EE515/IS523: Security 101: Think Like an Adversary
Calendar (subject to change depending on schdule)
Useful Links for Reading Papers
8/30/2018
- Topic: Course Introduction & Introduction to Security Engineering
- Presenter: Yongdae Kim
- Slides: pdf
- Reading List: "What is Security Engineering?" by Ross Anderson
9/6/2018
- Topic: Cryptography in a Nutshell
- Presenter: Yongdae Kim
- Slides: pdf
- Reading List: "Overview of Cryptography" in Handbook of Applied Cryptography
9/13/2018
- Topic: Access Control in a Nutshell
- Presenter: Yongdae Kim
- Slides: pdf
- Reading List: "Access Control" by Ross Anderson
9/20/2018
- Topic: Usable Security and Software Failures
- Assignment: Reading Report, Project Preproposal
- Reading List:
- Yongdae Kim A. Whitten and J. D. Tygar, "Why Johnny can't encrypt: a usability evaluation of PGP 5.0",
USENIX Sec'99 (slide)
- R1 Seokbin Yun Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu, "Dolphin Attack: Inaudible Voice Commands", ACM CCS'17 (slide)
- R2 Jinseob Jeong A. Feldman, J. Halderman, and E. Felten, "Security Analysis of the Diebold AccuVote-TS Voting Machine", EVT'07 (slide)
9/27/2018
- Topic: Automotive Security
- Assignment: Reading Report
- Reading List:
- Hyunki Kim S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno, "Comprehensive Experimental Analyses of Automotive Attack Surfaces", USENIX Sec'11 (slide)
- R1 Shuxuan Zhou Kyong-Tak Cho and Kang G. Shin., "Error Handling of In-vehicle Networks Makes Them Vulnerable", CCS'16 (slide)
- R2 Byungkyu Lee M. Contag and G. Li and A. Pawlowski and F. Domke and K. Levchenko and T. Holz and S. Savage, "How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles",
IEEE SP'17 (slide)
10/4/2018
- Topic: Network Security
- Assignment: Reading Report
- Reading List:
- R1 Mingjung Kim E. Chan-Tin, P. Wang, J. Tyra, T. Malchow, D. Foo Kune, N. Hopper, and Y. Kim, "Attacking the Kad Network - Real World Evaluation and High Fidelity Simulation using DVN", Wiley Security and Communication Networks 2009 (slide)
- R2 Yongdae Kim M. Schuchard, E. Y. Vasserman, A. Mohaisen, D. Foo Kune, N. Hopper, and Y. Kim, "Losing control of the Internet: Using the data plane to attack the control plane", NDSS'11 (slide)
- R1 Seunghan Hong H. Birge-Lee, Y. Sun, A. Edmundson, J. Rexford, and P. Mittal, "Bamboozling Certificate Authorities with BGP", Usenix Security'18 (slide)
10/11/2018
- Topic: Cellular Security #1
- Assignment: Reading Report, Project Proposal
- Reading List:
- R2 Hongil Kim@SysSec H. Kim, D. Kim, M. Kwon, H. Han, Y. Jang, D. Han, T. Kim, and Y. Kim, "Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations",
ACM CCS'15
- R1 Yongdae Kim B. Hong, S. Bae, and Y. Kim "GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier", NDSS'18 (slide)
- R2 Geonha Park Y. Go, J. Won, D. F. Kune, E. Y. Jeong, Y. Kim, and K. S. Park, "Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission",
NDSS'14 (slide)
10/18/2018 (Midterm Exam Period)
10/25/2018
- Topic: Cellular Security #2
- Assignment: Reading Report
- Reading List:
- R1 Suhrobjon Bozorov W Enck, P Traynor, P McDaniel, T La Porta, "Exploiting open functionality in SMS-capable cellular networks", ACM CCS'05 (slide)
- R2 David Ha D. Rupprecht, K. Kohls, T. Holz, and C. Pöpper, "Breaking LTE on Layer Two", IEEE S&P'19 (slide)
- R1 Hyuntae Kim R. Weinmann, "Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks", USENIX WOOT'12 (slide)
11/1/2018
- Topic: Breaking Cryptography & Critical Systems
- Assignment: Reading Report
- Reading List:
- R2 Sunggwang Kim N. Heninger, Z. Durumeric, E. Wustrow, and J. A. Halderman, "Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices", USENIX Sec'12 (slide)
- R1 Seungeon Lee C. Brubaker, S. Jana, B. Ray, S. Khurshid, and V. Shmatikov, "Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations",
