Syllabus
| Date | |
|---|---|
| Apr 1 | Reflections on Trusting Trust by K. Thompson |
| Apr 3 | Capsicum: Practical Capabilities for UNIX by Watson et. al |
| Apr 8 | Protecting Users by Confining JavaScript with COWL by D. Stefan et al. |
| Apr 10 | No class |
| Apr 15 1 | RockSalt: Better, Faster, Stronger SFI for the x86 by G. Morrisett et al. |
| Apr 17 | AEG: Automatic Exploit Generation by T. Avgerinos et al. (lead by Stewart Grant and Shu-Ting Wang) |
| Apr 22 | How to Build Static Checking SystemsUsing Orders of Magnitude Less Code by F. Brown et al. (lead by Jeffrey Wang) |
| Apr 25 2 | The Meaning of Memory Safety by A. A. Amorim et al. (lead: Matthew Kolosick) |
| Apr 29 | No class |
| May 1 | Memory-safe Execution of C on a Java VM by M Grimmer et al. (lead: Alexander Harold Polus) |
| May 6 | Hacking Blind by A. Bittau et al. |
| May 8 | SoK: Shining Light on Shadow Stacks by N. Burrows et al. |
| May 13 | Spectre Attacks: Exploiting Speculative Execution by P. Kocher et al. (lead: Archit Mishra) |
| May 15 | Lucky Thirteen: Breaking the TLS and DTLS Record Protocols by N. J. AlFardan and K. G. Paterson. |
| May 20 | Implementing and Proving the TLS 1.3 Record Layer by A. Delignat-Lavaud et al. (lead by Vivek Arte) |
| May 22 | The first collision for full SHA-1 by M. Stevens et al. (Mark Shultz) |
| May 27 | No class |
| May 29 | seL4: Formal Verificaiton of an OS Kernel by G. Klein et al. (Shraddha Barke) |
| Jun 3 | Hyperkernel: Push-Button Verification of an OS Kernel by L. Nelson et al. (lead by Stewart Grant and Shu-Ting Wang) |
| Jun 5 | Some thoughts on security after ten years of qmail 1.0 by D. J. Bernstein Thirty Years Later: Lessons from the Multics Security Evaluation by P. A. Karger and R. R. Schell |
Additional reading:
- How to Read a Paper by S. Keshav
- How to Write a Great Research Paper by S. P. Jones
- How to Give a Great Research Talk by S. P. Jones
- On Preparing Good Talks by R. Jhala
- The Moral Character of Cryptographic Work by P. Rogaway