Seminar ScheduleFor full citations, additional readings and ideas for topics, see http://www.cs.virginia.edu/malware/papers.html.
Date Presenters Topic Readings 7 September Nate Paul Worms: past, present and future
Slides: Seminar Intro and Presentation
Spafford, A Failure to Learn from the Past.
Staniford, Paxson and Weaver. How to 0wn the Internet in Your Spare Time.
Virus and Anti-Virus
Cohen, Computer Viruses - Theory and Experiments.
Christodorescu and Jha. Testing Malware Detectors. ISSTA 2004.
Kruegel, Robertson, Valeur and Vigna. Static Disassembly of Obfuscated Binaries. USENIX Security 2004.
21 September Ana Nora Sovarel
Monoculture and Diversity
Geer, et. al. CyberInsecurity: The Cost of Monopoly — How the Dominance of Microsoft's Products Poses a Risk to Security.
Kc, et. al. Countering Code-Injection Attacks With Instruction-Set Randomization. CCS 2003.
Bhatkar, DuVarney, and Sekar. Address Obfuscation: an Efficient Approach to Combat a Broad Range of Memory Error Exploits. USENIX Security 2003.
Propagation and Containment
Kephart and White. Directed-Graph Epidemiological Models of Computer Viruses. Oakland 1991.
Moore, Shannon, Voelker and Savage. Internet Quarantine: Requirements for Containing Self-Propagating Code. INFOCOM 2003.
Weaver, Staniford and Paxson. Very Fast Containment of Scanning Worms. USENIX Security 2004.
5 October Dean Bushey
Standler, Ronald B. Possible Vicarious Liability for Computer Users in the USA?, 17 April 2004.
Standler, Ronald B. Examples of Malicious Computer Programs, 2002.
Coleman, Jules. Theories of Tort Law, Stanford Encyclopedia of Philosophy. 20 Otcober 2003.
Project Proposals Due
Cyberwarfare Joshua Green, The Myth of Cyberterrorism. Washington Monthly, November 2002.
Institute for Security Technology Studies at Dartmouth College. Cyber Security of the Electric power industry. December 2002.
19 October Matt Elder and Darrell Kienzle, Symantec 26 October Richard Barnes
Bharath Madhusudan and John Lockwood, Design of a System for Real-Time Worm Detection. 12th Annual Proceedings of IEEE Hot Interconnects (HotI-12). Stanford, CA, August, 2004, pp. 77-83.
Stuart E. Schechter, Jaeyeon Jung, and Arthur W. Berger. Fast Detection of Scanning Worm Infections. The Seventh International Symposium on Recent Advances in Intrusion Detection (RAID), September 2004.
Xuan Chen and John Heidemann. Detecting Early Worm Propagation through Packet Matching. Technical Report ISI-TR-2004-585, USC/Information Sciences Institute, February, 2004.
2 November (Election Day) Nguyet Nguyen
Honeynet Project. Know Your Enemy: Honeynets. November 2003.
Honeynet Project. Know Your Enemy: GenII Honeynets. November 2003.
Niels Provos. A Virtual Honeypot Framework. USENIX Security 2004.
8 November, 3:30pm
Note: Monday meeting
Chenxi Wang, CMU 16 November Wei Hu
F. B. Schneider, G. Morrisett, and R. Harper. A language-based approach to security. Lecture Notes in Computer Science, 2001.
George Necula. Proof-Carrying Code. In 24th ACM Symposium on Principles of Programming Languages (POPL), January 1997.
23 November Project Presentations 30 November Project Presentations
University of Virginia
Department of Computer Science
CS 851: Malware Seminar