Week |
Date |
Topic |
Readings |
Week 1
|
Jan 3
|
Intro; Security & Crypto Crash Course I
|
|
Jan 5
|
No class (to be rescheduled)
|
|
Week 2
|
Jan 10
|
Security & Crypto Crash Course II
|
|
Jan 12
|
TLS and HTTPS
|
Assigned:
-
DROWN: Breaking TLS using SSLv2. Aviram, Schinzel, Somorovsky, Heninger, Dankel, Steube, Valenta, Adrian, Halderman, Dukhovni, Käsper, Cohney, Engels, Paar, Shavitt, Openssl. Usenix Security. 2016.
-
Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS. Garman, Paterson, Van Der Merwe, Holloway. Usenix Security. 2015.
Recommended:
-
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice. Adrian, Bhargavan, Durumeric, Gaudry, Green, Halderman, Heninger, Springall, Thomé, Valenta, Vandersloot, Wustrow, Paul. CCS. 2015.
-
Lucky thirteen: Breaking the TLS and DTLS record protocols. AlFardan, Paterson. Oakland. 2013.
-
The First Few Milliseconds of an HTTPS Connection. Moser. 2009.
-
The Transport Layer Security (TLS) Protocol, Version 1.2. Dierks, Rescorla. 2008.
|
Week 3
|
Jan 17
|
Certificates
|
Assigned:
Recommended:
|
Jan 19
|
No class (to be rescheduled)
|
|
Week 4
|
Jan 24
|
Secure Messaging
|
Assigned:
-
SoK: Secure Messaging (extended version). Unger, Dechand, Bonneau, Fahl, Perl, Goldberg, Smith. 2015.
-
Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage. Garman, Green, Kaptchuk, Miers, Rushanan. Usenix Security. 2016.
|
Jan 26
|
Isolation
|
Assigned:
-
Native client: A sandbox for portable, untrusted x86 native code. Yee, Sehr, Dardyk, Chen, Muth, Ormandy, Okasaka, Narula, Fullagar. Oakland. 2009.
-
Capsicum: practical capabilities for UNIX. Watson, Anderson, Laurie, Kennaway. Usenix Security. 2010.
Recommended:
|
Jan 27
3–4:30pm in SS 107
|
Accountability & Tamper-evidence
|
Assigned:
Recommended:
|
Week 5
|
Jan 31
|
BFT
|
Assigned:
Recommended:
|
Feb 2
|
Fork Consistency
|
Assigned:
Recommended:
-
Beyond one-third faulty replicas in Byzantine fault tolerant systems. Li, Mazières. NSDI. 2007.
-
Depot: Cloud Storage with Minimal Trust. Mahajan, Setty, Lee, Clement, Alvisi, Dahlin, Walfish. OSDI. 2010.
-
Social networking with frientegrity: privacy and integrity with an untrusted provider. Feldman, Blankstein, Freedman, Felten. Usenix Security. 2012.
|
Week 6
|
Feb 6
10:30am–12pm in SS 401 (note different room)
|
Property-preserving (revealing?) Encryption I
|
Assigned:
Recommended:
|
Feb 7
|
Property-preserving (revealing?) Encryption II
|
Assigned:
Recommended:
-
Guidelines for Using the CryptDB System Securely. Popa, Zeldovich, Balakrishnan. 2015. Rebuttal to the CryptDB attack.
-
Attacking Encrypted Database Systems. Kamara. 2015. Rebuttal to the rebuttal of the CryptDB attack.
-
Response to "Breaking web applications built on top of encrypted data" (CCS 2016) by P. Grubbs, R. McPherson, M. Naveed, T. Ristenpart and V. Shmatikov. Helfer, Valdez, Popa, Stark, Zeldovich, Kaashoek, Balakrishnan. 2016. Rebuttal to the Mylar attack.
-
Mylar: The Guide for the Perplexed. Grubbs, Mcpherson, Naveed, Ristenpart, Shmatikov. 2016. Rebuttal to the rebuttal of the Mylar attack.
-
Leakage-Abuse Attacks Against Searchable Encryption. Cash, Grubbs, Ristenpart, Perry. CCS. 2015.
-
What Else is Revealed by Order-Revealing Encryption?. Durak, Dubuisson, Cash. CCS. 2016.
|
Feb 9
|
Trusted Computing
|
Assigned:
Recommended:
-
Reflections on trusting trust. Thompson. Communications of the ACM. 1984.
-
The ten page introduction to trusted computing. Martin, Others. Computing Laboratory, Oxford University Oxford. 2008.
-
TrInc: Small Trusted Hardware for Large Distributed Systems. Levin, Douceur, Lorch, Moscibroda. NSDI. 2009.
-
Logical attestation: an authorization architecture for trustworthy computing. Sirer, de Bruijn, Reynolds, Shieh, Walsh, Williams, Schneider. SOSP. 2011.
|
Week 7
|
Feb 14
|
Trusted Execution Environments I
|
Assigned:
Recommended:
-
Intel SGX Explained. Costan, Devadas. 2015.
-
OpenSGX: An Open Platform for SGX Research. Jain, Desai, Kim, Shih, Lee, Choi, Shin, Kim, Kang, Han. NDSS. 2016.
|
Feb 16
|
Side Channels I
|
Assigned:
Recommended:
-
A note on the confinement problem. Lampson. CACM. 1973.
-
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. Ristenpart, Tromer, Shacham, Savage. CCS. 2009.
-
When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography. Ristenpart, Yilek. NDSS. 2010.
-
Cross-VM side channels and their use to extract private keys. Zhang, Juels, Reiter, Ristenpart. CCS. 2012.
-
Scheduler-based Defenses against Cross-VM. Varadarajan, Ristenpart, Swift. Usenix Security. 2014.
-
Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud. Sinan İnci, Gülmezoğlu, Irazoqui, Eisenbarth, Sunar. 2015.
|
Week 8
|
Feb 21
|
Side Channels II
|
Assigned:
Recommended:
|
Feb 23
|
Trusted Execution Environments II
|
Assigned:
-
Observing and Preventing Leakage in MapReduce. Ohrimenko, Costa, Gkantsidis. CCS. 2015.
-
Oblivious Multi-Party Machine Learning on Trusted Processors. Ohrimenko, Schuster, Fournet, Nowozin, Vaswani, Costa, Ohrimenko, Schuster, Nowozin, Vaswani, Costa. Usenix Security. 2016.
Recommended:
|
Week 9
|
Feb 28
|
Verifiable Computation I
|
Assigned:
Recommended:
-
Making argument systems for outsourced computation practical (sometimes). Setty, McPherson, Blumberg, Walfish. NDSS. 2012.
-
Taking proof-based verified computation a few steps closer to practicality. Setty, Vu, Panpalia, Braun. Usenix Security. 2012.
-
Resolving the conflict between generality and plausibility in verified computation. Setty, Braun, Vu, Blumberg, Parno, Walfish. EuroSys. 2013.
|
Mar 2
|
Verifiable Computation II
|
Assigned:
Recommended:
|
Week 10
|
Mar 7
|
Cryptocurrencies I
|
Assigned:
-
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. Bonneau, Miller, Clark, Narayanan, Kroll, Felten, Foundation. Oakland. 2015.
-
Zerocash: Decentralized Anonymous Payments from Bitcoin. Ben-sasson, Chiesa, Garman, Green, Miers, Tromer. Oakland. 2014.
Recommended:
|
Mar 9
|
Cryptocurrencies II
|
Assigned:
Recommended:
|