Topic | Date | Paper | Presenter |
Secure Systems - What it's all about | 20/9 | Introduction | chinis |
Secure Systems - What it's all about | 22/9 | Introduction | chinis |
Information Abuse | 29/9 |
A Practical Attack to De-Anonymize Social Network Users | tsikudis |
Information Abuse | 4/10 |
Investigation of Triangular Spamming: a Stealthy and Efficient Spamming Technique | apapag |
Information Abuse | 6/10 |
A Practical Attack to De-Anonymize Social Network Users | athyanop |
Deployed Systems | 11/10 |
Chip and PIN is Broken | zakkak |
Secure Systems | 18/10 |
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity | papaioan |
Secure Systems | 20/10 |
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity | tsikudis |
Languages and Systems Security | 27/10 |
Joe-E: A Security-Oriented Subset of Java | apapag |
Languages and Systems Security | 1/11 |
Preventing Capability Leaks in Secure JavaScript Subsets | zakkak |
Languages and Systems Security | 3/11 |
Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation | athyanop |
Languages and Systems Security | 15/11 |
Server-side Verification of Client Behavior in Online Games | papaioan |
Languages and Systems Security | 22/11 |
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs | tsikudis |
Languages and Systems Security | 24/11 |
Stealth DoS Attacks on Secure Channels | apapag |
Internet Security | 1/12 |
Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent | athyanop |
Internet Security | 6/12 |
The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution | zakkak |
Internet Security | 8/12 |
WebCop: Locating Neighborhoods of Malware on the Web | papaioan |
Secure Medicine | 12/12 |
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses | tsikudis |
Botnets | 14/12 |
Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure | apapag |
Botnets | 10/1 |
Insights from the Inside: A View of Botnet Management from Infiltration | athyanop |
Web Security | 12/1 |
WebCop: Locating Neighborhoods of Malware on the Web | papaioan |
Multi-vendor Penetration Testing In The Advanced Metering Infrastructure | zakkak |