IEEE SP'14 (slide)
- R2 Seeun Kim A. Bolshev, J. Larsen, and M. Krotofil, "A Rising Tide: Design Exploits in Industrial Control Systems", USENIX WOOT'16 (slide)
11/8/2018
- Topic: Medical Devices
- Assignment: Reading Report, Project Midterm Report
- Reading List:
- R1 Changkyoon Kim D. Halperin, T. Heydt-Benjamin, B. Ransford, S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W.Maisel, "Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses", IEEE SP'08 (slide)
- R2 Yeongmin Lee I. Martinovic, D. Davies, M. Frank, D. Perito, T. Ros, and D. Song, "On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces", USENIX Sec'12 (slide)
- R1 Nabi Lee Y. Park, Y. Son, H. Shin, D. Kim, and Y. Kim, "This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump", USENIX WOOT'16 (slide)
11/15/2018
- Topic: Sensor Security
- Assignment: Reading Report
- Reading List:
- R2 Jaehoon Kim D. Foo Kune, J. Backes, S. Clark, D. Kramer, M. Reynolds, K. Fu, Y. Kim, and W. Xu, "Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors", IEEE SP'13 (slide)
- R1 Seunggeun Baek C Bolton, S Rampazzi, C Li, A Kwong, W Xu, K Fu, "Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems", IEEE S&P'18 (slide)
- R2 Yongdae Kim Hocheol Shin, Dohyun Kim, Yujin Kwon, and Yongdae Kim, "Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications ",
CHES'17 (slide)
11/22/2018
- Topic: Low Level Attacks
- Assignment: Reading Report
- Reading List:
- R1 Hwigyeom Kim N. O. Tippenhauer, C. Popper, K. B. Rasmussen, and S. Capkun, "On the Requirements for Successful GPS Spoofing Attacks", ACM CCS'11
- R2 Hyunjin Choo J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, and Edward W. Felten, "Lest We Remember: Cold Boot Attacks on Encryption Keys", USENIX Sec'08
- R1 Sangsup Lee M. Seaborn and T. Dullien, "Exploiting the DRAM rowhammer bug to gain kernel privileges ,
Blackhat'15
11/29/2018
- Topic: Blockchain
- Assignment: Reading Report
- Reading List:
- R2 Benjamin Castellan Maria Apostolaki, Aviv Zohar, Laurent Vanbever, "Hijacking Bitcoin: Routing Attacks on Cryptocurrencies", IEEE SP'17
- R1 Yujin Kwon@SysSec Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Vasserman, and Yongdae Kim, "Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin",
ACM CCS'17
- R2 Mingyu Jeong Johannes Krupp and Christian Rossow, "teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts",
ACM CCS'17
12/6/2018 (Project Final Presentation)
- Topic: Project Final Presentation
- Assignment: Project Final Report
12/13/2018 (Final Exam Period)
Useful
Links (Borrowed from Zhi-Li Zhang's 8211 web page)
- "Effective
Reading of
Papers in Science and Technology", by Michael Hanson and
Dylan McNameee
- "An
Evaluation of
the Ninth SOSP Submissions or How (and How Not) to Write a Good Systems
Paper", R. Levin, and D. D. Redell, ACM Operating Systems
Review, 17
(3), July 1983, pp 35-40.
- "How
to Increase the Chances Your Paper is Accepted at ACM SIGCOMM",
by Craig Partridge
- "How
to write a good research paper and give a good research talk",
S. L. Peyton Jones, J. Hughes, and J. Launchbury, ACM
SIGPLAN Notices 28 (11) Nov 1993.
- "The art of
Speaking",
by Mike Dahlin
- "Should
Computer
Scientists Experiment More?", by Walter Tichy
- "A
guide for new referees in theoretical computer science", by
Ian Parberry
- "How
to have a bad career in research/academia", by David Patterson
- "A Ph.D
is
Not Enough: A Guide to Survival in Science", by Peter J.
Feibelman (every science/engineer Ph.D student who is serious about a
research career should read this book!)
You
can also explore the CMU's
Advice on Research and Writing webpage and Armando Fox's webpage
on paper writing and presentations. Computer Research Association (CRA)
also has a
site for students with a lot of useful information.
|