CS395T Topics in Computer Systems Research

This will be a reading seminar held 12pm-3pm on Thursdays in ACES 6.116. Each week we will read one or two papers and have an in depth discussion. The papers will be drawn mostly from modern operating system research and practice. There will be one written paper, maximum 5 pages, formated like a HotOS submission.


Introduction to the course and discussion.

Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis, Pratap Subrahmanyam, Carl A. Waldspurger, Dan Boneh, Jeffrey Dwoskin, Dan R.K. Ports

SPORC: Group Collaboration using Untrusted Cloud Resources
Ariel J. Feldman, William P. Zeller, Michael J. Freedman, and Edward W. Felten
OSDI 2010
An Analysis of Conficker's Logic and Rendezvous Points
Phillip Porras, Hassen Saidi, and Vinod Yegneswaran

Digging For Data Structures
Anthony Cozzie, Frank Stratton, Hui Xue, and Samuel T. King
OSDI 2008
Depot: Cloud storage with minimal trust.
Prince Mahajan, Srinath Setty, Sangmin Lee, Allen Clement, Lorenzo Alvisi, Mike Dahlin, and Mike Walfish
OSDI 2010

Guest lecture, Vitaly Shmatikov.

Flicker: An Execution Infrastructure for TCB Minimization
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Hiroshi Isozaki
Eurosys 2008
2010 Data Breach Investigations Report
Verizon RISK Team and the United States Secret Service

Towards Trusted Cloud Computing
Nuno Santos Krishna P. Gummadi Rodrigo Rodrigues
HotCloud 2009
Attacking Intel® Trusted Execution Technology
Rafal Wojtczuk, Joanna Rutkowska, and Alexander Tereshkin

Life Beyond Distributed Transactions: an Apostate's Opinion
Pat Helland
CIDR 2007

Spring break (SOSP discussion day)

On Building Secure, Privacy-Preserving Systems
Vitaly Shmatikov and Emmett Witchel
as yet unpublished
Terra: A Virtual Machine-Based Platform for Trusted Computing
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh
SOSP 2003

Capsicum: practical capabilities for UNIX
Robert N. M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway
Usenix security 2010
W32.Sutxnet Dossier (ver 1.4)
Nicolas Falliere, Liam O. Murchu and Eric Chien
Symantec, 2011

Can We Fix the Security Economics of Federated Authentication?
Ross Anderson
BASE: An ACID Alternative
Dan Pritchett
ACM Queue 2008
The End of an Architectural Era (It's Time for a Complete Rewrite)
Michael Stonebraker, Samuel Madden, Daniel J. Abadi, Stavros Harizopoulos, Nabil Hachem, Pat Helland
VLDB 2007

Draft of position paper due. A complete introduction and outline for the rest of the paper is acceptable. It would be better to simply hand in a complete draft.
Wedge: Splitting Applications into Reduced-Privilege Compartments
Andrea Bittau, Petr Marchenko, Mark Handley, Brad Karp
NSDI 2008

The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)
Hovav Shacham
CCS 2007, extended version

Final draft of position paper is due. No extensions.
10 minute in-class presentation about your position paper.

Security in Plan 9
Russ Cox, Eric Grosse, Rob Pike, Dave Presotto, Sean Quinlan
Usenix Security 2002, extended version
Systems Software Research is Irrelevant
Rob Pike