DatesPaperPresenterResponder
27 Aug/1 Sept Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems by Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis, Pratap Subrahmanyam, Carl A. Waldspurger, Dan Boneh, Jeffrey Dwoskin, and Dan R. K. Ports. In Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '08), March 2008. [PDF] Ryan Layer Michael Deighan
3/8 September Vanish: Increasing Data Privacy with Self-Destructing Data by Roxana Geambasu, Tadayoshi Kohno, Amit Levy, Henry M. Levy. USENIX Security Symposium, August 2009. [PDF] [Project Site] Yan Huang Jiawei Huang, Ming Mao
10/15 September Unidirectional Key Distribution Across Time and Space with Applications to RFID Security by Ari Juels, Ravikanth Pappu, and Bryan Parno. USENIX Security Symposium 2008. Yu Yao Kirti Chawla
17/29 September Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds by By Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. In Proceedings of CCS 2009. Nov. 2009. [PDF] Minh Le Chih-hao Shen
1/6 October The New Casper: Query Processing for Location Services without Compromising Privacy by Mohamed F. Mokbel, Chi-Yin Chow, Walid G. Aref. In 32nd International Conference on Very Large Data Bases. Mona Sergi, Zak Fry Paul DiOrio, Derek Davis
8/13 October CCCP: Secure Remote Storage for Computational RFIDs By Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, and Ari Juels. In Proceedings of USENIX Security 2009. Kirti Chawla, Yuchen Zhou Tianhao Tong
22/27 October Jiawei Huang Mona Sergi
29 Oct/3 Nov Carrie Ruppar Zak Fry
5/10 November Paul DiOrio, Chih-hao Shen Ryan Layer, Carrie Ruppar
12/17 November Tianhao Tong, Ming Mao Yuchen Zhou, Yan Huang
19/24 November Michael Deighan, Derek Davis Minh Le, Yu Yao