The course will cover papers which deal with Internet Systems and Technologies. We will cover subjects related to networks, security, privacy, etc.
Date |
Topic |
|
Presenter |
15/2 |
Introduction |
Introduction |
|
22/2 |
Deployment |
Saltzer, Jerome H., David P. Reed, and David D. Clark. End-to-end arguments in system design. ACM Transactions on Computer Systems (TOCS) 2.4 (1984): 277-288. |
|
24/2 |
Trust |
K. Thomson: Reflections on Trusting Trust (Turing Award Lecture) |
|
1/3 |
Passwords |
Georgios Kontaxis, Elias Athanasopoulos, Georgios Portokalidis, and Angelos D. Keromytis. SAuth: protecting user accounts from password database leaks. CCS '13. |
|
3/3 |
Passwords |
Juels, Ari, and Ronald L. Rivest. Honeywords: Making password-cracking detectable. Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. 2013. |
|
8/3 |
Passwords |
Wang, Ke Coby, and Michael K. Reiter. Using amnesia to detect credential database breaches. 30th USENIX Security Symposium (USENIX Security 21). 2021. |
|
10/3 |
Privacy Leaks |
Kellaris, Georgios, et al. Generic attacks on secure outsourced databases. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016. |
|
22/3 |
Passwords |
Gelernter, Nethanel & Kalma, Senia & Magnezi, Bar & Porcilan, Hen. (2017). The Password Reset MitM Attack. 251-267. 10.1109/SP.2017.9. |
Marios Gavaletakis |
24/3 |
DoS attacks |
Angelos D. Keromytis, Vishal Misra, and Dan Rubenstein. 2002. SOS: secure overlay services. In Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM '02). |
Andreas Theofanous |
29/3 |
Passwords |
Cappos, J., & Torres, S. (2014). PolyPasswordHasher: protecting passwords in the event of a password file disclosure. Dept. Comput. Sci. Eng., New York University, New York, NY, USA, Rep. TR-CSE-2013-02. |
Paschalis Bekos |
31/3 |
Invited Talk – Iason Polakis, UIC Xu Lin, Panagiotis Ilia, Saumya Solanki, and Jason Polakis, Phish in Sheep’s Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting. USENIX Security 2022 |
Invited Talk |
|
5/4 |
Audit |
Invited Talk – Kostas Chalkias, Facebook Ji, Yan, and Konstantinos Chalkias. Generalized Proof of Liabilities. Cryptology ePrint Archive (2021). |
Invited Talk |
7/4 |
Invited Talk – Alexandros Kapravelos, NCSU Jueckstock, Jordan, and Alexandros Kapravelos. Visiblev8: In-browser monitoring of javascript in the wild. Proceedings of the Internet Measurement Conference. 2019 |
Invited Talk |
|
12/4 |
Privacy |
Invited Talk – Spyros Antonatos, Aegis Sweeney, Latanya. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10, no. 05 (2002): 557-570. |
Invited Talk [slides] |
14/4 |
Attack surface reduction |
Invited Talk – Michalis Polychronakis, Stony Brook Defending against Memory Corruption and Transient Execution Attacks |
Invited talk |
3/5 |
Baggy bounds |
Periklis Akritidis, Manuel Costa, Miguel Castro, and Steven Hand. 2009. Baggy bounds checking: an efficient and backwards-compatible defense against out-of-bounds errors. USENIX Security 2009 |
Kostantinos Elaftheriou |
5/5 |
DoS attacks |
Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson. Practical Network Support for IP Traceback. In Proceedings of the 2000 ACM SIGCOMM Conference, pages 295--306, Stockholm, Sweden, August 2000 |
Eleftheria Plevridi |
10/5 |
Mobile security |
Elias P. Papadopoulos, Michalis Diamantaris, Panagiotis Papadopoulos, Thanasis Petsas, Sotiris Ioannidis, Evangelos P. Markatos. The Long-Standing Privacy Debate: Mobile Websites vs Mobile Apps. WWW 2017 |
Dionisis Kalochristianakis |
10/5 |
Tracking |
Papadogiannakis, E., Papadopoulos, P., Kourtellis, N., & Markatos, E. P. (2021, April). User tracking in the post-cookie era: How websites bypass gdpr consent to track users. In Proceedings of the Web Conference 2021 (pp. 2130-2141). |
Giannis Arakas |
19/5 |
Fake News |
Who Funds Misinformation? A Systematic Analysis of the Ad-related Profit Routines of Fake News sites. Emmanouil Papadogiannakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis |
Stratos Geronikolakis |
19/5 |
Attacks |
Singh, Sumeet, et al. Automated Worm Fingerprinting. OSDI. Vol. 4. 2004. |
Evangelia Skouloudi |
24/5 |
Dos Attacks |
Moore, David, et al. Inferring internet denial-of-service activity. ACM Transactions on Computer Systems (TOCS) 24.2 (2006): 115-139. |
Michail Raptakis |
26/5 |
Security |
Steven M. Bellovin. 2004. A Look Back at "Security Problems in the TCP/IP Protocol Suite". In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC '04). |
Kostas Spiridakis |
Requirements: each student has to give a lecture (one paper) and give a report on that paper.
Grades: Final exam: 80%, report: 10%, lecture: 10%. The final exam will be on the first paper of each date.