Papers
- Understanding Android Security, W. Enck, M. Ongtang, P. McDaniel
- HMMPayl: an application of HMM to the analysis of the
HTTP Payload, D, Ariu and G. Giacinto
- A Survey of BGP Security, K. Butler, T. Farley, P. McDaniel, J. Rexford
- Bypassing Browser Memory Protections: Setting back browser security by 10 years, A. Sotirov and M. Dowd
- Busting Frame Busting: A Study of Clickjacking Vulnerabilities on Popular Sites, G. Rydstedt, E. Bursztein, D. Boneh, C. Jackson
- The Security Architecture of the Chromium Browser, A. Barth,
C. Jackson,
C. Reis,
Google Chrome Team
- Robust Defenses for Cross-Site Request Forgery, A. Barth,
C. Jackson, J. C. Mitchell
- Cross Site Scripting Explained, A. Klein
- A Security Evaluation of DNSSEC with NSEC3, J. Bau, J. C. Mitchell
- A DoS-limiting Network Architecture, X. Yang,
D. Wetherall,
T. Anderson
- Effective Bug Discovery: Kernel-Mode Coverage Analysis, vf
- ForceHTTPS: Protecting High-Security Web Sites
from Network Attacks, C. Jackson, A. Barth
- The Ghost In The Browser: Analysis of Web-based Malware
N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu
- Practical Network Support for IP Traceback,
S. Savage, D. Wetherall, A. Karlin, and T. Anderson
- Real World Fuzzing, C. Miller
- Advanced SQL Injection In SQL Server Applications, C. Anley
- Certified Lies: Detecting and Defeating Government
Interception Attacks Against SSL, C. Soghoian and S. Stamm
- Terra: A Virtual Machine-Based Platform for Trusted Computing,
T. Garfinkel, B. Pfaff, J. Chow, Me. Rosenblum, Dan Boneh
- Secure Session Management With Cookies for Web Applications,
C. Palmer
- An Illustrated Guide to the Kaminsky DNS Vulnerability, S. Friedl
Presentation Schedule
- September 28: TBD
- October 5: TBD
- October 12: TBD
- October 19: TBD
- October 26: TBD
- November 2: TBD
- November 9: TBD
- November 16: TBD
- November 23: TBD