EE515/IS523: Security of emerging systems
Calendar (subject to change depending on schdule)
Useful Links for Reading Papers
9/11/2024
- Topic: Cryptography in a Nutshell (2)
- Presenter: Yongdae Kim
- Reading List: "Overview of Cryptography" in Handbook of Applied Cryptography
9/25/2024
- Topic: How to Think about Security of New (Emerging) Systems?
- Videos: class_0925.mp4
- Presenter: Yongdae Kim
9/30/2024
- Topic: Software Engineering Failures and Malpractices
- Assignment: Reading Report
- Slides: VotingAutomoblie.pdf
- Videos: class_0930.mp4
- Reading List:
-
Yongdae Kim
A. Feldman, J. Halderman, and E. Felten,
"Security Analysis of the Diebold AccuVote-TS Voting Machine",
EVT'07
-
R1 R2 Yongdae Kim
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno,
"Comprehensive Experimental Analyses of Automotive Attack Surfaces",
USENIX Sec'11
10/2/2024
- Topic: Medical Devices
- Assignment: Reading Report
- Slides: Medical.pdf
- Videos: class_1002.mp4
- Reading List:
-
Yongdae Kim
D. Halperin, T. Heydt-Benjamin, B. Ransford, S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W.Maisel,
"Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses",
IEEE SP'08
-
R1 R2 Yongdae Kim
D. Foo Kune, J. Backes, S. Clark, D. Kramer, M. Reynolds, K. Fu, Y. Kim, and W. Xu,
"Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors"
, IEEE SP'13
10/9/2024 (No class: 한글날)
10/14/2024
- Topic: Autonomous Driving System (2)
- Assignment: Reading Report
- Slides: New-gen.pdf, TooGoodtobeSafe.pdf
- Videos: class_1014.mp4
- Reading List:
-
R1 Jiwoo Suh
T. Sato*, Y. Hayakawa*, R. Suzuki*, Y. Shiiki*, K. Yoshioka, and Q. A. Chen,
"LiDAR Spoofing Meets the New-Gen: Capability Improvements, Broken Assumptions, and New Attack Strategies",
NDSS'24
-
R2 Hyunmin Ju
P. Jing, Q. Tang, Y. Du, L. Xue, X. Luo, T. Wang, and S. Wu,
"Too good to be safe: Tricking lane detection in autonomous driving with crafted perturbations",
USENIX Security'21
10/16/2024
- Topic: Autonomous Driving System (3)
- Assignment: Reading Report
- Slides: MSFADV.pdf, PlanFuzz.pdf
- Videos: class_1016.mp4
- Reading List:
-
R1 Yubin Lee
Y. Cao, N. Wang, C. Xiao, D. Yang, J. Fang, R. Yang, Q. A. Chen, M. Liu, and B. Li,
"Invisible for both camera and lidar: Security of multi-sensor fusion based perception in autonomous driving under physical-world attacks",
IEEE SP'21
-
R2 Sangmin Woo (TA)
Z. Wan, J. Shen, J. Chuang, X. Xia, J. Garcia, J. Ma, and Q. A. Chen,
"Too Afraid to Drive: Systematic Discovery of Semantic DoS Vulnerability in Autonomous Driving Planning under Physical-World Attacks",
NDSS '22
10/21/2024 (Midterm Exam Period)
10/23/2024 (Midterm Exam Period)
10/30/2024
- Topic: Drones (2)
- Assignment: Reading Report
- Slides: Paralyzing_drones.pdf, DJI_DroneID.pdf
- Videos: class_1030.mp4
- Reading List:
-
R1 Changgeon Kang
J. Jang*, M. Cho*, J. Kim, D. Kim, and Y. Kim,
"Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels",
NDSS '23
-
R2 Donghyo Bang
N. Schiller, M. Chlosta, M. Schloegel, N. Bars, T. Eisenhofer, T. Scharnowski, F. Domke, L. Schönherr, and T. Holz,
"Drone Security and the Mysterious Case of DJI's DroneID.",
NDSS '23
11/4/2024
- Topic: Drones (3)
- Slides: Safe-hijacking.pdf, RVFuzzer.pdf
- Assignment: Reading Report
- Videos: class_1104.mp4
- Reading List:
-
R1 Pierre Jean Jacques Noyer
J. Noh, Y. Kwon, Y. Son, H. Shin, D. Kim, J. Choi, and Y. Kim,
"Tractor beam: Safe-hijacking of consumer drones with adaptive GPS spoofing",
TOPS'19
-
R2 Ilman Sharif Mohammad al Momin
T. Kim, C. H. Kim, J. Rhee, F. Fei, Z. Tu, G. Walkup, and D. Xu,
"RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing",
USENIX Sec'19
11/13/2024
- Topic: Machine Learning (2)
- Assignment: Reading Report
- Slides: DevilsWhisper.pdf, StealingML.pdf
- Videos: class_1113.mp4
- Reading List:
-
R1 Munim Hasan Wasi
Y. Chen, X. Yuan, J. Zhang, Y. Zhao, S. Zhang, K. Chen, and X. Wang,
