CAP6135: Malware and Software
Vulnerability Analysis
(Spring
2012)
Home
Schedule notes
Assignment
Class 1 (01/09): Course introduction, Software security
introduction
Class 2 (01/11): Software
security intro (continue); Basic
network security introduction
Class 3 (01/18): basic
network security (continue)
after class reading materials: "Smashing The Stack
For Fun And Profit", Alpha
One
"Buffer
Overflows: Attacks and Defenses for the Vulnerability of the
Decade," Crispin Cowan, et al.
Class 4 (01/23): Term
project description (written
notes)
Class 5 (01/25): Stack
Overflow I: Attack Introduction
Class 6 (01/30): Stack
Overflow example using GDB, Project 1
is assigned and due Feb. 14th via Webcourse; Possible Term
Project Topics (PDF)
Class 7 (02/01): Stack overflow(continue); Stack
Overflow II: Defense (written notes)
Class 8 (02/06): Stack overflow defense (continue); Find
Software Bugs
Class 9 (02/08): Find software bugs (continue); Introduce instructor's ACSAC'07 best student award paper on
fuzzing
Class 10 (02/13): ACSAC'07 paper continue; Example of term project topics
Class 11 (02/15): Program Verification & Other Types
of Vulnerabilities
Class 12 (02/20): Explanation of Programming project 1; Email spam; (homework 1 is assigned and due Feb. 27th late night;
term project proposal presentation slides should submitted at
late night Feb. 28th
Class 13 (02/22): Email spam (continue)
Class 14 (02/27): Email spam (continue, written notes)
Class 15 (02/29): Term
project
proposal presentation
Class 16 (03/12): example and introduction on
programming project 2; project 2 is assigned and due by 3AM 04/03
(i.e., late night on 04/02)
Class 17 (03/14): Virus; Paper presentation and summary
Class 18 (03/19): Virus (continue); worms
Class 19 (03/21): Yazan Jadaa "Detecting
Spammers on Social Networks"
Roberto Alberdeston "Privacy-preserving
p2p data sharing with oneswarm"
Class 20 (03/26): Melvin Rodriguez presents
"HomeAlone:
Co-Residency Detection in the Cloud via Side-Channel Analysis"
Yuyan Bao: "Automated
Whitebox Fuzz Testing"
Class 21 (03/28): Jungyao Zhang: "An Analysis of
Social Network-Based Sybil Defenses"
Libert Pichardo: "Vanish:
Increasing Data Privacy with Self-Destructing Data"
Class 22 (04/02): Mike Sekletar: "Countering Kernel Rootkits
with Lightweight Hook Protection"
Christopher Hodges: "TaintDroid:
An Information-Flow Tracking System for Realtime Privacy
Monitoring on Smartphone"
Class 23 (04/04): Kecong Tang: "CryptDB: Protecting
Confidentiality with Encrypted Query Processing"
Xinruo Zhang: "Click
Trajectories: End-to-End Analysis of the Spam Value Chain"
Class 24 (04/09): Ramya Pradhan: "Hey, You, Get Off of
My Cloud: Exploring Information Leakage in Third-Party Compute
Clouds"
Worms (continue); Botnets
Class 25 (04/11): Gavin Grant: "The Socialbot
Network: When Bots Socialize for Fame and Money"
Richard Landry: "TaintScope: A
Checksum-Aware Directed Fuzzing Tool for Automatic Software
Vulnerability Detection"
Class 26 (04/16): Kyle Martin: "Spamming
Botnet: Signatures and Characteristics"
Cheng Wei: "All Your
iFRAMEs Point to Us."
Class 27 (04/18): Ahmad Alzahrani: "Dude, where’s that IP?
Circumventing measurement-based IP geolocation"
Charles Tymms: "Protecting
Browsers from Extension Vulnerabilities"
Class 28 (04/23): face-to-face session
students final project presentation
Final exam time
(04/25 10:00am-12:50pm): face-to-face session students final
project presentation (continue)
Research papers for in-class presentation:
1. (Yuyan Bao) "Automated
Whitebox Fuzz Testing", P. Godefroid, M.Y. Levin, D. Molnar,
Annual Network & Distributed System Security Symposium (NDSS)
2008.
