Cloud and Mobile Security

Cloud and Mobile Security Seminar -- Spring 2013

Course Schedule

Below is the approximate paper reading schedule for the seminar. Please note that the schedule beyond one week is subject to change, so make sure you check this page frequently. Also, if you've been assigned to a paper and the paper changes, you will be in charge of presenting the new paper.

Topic
Date
Papers
Deadlines
Introduction
01/28

None; Class overview.

Slides.

Cloud Computing Challenges
02/04

Above the clouds: A Berkeley view of cloud computing. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, M. Zaharia. Technical Report UCB/EECS-2009-28, 2009. [PDF]
Presenter: Dmitriy Gromov.

Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. In Proceedings of the ACM Conference on Computing Communications Security (CCS), 2009. [PDF]
Presenter: Deepika Tunikoju.

Slides.

Cloud Computing: Cryptographic Solutions
02/11

CryptDB: Protecting Confidentiality with Encrypted Query Processing. Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, and Hari Balakrishnan. In Proceedings of SOSP, 2011. [PDF]. Presenter: Logan Donovan.

Continue unfinished discussion of the co-location attacks paper (leader Deepika).

Slides.

Project proposal due.

Paper presentation signup deadline.

02/18

SPORC: Group collaboration using untrusted cloud resources. A. Feldman, W. Zeller, M. Freedman, and E. Felten. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2010. [PDF]
Presenter: Dongxiang Yan

Computing arbitrary functions of encrypted data. C. Gentry. In Communications of the ACM, 2008. [PDF]
Presenter: Jiao Li

Slides.

Project research plan due.

Paper presentation assignment.

02/25

On the impossibility of cryptography alone. M. van Dijk and A. Juels. In Proceedings of the USENIX Workshop on Hot Topics in Security (HotSec), 2010. [PDF]
Presenter: Yu Wan

On the (im)practicality of securing untrusted computing clouds with cryptography. Y. Chen and R. Sion. Technical report, State University of New York, 2010. [PDF]
Presenter: Tingting Ai

Slides.

Cloud Computing: Trusted Hardware Solutions
03/04

Bootstrapping trust in commodity computers. B. Parno, J. M. McCune, and A. Perrig. In Proceedings of IEEE Symposium on Security and Privacy (Oakland), 2010. [PDF]
Presenter: Maria Taku.

Private virtual infrastructure for cloud computing. F. Krautheim. In Proceedings of the USENIX Workshop on Hot Topics in Cloud Computing (HotCloud), 2009. [PDF]
Presenter: Wen-Hsiang Shaw.

Slides.

03/11

Terra: a virtual machine-based platform for trusted computing. T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), 2003. [PDF]
Presenter: Riley Spahn, Xinhao Yuan

Slides.

Midterm project status presentations.

03/18
No class (spring break).
Cloud Computing: Trusted Hardware Solutions
03/25

Flicker: an execution infrastructure for TCB minimization. J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, H. Isozaki. In Proceedings of the European Conference on Computer Systems (EuroSys), 2008. [PDF].
Presenter: Kevin Morenski, Prachi Sanjiv Javeri

Slides.

Cloud Computing: Distributed-Trust Solutions
04/01

FairplayMP: A system for secure multi-party computation. A. Ben-David, N. Nisan, and B. Pinkas. In Proceedings of the ACM Conference on Computing Communications Security (CCS), 2008. [PDF]
Presenter: Priyank Singhal, Adarsh Banad

Vanish: Increasing data privacy with self-destructing data. R. Geambasu, T. Kohno, A. Levy, and H. M. Levy. In Proceedings of the USENIX Security Symposium, 2009. [PDF]
Presenter: Digvijay Singh.

Slides.

Cloud Computing: Auditing Solutions
04/08

PORs: Proofs of retrievability for large files. A. Juels and B. S. Kaliski Jr. In Proceedings of the ACM Conference on Computing Communications Security (CCS), 2007. [PDF]
Presenter: Faisal Wahbo, Kai-Wen Feng

How to tell if your cloud files are vulnerable to drive crashes. K. Bowers, M. van Dijk, A. Juels, A. Oprea, and R. Rivest. In Cryptology ePrint Archive (IACR), Report 2010/214, 2010. [PDF]
Presenter: Harshil Gandhi

Slides.

04/15
TBD (instructor is away).
Mobile Devices: Challenges and Some Solutions
04/22

TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. W. Enck, P. Gilbert, B. gon Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2010. [PDF]
Presenter: Gundeep Bindra.

These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications. P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS) , 2011. [PDF]
Presenter: Tianchen Yu

Slides.

Mobile Devices: Anti-Theft Solutions
04/29

Zero-interaction authentication. M. D. Corner and B. D. Noble. Zero-interaction authentication. In Proceedings of the Annual International Conference on Mobile Computing and Networking (MobiCom), 2002. [PDF]
Presenter: Anirudha Nanda

Keypad: An auditing file system for theft-prone devices. R. Geambasu, J. P. John, S. D. Gribble, T. Kohno, and H. M. Levy. In Proceedings of the European Conference on Computer Systems (EuroSys), 2011. [PDF]
Presenter: Kuber Kaul

Slides.

Project presentations
05/06

No papers; students present their projects.

Final project presentations.
Final Reports
05/10

No class.

Final reports due.