"Devil's whisper: A general approach for physical adversarial attacks against commercial black-box speech recognition devices.",
USENIX Sec'20
-
R2 Donghyun Kim
F. Tramèr, F. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart,
"Stealing machine learning models via prediction APIs",
USENIX Sec'16
11/27/2024
- Topic: Cellular (4)
- Slides: Oranalyst.pdf Cellular_Diverity_and_Location_Tracking.pdf
- Videos: class_1127.mp4
- Assignment: Reading Report
- Reading List:
-
Yongdae Kim
B. Hong, S. Bae, and Y. Kim,
"GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier",
NDSS'18
-
R2 Isu Kim
T. Yang, S. M. Rashid, A. Ranjbar, G. Tan, and S. R. Hussain,
"ORANalyst: Systematic Testing Framework for Open RAN Implementations",
USENIX Sec'24
12/2/2024
- Topic: Cellular (5)
- Slides: SigOver.pdf UMA.pdf
- Videos: class_1202.mp4
- Assignment: Reading Report
- Reading List:
-
R1 Beomseok Oh (TA)
H. Yang, S. Bae, M. Son, H. Kim, S. Kim, and Y. Kim,
"Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE",
USENIX Sec'19
-
Taekkyung Oh@Syssec
T. Oh, S. Bae, J. Ahn, Y. Lee, D. T. Hoang, M. Kang, N. Tippenhauer, and Y. Kim,
"Enabling Physical Localization of Uncooperative Cellular Devices",
MobiCom'24
12/4/2024
- Topic: Satellite
- Slides: SecretsintheSky.pdf RECORD.pdf
- Videos: class_1204.mp4
- Assignment: Reading Report
- Reading List:
-
R1 Taeha Kim
J. Pavur, D. Moser, V. Lenders, and I. Martinovic,
"Secrets in the Sky: On Privacy and Infrastructure Security in DVB-S Satellite Broadband",
WISEC'19
-
R2 Younghyo Kang
E. Jedermann, M. Strohmeier, V. Lenders, and J. Schmitt,
"Record: A Reception-Only Region Determination Attack on LEO Satellite Users",
USENIX Sec'24
12/9/2024
- Topic: VR/AR
- Slides: BCIAttacks.pdf ItsAllInYourHead(set).pptx
- Videos: class_1209.mp4
- Assignment: Reading Report
- Reading List:
-
R1 Sihun Yang
I. Martinovic, D. Davies, M. Frank, D. Perito, T. Ros, and D. Song,
"On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces",
USENIX Sec'12
-
R2 Yuanxin Pang
Y. Zhang, C. Slocum, J. Chen, and N. Abu-Ghazaleh,
"It's all in your head (set): Side-channel attacks on ar/vr systems.",
USENIX Sec'23
12/11/2024
- Topic: Robotics
- Slides: RobotControl.pdf RoboFuzz.pdf
- Videos: class_1211.mp4
- Assignment: Reading Report
- Reading List:
-
R1 Weonji Choi@Syssec
D. Quarta, M. Pogliani, M. Polino, F. Maggi, A. M. Zanchettin, and S. Zanero,
"An experimental security analysis of an industrial robot controller",
IEEE SP'17
-
R2 Wonyoung Kim
S. Kim, and T. Kim,
"RoboFuzz: fuzzing robotic systems over robot operating system (ROS) for finding correctness bugs",
ACM ESEC/FSE'22
12/16/2024 (Final Exam Period)
12/18/2024 (Final Exam Period)
12/20/2024 (Final Presentation)
Useful
Links (Borrowed from Zhi-Li Zhang's 8211 web page)
- "Effective
Reading of
Papers in Science and Technology", by Michael Hanson and
Dylan McNameee
- "An
Evaluation of
the Ninth SOSP Submissions or How (and How Not) to Write a Good Systems
Paper", R. Levin, and D. D. Redell, ACM Operating Systems
Review, 17
(3), July 1983, pp 35-40.
- "How
to Increase the Chances Your Paper is Accepted at ACM SIGCOMM",
by Craig Partridge
- "How
to write a good research paper and give a good research talk",
S. L. Peyton Jones, J. Hughes, and J. Launchbury, ACM
SIGPLAN Notices 28 (11) Nov 1993.
- "The art of
Speaking",
by Mike Dahlin
- "Should
Computer
Scientists Experiment More?", by Walter Tichy
- "A
guide for new referees in theoretical computer science", by
Ian Parberry
- "How
to have a bad career in research/academia", by David Patterson
- "A Ph.D
is
Not Enough: A Guide to Survival in Science", by Peter J.
Feibelman (every science/engineer Ph.D student who is serious about a
research career should read this book!)
You
can also explore the CMU's
Advice on Research and Writing webpage and Armando Fox's webpage
on paper writing and presentations. Computer Research Association (CRA)
also has a
site for students with a lot of useful information.
|