The course will cover papers which deal with Internet Systems and Technologies. We will cover subjects related to networks, security, privacy, etc.
| Date | Topic | 
 | Presenter | 
| 15/2 | Introduction | Introduction | |
| 22/2 | Deployment | Saltzer, Jerome H., David P. Reed, and David D. Clark. End-to-end arguments in system design. ACM Transactions on Computer Systems (TOCS) 2.4 (1984): 277-288. | |
| 24/2 | Trust | K. Thomson: Reflections on Trusting Trust (Turing Award Lecture) | |
| 1/3 | Passwords | Georgios Kontaxis, Elias Athanasopoulos, Georgios Portokalidis, and Angelos D. Keromytis. SAuth: protecting user accounts from password database leaks. CCS '13. | |
| 3/3 | Passwords | Juels, Ari, and Ronald L. Rivest. Honeywords: Making password-cracking detectable. Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. 2013. | |
| 8/3 | Passwords | Wang, Ke Coby, and Michael K. Reiter. Using amnesia to detect credential database breaches. 30th USENIX Security Symposium (USENIX Security 21). 2021. | |
| 10/3 | Privacy Leaks | Kellaris, Georgios, et al. Generic attacks on secure outsourced databases. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016. | |
| 22/3 | Passwords | Gelernter, Nethanel & Kalma, Senia & Magnezi, Bar & Porcilan, Hen. (2017). The Password Reset MitM Attack. 251-267. 10.1109/SP.2017.9. | Marios Gavaletakis | 
| 24/3 | DoS attacks | Angelos D. Keromytis, Vishal Misra, and Dan Rubenstein. 2002. SOS: secure overlay services. In Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM '02). | Andreas Theofanous | 
| 29/3 | Passwords | Cappos, J., & Torres, S. (2014). PolyPasswordHasher: protecting passwords in the event of a password file disclosure. Dept. Comput. Sci. Eng., New York University, New York, NY, USA, Rep. TR-CSE-2013-02. | Paschalis Bekos | 
| 31/3 | Invited Talk – Iason Polakis, UIC Xu Lin, Panagiotis Ilia, Saumya Solanki, and Jason Polakis, Phish in Sheep’s Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting. USENIX Security 2022 | Invited Talk | |
| 5/4 | Audit | Invited Talk – Kostas Chalkias, Facebook Ji, Yan, and Konstantinos Chalkias. Generalized Proof of Liabilities. Cryptology ePrint Archive (2021). | Invited Talk | 
| 7/4 | Invited Talk – Alexandros Kapravelos, NCSU Jueckstock, Jordan, and Alexandros Kapravelos. Visiblev8: In-browser monitoring of javascript in the wild. Proceedings of the Internet Measurement Conference. 2019 | Invited Talk | |
| 12/4 | Privacy | Invited Talk – Spyros Antonatos, Aegis Sweeney, Latanya. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10, no. 05 (2002): 557-570. | Invited Talk [slides] | 
| 14/4 | Attack surface reduction | Invited Talk – Michalis Polychronakis, Stony Brook Defending against Memory Corruption and Transient Execution Attacks | Invited talk | 
| 3/5 | Baggy bounds | Periklis Akritidis, Manuel Costa, Miguel Castro, and Steven Hand. 2009. Baggy bounds checking: an efficient and backwards-compatible defense against out-of-bounds errors. USENIX Security 2009 | Kostantinos Elaftheriou | 
| 5/5 | DoS attacks | Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson. Practical Network Support for IP Traceback. In Proceedings of the 2000 ACM SIGCOMM Conference, pages 295--306, Stockholm, Sweden, August 2000 | Eleftheria Plevridi | 
| 10/5 | Mobile security | Elias P. Papadopoulos, Michalis Diamantaris, Panagiotis Papadopoulos, Thanasis Petsas, Sotiris Ioannidis, Evangelos P. Markatos. The Long-Standing Privacy Debate: Mobile Websites vs Mobile Apps. WWW 2017 | Dionisis Kalochristianakis | 
| 10/5 | Tracking | Papadogiannakis, E., Papadopoulos, P., Kourtellis, N., & Markatos, E. P. (2021, April). User tracking in the post-cookie era: How websites bypass gdpr consent to track users. In Proceedings of the Web Conference 2021 (pp. 2130-2141). | Giannis Arakas | 
| 19/5 | Fake News | Who Funds Misinformation? A Systematic Analysis of the Ad-related Profit Routines of Fake News sites. Emmanouil Papadogiannakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis | Stratos Geronikolakis | 
| 19/5 | Attacks | Singh, Sumeet, et al. Automated Worm Fingerprinting. OSDI. Vol. 4. 2004. | Evangelia Skouloudi | 
| 24/5 | Dos Attacks | Moore, David, et al. Inferring internet denial-of-service activity. ACM Transactions on Computer Systems (TOCS) 24.2 (2006): 115-139. | Michail Raptakis | 
| 26/5 | Security | Steven M. Bellovin. 2004. A Look Back at "Security Problems in the TCP/IP Protocol Suite". In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC '04). | Kostas Spiridakis | 
Requirements: each student has to give a lecture (one paper) and give a report on that paper.
Grades: Final exam: 80%, report: 10%, lecture: 10%. The final exam will be on the first paper of each date.


