CS395T Topics in Computer Systems Research

This will be a reading seminar held 12pm-3pm on Thursdays in ACES 6.116. Each week we will read one or two papers and have an in depth discussion. The papers will be drawn mostly from modern operating system research and practice. There will be one written paper, maximum 5 pages, formated like a HotOS submission.

Schedule

1/20:
Introduction to the course and discussion.

1/27:
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis, Pratap Subrahmanyam, Carl A. Waldspurger, Dan Boneh, Jeffrey Dwoskin, Dan R.K. Ports
ASPLOS 2008

2/3:
SPORC: Group Collaboration using Untrusted Cloud Resources
Ariel J. Feldman, William P. Zeller, Michael J. Freedman, and Edward W. Felten
OSDI 2010
An Analysis of Conficker's Logic and Rendezvous Points
Phillip Porras, Hassen Saidi, and Vinod Yegneswaran
2009

2/10:
Digging For Data Structures
Anthony Cozzie, Frank Stratton, Hui Xue, and Samuel T. King
OSDI 2008
Depot: Cloud storage with minimal trust.
Prince Mahajan, Srinath Setty, Sangmin Lee, Allen Clement, Lorenzo Alvisi, Mike Dahlin, and Mike Walfish
OSDI 2010


2/17:
Guest lecture, Vitaly Shmatikov.

2/24:
Flicker: An Execution Infrastructure for TCB Minimization
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Hiroshi Isozaki
Eurosys 2008
2010 Data Breach Investigations Report
Verizon RISK Team and the United States Secret Service
2010


3/3:
Towards Trusted Cloud Computing
Nuno Santos Krishna P. Gummadi Rodrigo Rodrigues
HotCloud 2009
Attacking Intel® Trusted Execution Technology
Rafal Wojtczuk, Joanna Rutkowska, and Alexander Tereshkin
2009

3/10:
Life Beyond Distributed Transactions: an Apostate's Opinion
Pat Helland
CIDR 2007

3/17:
Spring break (SOSP discussion day)

3/24:
On Building Secure, Privacy-Preserving Systems
Vitaly Shmatikov and Emmett Witchel
as yet unpublished
Terra: A Virtual Machine-Based Platform for Trusted Computing
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh
SOSP 2003

3/31:
Capsicum: practical capabilities for UNIX
Robert N. M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway
Usenix security 2010
W32.Sutxnet Dossier (ver 1.4)
Nicolas Falliere, Liam O. Murchu and Eric Chien
Symantec, 2011

4/7:
Can We Fix the Security Economics of Federated Authentication?
Ross Anderson
2011
BASE: An ACID Alternative
Dan Pritchett
ACM Queue 2008
The End of an Architectural Era (It's Time for a Complete Rewrite)
Michael Stonebraker, Samuel Madden, Daniel J. Abadi, Stavros Harizopoulos, Nabil Hachem, Pat Helland
VLDB 2007

4/14:
Draft of position paper due. A complete introduction and outline for the rest of the paper is acceptable. It would be better to simply hand in a complete draft.
Wedge: Splitting Applications into Reduced-Privilege Compartments
Andrea Bittau, Petr Marchenko, Mark Handley, Brad Karp
NSDI 2008

4/21:
The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)
Hovav Shacham
CCS 2007, extended version

4/28:
Final draft of position paper is due. No extensions.
10 minute in-class presentation about your position paper.


5/5:
Security in Plan 9
Russ Cox, Eric Grosse, Rob Pike, Dave Presotto, Sean Quinlan
Usenix Security 2002, extended version
Systems Software Research is Irrelevant
Rob Pike
2000