CS395T Topics in Computer Systems Research
This will be a reading seminar held 12pm-3pm on Thursdays in ACES 6.116. Each week we
will read one or two papers and have an in depth discussion. The
papers will be drawn mostly from modern operating system research
There will be one written paper, maximum 5 pages, formated like a
Introduction to the course and discussion.
Overshadow: a virtualization-based approach to retrofitting
protection in commodity operating systems
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis, Pratap
Subrahmanyam, Carl A. Waldspurger, Dan Boneh, Jeffrey Dwoskin, Dan
SPORC: Group Collaboration using Untrusted Cloud Resources
Ariel J. Feldman, William P. Zeller, Michael J. Freedman, and Edward W. Felten
An Analysis of Conficker's Logic and Rendezvous Points
Phillip Porras, Hassen Saidi, and Vinod Yegneswaran
Digging For Data Structures
Anthony Cozzie, Frank Stratton, Hui Xue, and Samuel T. King
Depot: Cloud storage with minimal trust.
Prince Mahajan, Srinath Setty, Sangmin Lee, Allen Clement,
Lorenzo Alvisi, Mike Dahlin, and Mike Walfish
Guest lecture, Vitaly Shmatikov.
Flicker: An Execution Infrastructure for TCB Minimization
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Hiroshi Isozaki
2010 Data Breach Investigations Report
Verizon RISK Team and the United States Secret Service
Towards Trusted Cloud Computing
Nuno Santos Krishna P. Gummadi Rodrigo Rodrigues
Attacking Intel® Trusted Execution Technology
Rafal Wojtczuk, Joanna Rutkowska, and Alexander Tereshkin
Life Beyond Distributed Transactions:
an Apostate's Opinion
Spring break (SOSP discussion day)
On Building Secure, Privacy-Preserving Systems
Vitaly Shmatikov and Emmett Witchel
as yet unpublished
Terra: A Virtual Machine-Based Platform for Trusted Computing
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh
Capsicum: practical capabilities for UNIX
Robert N. M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway
Usenix security 2010
W32.Sutxnet Dossier (ver 1.4)
Nicolas Falliere, Liam O. Murchu and Eric Chien
Can We Fix the Security Economics of Federated Authentication?
BASE: An ACID Alternative
ACM Queue 2008
The End of an Architectural Era
(It's Time for a Complete Rewrite)
Daniel J. Abadi,
Draft of position paper due. A complete introduction and outline for the rest of the paper is acceptable. It would be better to simply hand in a complete draft.
Wedge: Splitting Applications into Reduced-Privilege Compartments
Andrea Bittau, Petr Marchenko, Mark Handley, Brad Karp
The Geometry of Innocent Flesh on the Bone:
Return-into-libc without Function Calls (on the x86)
CCS 2007, extended version
Final draft of position paper is due. No extensions.
10 minute in-class presentation about your position paper.
Security in Plan 9
Usenix Security 2002, extended version
Systems Software Research is