, David Dagon. "From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware". USENIX Security Symposium, 2012. Prof. Perdisci [slides]
3/1
Botnet takedown
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, G.  Vigna.
Your botnet is my botnet: analysis of a botnet takeover.
CCS '09: Proceedings of the 16th ACM conference on Computer and communications security.
PRESENTER:  Mostafa

3/3
Systems security
C. Cowan, P. Wagle, C. Pu, S. Beattie, J. Walpole.
Buffer overflows: attacks and defenses for the vulnerability of the decade.
Foundations of Intrusion Tolerant Systems, 2003
PRESENTER: Pranav

3/14
Android security
Adrienne Porter Felt et al.
Android Permissions Demystified
ACM conference on Computer and communications security, 2011
PRESENTER : Xingzi
Write Paper Review - review one of the papers presented between 3/3 and 3/17. Deadline: 3/28. Use this review template.
3/15
Passwords
Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano
The quest to replace passwords: a framework for comparative evaluation of Web authentication schemes
IEEE Symposium on Security and Privacy 2012
PRESENTER: Michael
Chose 3 papers out of this list by 3/18.
3/17 Spam
K. Levchenko et al.
Click Trajectories: End-to-End Analysis of the Spam Value Chain
IEEE Symposium on Security and Privacy 2011
PRESENTER: Luis

3/21

Student research project presentations (progress report).
3/22
Botnets
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov.
Spamming Botnets: Signatures and Characteristics.
SIGCOMM'08.
PRESENTER: Nicholas

3/24
Data privacy
R. Geambasu, T. Kohno, A. Levy, H. M. Levy.
Vanish: Increasing Data Privacy with Self-Destructing Data.
In Proceedings of the USENIX Security Symposium 2009.
PRESENTER: Karthika
Write Paper Review - review one of the papers presented between 3/22 and 3/24. Deadline: 3/31. Use this review template.
3/28
Android Malware
Yajin Zhou, Xuxian Jiang
Dissecting Android Malware: Characterization and Evolution
IEEE Symposium on Security and Privacy 2012
PRESENTER: Lovina

3/29
Android Security
What the App is That? Deception and Countermeasures in the Android User Interface
PRESENTER: Pranav

3/31
DNS Security
Connection-Oriented DNS to Improve Privacy and Security
PRESENTER: Michael
Write Paper Review - review one of the papers presented between 3/28 and 3/31. Deadline: 4/7. Use this review template.
4/4
Android Security
Cookies Lack Integrity: Real-World Implications
PRESENTER : Luis

4/5
Web Security
ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities
PRESENTER: Nicholas

4/7
App Security
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale
PRESENTER : Xingzi
Write Paper Review - review one of the papers presented between 4/4 and 4/7. Deadline: 4/14. Use this review template.
4/11
Browser Security
Trends and Lessons from Three Years Fighting Malicious Extensions
PRESENTER : Lovina

4/12
Web Security
The SICILIAN Defense: Signature-based Whitelisting of Web JavaScript
PRESENTER : Karthika

4/14
Web Security
The Unexpected Dangers of Dynamic JavaScript
PRESENTER: Michael
Write Paper Review - review one of the papers presented between 4/11 and 4/14. Deadline: 4/21. Use this review template.
4/18
Email
Security by Any Other Name: On the Effectiveness of Provider Based Email Security
PRESENTER : Lovina

4/19
Web Security
Meerkat: Detecting Website Defacements through Image-based Object Recognition
PRESENTER: Pranav

4/21
DDoS
Bohatei: Flexible and Elastic DDoS Defense
PRESENTER: Nicholas
Write Paper Review - review one of the papers presented between 4/18 and 4/21. Deadline: 5/28. Use this review template.
4/25
Attack Prediction
Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits
PRESENTER : Karthika

4/26
Vulnerabilities and Botnets
The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching
PRESENTER : Xingzi
Post-Mortem of a Zombie: Conficker Cleanup After Six Years
PRESENTER : Luis
Write Paper Review - review one of the papers presented between 4/25 and 4/26. Deadline: 5/5. Use this review template.
4/28

Final Student Research Project Presentations

5/2

Final Student Research Project Presentations Submit final research paper by 11:59pm on May 9, 2016. Important: Use LaTeX! Remember to submit a PDF copy of the paper, a zip file containing the LaTeX sources, and a zip archive containing the source code of your project.


Participate to Student Course Evaluations