CS557 - Secure Systems
Fall 2010
Prof. Sotiris Ioannidis, sotiris [at] ics.forth.gr
TA: Giorgos Chinis, chinis [at] csd.uoc.gr
hy557 [at] csd.uoc.gr
hy557-list [at] csd.uoc.gr
All students are kindly requested to subscribe to the mailing list and book a presentation as soon
as possible. Presentation schedule is as follows.
Legend: Green denotes paper presentation dates, Blue denotes project presentation dates
Topic Date Paper Presenter
Secure Systems - What it's all about 20/9 Introduction chinis
Secure Systems - What it's all about 22/9 Introduction chinis
Information Abuse
29/9
A Practical Attack to De-Anonymize Social Network Users tsikudis
Information Abuse
4/10
Investigation of Triangular Spamming: a Stealthy and Efficient Spamming Technique apapag
Information Abuse
6/10
A Practical Attack to De-Anonymize Social Network Users athyanop
Deployed Systems
11/10
Chip and PIN is Broken zakkak
Secure Systems
18/10
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity papaioan
Secure Systems
20/10
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity tsikudis
Languages and Systems Security
27/10
Joe-E: A Security-Oriented Subset of Java apapag
Languages and Systems Security
1/11
Preventing Capability Leaks in Secure JavaScript Subsets zakkak
Languages and Systems Security
3/11
Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation athyanop
Languages and Systems Security
15/11
Server-side Verification of Client Behavior in Online Games papaioan
Languages and Systems Security
22/11
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs tsikudis
Languages and Systems Security
24/11
Stealth DoS Attacks on Secure Channels apapag
Internet Security
1/12
Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent athyanop
Internet Security
6/12
The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution zakkak
Internet Security
8/12
WebCop: Locating Neighborhoods of Malware on the Web papaioan
Secure Medicine
12/12
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses tsikudis
Botnets
14/12
Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure apapag
Botnets
10/1
Insights from the Inside: A View of Botnet Management from Infiltration athyanop
Web Security
12/1
WebCop: Locating Neighborhoods of Malware on the Web papaioan
Multi-vendor Penetration Testing In The Advanced Metering Infrastructure zakkak

Valid XHTML 1.0 Transitional Valid CSS!