27 August: The paper for 10 September will be:

Unidirectional Key Distribution Across Time and Space with Applications to RFID Security by Ari Juels, Ravikanth Pappu, and Bryan Parno. USENIX Security Symposium 2008.

27 August: The updated presentation schedule is here. I have changed some things from the signup sheet to try to balance things better.

25 August: The first two papers are:

for 27 August: Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems by Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis, Pratap Subrahmanyam, Carl A. Waldspurger, Dan Boneh, Jeffrey Dwoskin, and Dan R. K. Ports. In Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '08), March 2008. [PDF]

for 3 September: Vanish: Increasing Data Privacy with Self-Destructing Data by Roxana Geambasu, Tadayoshi Kohno, Amit Levy, Henry M. Levy. USENIX Security Symposium, August 2009. [PDF] [Project Site]

If you are looking for ideas for research topics and papers to present, here are some links to some relevant conferences.

Course Information

Course Description: This special topics course is a research seminar in computer security. The course will focus on active research areas in computer security, but the specific topics will be largely determined by the interests of the students.

Meetings: Tuesdays and Thursdays, 3:30-4:45pm in Thorton Hall D222.

Coordinator: David Evans

Expected Background: Students in the seminar are expected to have enough background in theory, cryptography, operating systems, security, and networks to be able to understand research papers from security conferences. Students lacking relevant background will need to supplement the seminar readings with additional material.

Requirements: All students are expected to read and think about all of the assigned readings. Each student will be expected to present and lead the discussion a few times during the semester. The other major requirement is to complete a substantial research project. See for more details.

Format: The planned format for most seminar meetings will involve in-depth discussions of selected research papers. At the beginning of the meeting, students will be randomly selected to answer one of the core questions: (1) what problem is the work attempting to solve?, (2) what are the major contributions of the work?, (3) what is the key claimed result?. After these questions have been satisfactorily answered, the scheduled discussion leader will present the paper and lead a discussion that goes into some technical depth on the work. For most papers, we will have a second seminar meeting that follows up on the original presentation. The student assigned to lead the second meeting is responsible for addressing unresolved questions at the first meeting, and for finding and presenting other works that relate to original paper.

Topics: Papers may be selected from any area of active security research. Examples of possible topics include binary analysis, botnets, cloud computing, privacy-preserving systms, TPMs, and virtual machines.