Cloud and Mobile Security Seminar -- Spring 2013 |
Below is the approximate paper reading schedule for the seminar. Please note that the schedule beyond one week is subject to change, so make sure you check this page frequently. Also, if you've been assigned to a paper and the paper changes, you will be in charge of presenting the new paper.
Topic |
Date |
Papers |
Deadlines |
Introduction |
01/28 |
None; Class overview. |
|
Cloud Computing Challenges |
02/04 |
Above the clouds: A Berkeley view of cloud computing.
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz,
A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica,
M. Zaharia. Technical Report UCB/EECS-2009-28, 2009.
[PDF] Hey, you, get off of my cloud: Exploring information leakage in
third-party compute clouds.
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage.
In Proceedings of the ACM Conference on Computing Communications
Security (CCS), 2009.
[PDF] |
|
Cloud Computing: Cryptographic Solutions |
02/11 |
CryptDB: Protecting Confidentiality with Encrypted Query Processing. Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, and Hari Balakrishnan. In Proceedings of SOSP, 2011. [PDF]. Presenter: Logan Donovan. Continue unfinished discussion of the co-location attacks paper (leader Deepika). |
Project proposal due. Paper presentation signup deadline. |
02/18 |
SPORC: Group collaboration using untrusted cloud resources.
A. Feldman, W. Zeller, M. Freedman, and E. Felten.
In Proceedings of the USENIX Symposium on Operating Systems Design
and Implementation (OSDI), 2010.
[PDF] Computing arbitrary functions of encrypted data.
C. Gentry.
In Communications of the ACM, 2008.
[PDF] |
Project research plan due. Paper presentation assignment. |
|
02/25 |
On the impossibility of cryptography alone.
M. van Dijk and A. Juels.
In Proceedings of the USENIX Workshop on Hot Topics in Security
(HotSec), 2010.
[PDF] On the (im)practicality of securing untrusted computing clouds
with cryptography.
Y. Chen and R. Sion.
Technical report, State University of New York, 2010.
[PDF] |
||
Cloud Computing: Trusted Hardware Solutions |
03/04 |
Bootstrapping trust in commodity computers.
B. Parno, J. M. McCune, and A. Perrig.
In Proceedings of IEEE Symposium on Security and Privacy
(Oakland), 2010.
[PDF] Private virtual infrastructure for cloud computing.
F. Krautheim. In Proceedings of the USENIX Workshop on Hot Topics
in Cloud Computing (HotCloud), 2009.
[PDF] |
|
03/11 |
|||
03/18 |
No class (spring break).
|
||
Cloud Computing: Trusted Hardware Solutions |
03/25 |
||
Cloud Computing: Distributed-Trust Solutions |
04/01 |
FairplayMP: A system for secure multi-party computation.
A. Ben-David, N. Nisan, and B. Pinkas.
In Proceedings of the ACM Conference on Computing Communications
Security (CCS), 2008.
[PDF] Vanish: Increasing data privacy with self-destructing data.
R. Geambasu, T. Kohno, A. Levy, and H. M. Levy.
In Proceedings of the USENIX Security Symposium, 2009.
[PDF] |
|
Cloud Computing: Auditing Solutions |
04/08 |
PORs: Proofs of retrievability for large files.
A. Juels and B. S. Kaliski Jr.
In Proceedings of the ACM Conference on Computing Communications
Security (CCS), 2007.
[PDF] How to tell if your cloud files are vulnerable to drive crashes.
K. Bowers, M. van Dijk, A. Juels, A. Oprea, and R. Rivest.
In Cryptology ePrint Archive (IACR), Report 2010/214, 2010.
[PDF] |
|
04/15 |
TBD (instructor is away).
|
||
Mobile Devices: Challenges and Some Solutions |
04/22 |
TaintDroid: An information-flow tracking system for realtime
privacy monitoring on smartphones.
W. Enck, P. Gilbert, B. gon Chun, L. P. Cox, J. Jung, P. McDaniel,
and A. N. Sheth.
In Proceedings of the USENIX Symposium on Operating Systems Design
and Implementation (OSDI), 2010.
[PDF] These Aren't the Droids You're Looking For: Retrofitting
Android to Protect Data from Imperious Applications.
P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall
In Proceedings of the 18th ACM Conference on Computer
and Communications Security (CCS) , 2011.
[PDF] |
|
Mobile Devices: Anti-Theft Solutions |
04/29 |
Zero-interaction authentication.
M. D. Corner and B. D. Noble. Zero-interaction authentication.
In Proceedings of the Annual International Conference on
Mobile Computing and Networking (MobiCom), 2002.
[PDF] Keypad: An auditing file system for theft-prone devices.
R. Geambasu, J. P. John, S. D. Gribble, T. Kohno, and H. M. Levy.
In Proceedings of the European Conference on Computer Systems
(EuroSys), 2011.
[PDF] |
|
Project presentations |
05/06 |
No papers; students present their projects. |
Final project
presentations. |
Final Reports |
05/10 |
No class. |
Final reports due. |