Archive for the 'Papers' Category

Paper for Nov. 19 – The Protection of Information in Computer Systems

Tuesday, November 17th, 2009

Read Section 1, Basic Principles Of Information Protection, for Thursday

Paper for Nov 12 – Native Client: A Sandbox for Portable, Untrusted x86 Native Code

Thursday, November 5th, 2009

Best paper award for 2009 S&P

http://nativeclient.googlecode.com/svn/trunk/src/native_client/documentation/nacl_paper.pdf

Paper for Nov. 5 – Your Botnet is My Botnet

Sunday, November 1st, 2009

Your Botnet is My Botnet: Analysis of a Botnet Takeover by Stone-Gross et al. In Proceedings of CCS 2009. ACM Press, Nov. 2009. [PDF]

Readings for Thursday October 29th:

Thursday, October 22nd, 2009

From the DNI’s 60 Day Cyberspace Policy Review:
http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf

Executive Summary
Section 4: Incident Response  pages 24-30
Section 5 Encouraging Innovation pages 31-36

From Securing Cyberspace for the 44th Presidency:
http://csis.org/files/media/csis/pubs/081208_securingcyberspace_44.pdf
Section 5: Identity Management in Cybersecurity pages 61-65

Oct. 22 paper on RSA: [A Method for Obtaining Digital Signatures and Public-Key Cryptosystems]

Tuesday, October 13th, 2009

A Method for Obtaining Digital Signatures and Public-Key Cryptosystems by R.L. Rivest, A. Shamir, and L. Adleman, Communications of the ACM 21,2 (Feb. 1978), 120–126.

Paper for Oct 1 – The New Casper

Sunday, September 27th, 2009

The New Casper: Query Processing for Location Services without Compromising Privacy By Mohamed F. Mokbel, Chi-Yin Chow, Walid G. Aref. In Proceedings of the 32nd International Conference on Very Large Data Bases.

Paper for October 8: CCCP – Secure Remote Storage for Computational RFIDs

Saturday, September 19th, 2009

CCCP: Secure Remote Storage for Computational RFIDs By Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, and Ari Juels. In Proceedings of USENIX Security 2009.

Overshadow Response

Tuesday, September 15th, 2009

Overshadow response slides

Paper for 17 September: Hey, You, Get Off of My Cloud

Tuesday, September 8th, 2009

Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds by By Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. In Proceedings of CCS 2009. ACM Press, Nov. 2009. [PDF]

Paper for 10 September: Unidirectional Key Distribution

Thursday, August 27th, 2009

Unidirectional Key Distribution Across Time and Space with Applications to RFID Security by Ari Juels, Ravikanth Pappu, and Bryan Parno. USENIX Security Symposium 2008.