18732 Reading List
Part I: Secure Coding
- Aug 31: Introduction
Reflections
on trusting trust, by Thompson
Rudimentary
treatise on the construction of locks, Tomlinson.
- Sep 2:
Smashing
The Stack For Fun And Profit, Aleph One.
Buffer Overflows:
Attacks and Defenses for the Vulnerability of the Decade, Crispin
Cowan, et al.
- Sep 7:
A First
Step Towards Automated Detection of Buffer Overrun Vulnerabilities,
by David Wagner and Drew Dean
Buffer
Overrun Detection using Linear Programming and Static Analysis,
by Vinod Ganapathy, Somesh Jha, David Chandler, David Melski and David
Vitek.
High Coverage
Detection of Input-Related Security Faults, by Eric Larson and Todd
Austin.
- Sep 9:
CCured: Type-Safe
Retrofitting of Legacy Code. George C. Necula, Scott McPeak,
Westley Weimer.
Backwards-compatible bounds checking for arrays and pointers in C
programs, by R. Jones and P. Kelly.
A Practical Dynamic
Buffer Overflow Detector, by O. Ruwase and M. Lam.
- Sep 14:
Proof
Carrying Code, by George Necula and Peter Lee.
Extended Static Checking for Java, by Cormac Flanagan, K. Rustan
M. Leino, Mark Lillibridge, Greg Nelson, James B. Saxe, and Raymie Stata.
- Sep 16:
Exploiting
Format String Vulnerabilities, team teso.
Detecting
Format String Vulnerabilities With Type Qualifiers, by Shankar, Talwar,
Foster, Wagner
- Sep 21:
MOPS:
An Infrastructure for Examining Security Properties of Software, by
Hao Chen and David Wagner
Bugs
as Deviant Behavior: A General Approach to Inferring Errors in Systems Code,
by Dawson Engler, David Yu Chen, Seth Hallem, Andy Chou, and Benjamin Chelf
Checking System
Rules Using System-Specific, Programmer-Written Compiler Extensions,
by Dawson Engler, Benjamin Chelf, Andy Chou, and Seth Hallem
- Sep 23: Tool testing presentation
Part II: Secure OS
- Sep 28:
The
protection of information in computer systems, Saltzer and Schroeder.
(Skip, or skim, Section II.)
Protection,
Lampson.
- Sep 30:
A
note on the confinement problem, Lampson.
Efficient
Software-Based Fault Isolation
- Oct 5:
A Sense of Self for Unix Processes by S. Forrest, S. A. Hofmeyr, A.
Somayaji and T. A. Longstaff
Anomaly Detection Using Call Stack Information
by H. Hanping
Feng, O. Kolesnikov, P. Fogla, W. Lee and W. Gong
On Gray-Box Program Tracking for Anomaly Detection by Debin Gao, Michael K. Reiter and Dawn Song
- Oct 7:
Model-Carrying
Code: A Practical Approach for Safe Execution of Untrusted Applications by
R. Sekar, V.N. Venkatakrishnan, Samik Basu, Sandeep Bhatkar and Dan DuVarney
A Fast Automaton-Based Method for Detecting Anomalous Program
Behaviors by R. Sekar, M. Bendre, D. Dhurjati and P. Bollineni
- Oct 12: Attack survey presentation
- Oct 14: Guest lecturer (Lujo Bauer)
Enforceable
security policies, Fred B. Schneider
SASI Enforcement
of Security Policies: A Retrospective, Erlingsson and Schneider
- Oct 19: Guest lecturer (Chris Long)
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 by Alma Whitten and J. D. Tygar
Trusted Paths for Browsers by E. Ye and S.W. Smith
- Oct 21: midterm
- Oct 26: Guest lecturer TBD
- Oct 28: Guest lecturer (David Brumley)
Privtrans: Automatic Privilege Separation by
David Brumley and Dawn Song
A Flexible
Containment Mechanism for Executing Untrusted Code
- Nov 2:
Checking
for Race Conditions in File Accesses, by M. Bishop and M. Dilger.
Fixing Races for Fun and Profit: How to use access(2) by Dean, D., and A. Hu.
Dynamic
Detection and Prevention of Race Conditions in File Accesses, by
Eugene Tsyrklevich and Bennet Yee
Part III: Malcode Analysis and Defense and Other Topics
- Nov 4: Product survey presentation
- Nov 9:
Nachenberg,
Computer Virus-Antivirus Coevolution
Static
Analysis of Executables to Detect Malicious Patterns, by M. Christodorescu
and S. Jha.
- Nov 11:
Automated Generation and Analysis of Attack Graphs, Oleg Sheyner, Somesh
Jha, and Jeannette M. Wing,
- Nov 16: Guest Lecturer (Sanjit Seshia)
Automatic Discovery of API-Level Exploits by Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Thomas W. Reps and Randal E. Bryant
Deciding Quantifier-Free Presburger Formulas Using Parameterized Solution Bounds by Sanjit A. Seshia and Randal E. Bryant
- Nov 18: intrusion detection & defense
project milestone presentation
- Nov 23: Guest Lecturer (James Newsome)
Dynamic Taint Analysis: Automatic Detection, Analysis, and Signature Generation of Exploit Attacks on Commodity Software by James Newsome and Dawn Song
- Nov 25: thanksgiving, no class!
- Nov 30: Virtual Machines
A Virtual Machine Introspection Based Architecture for Intrusion Detection
Xen: the Art of Virtualization
- Dec 2: IDS
Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics
Bro: A System for Detecting Network Intruders in Real-Time
- Dec 7 & 9 : Project presentation & Demo (II)