2. (Christopher Hodges) "TaintDroid: An
Information-Flow Tracking System for Realtime Privacy Monitoring
on Smartphone", William Enck, Peter Gilbert, Byung-gon Chun,
Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth,
USENIX Symposium on Operating Systems Design and Implementation
(OSDI), 2010.
3. (Junyao Zhang) "An
Analysis of Social Network-Based Sybil Defenses", Bimal
Viswanath, Ansley Post, Krishna P. Gummadi, Alan Mislove, SIGCOMM
2010.
4. (Kyle Martin) "Spamming
Botnet: Signatures and Characteristics". Yinglian Xie, Fang
Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten, and Ivan Osipkov.
SIGCOMM, 2008.
5. (Cheng Wei) "All
Your iFRAMEs Point to Us." Niels Provos and Panayiotis
Mavrommatis, Moheeb Abu Rajab, Fabian Monrose. 17th USENIX Security
Symposium, San Jose, CA, 2008.
6. (Charles Tymms) "Protecting
Browsers from Extension Vulnerabilities", Adam Barth, Adrienne
Porter Felt, Prateek Saxena, and Aaron Boodman. 17th Network and
Distributed System Security Symposium (NDSS), 2010.
7. "Blueprint:
Robust Prevention of Cross-site Scripting Attacks for Existing
Browsers", IEEE Symposium on Security and Privacy
(Oakland'09), Oakland, CA, May 2009.
8. (Ramya Pradhan) "Hey, You,
Get Off of My Cloud: Exploring Information Leakage in Third-Party
Compute Clouds", Thomas Ristenpart, Eran Tromer, Hovav
Shacham, and Stefan Savage, Proceedings of the ACM Conference on
Computer and Communications Security, Chicago, IL, November 2009.
9. (Gavin Grant) "The
Socialbot Network: When Bots Socialize for Fame and Money",
Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu,
ACSAC 2011 (Best paper award).
10. "HyperSafe:
A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow
Integrity," Zhi Wang, Xuxian Jiang, Proceedings of the 31st
IEEE Symposium on Security and Privacy (Oakland 2010), Oakland, CA,
May 2010.
11. (Mike Sekletar) "Countering
Kernel Rootkits with Lightweight Hook Protection," Zhi Wang,
Xuxian Jiang, Weidong Cui, Peng Ning, Proceedings of the 16th ACM
Conference on Computer and Communications Security (CCS 2009),
Chicago, IL, November 2009.
12. "VEX:
Vetting Browser Extensions for Security Vulnerabilities",
Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, and Marianne
Winslett, USENIX Security Symposium (Usenix), 2010 (best paper
award).
13. (Libert Tapia) "Vanish:
Increasing Data Privacy with Self-Destructing Data", Roxana
Geambasu, Tadayoshi Kohno, Amit A. Levy, and Henry M. Levy, USENIX
Security Symposium (Usenix), 2009 (best student paper award).
14. (Ricky Landry) "TaintScope:
A Checksum-Aware Directed Fuzzing Tool for Automatic Software
Vulnerability Detection", Tielei Wang, Tao Wei, Guofei Gu, Wei
Zou, 31st IEEE Symposium on Security & Privacy (Oakland),
Oakland, CA, May 2010. (Best Student Paper Award).
15. (Yazan Jadaa) "Detecting
Spammers on Social Networks", Gianluca Stringhini, Christopher
Kruegel, Giovanni Vigna, Annual Computer Security Applications
Conference (ACSAC), 2010. (Best student paper award).
16. (Roberto Alberdeston) "Privacy-preserving
p2p
data sharing with oneswarm", Tomas Isdal , Michael
Piatek , Arvind Krishnamurthy , Thomas Anderson, ACM
Sigcomm, 2010.
17. (Ahmad Alzahrani) "Dude,
where’s
that
IP?
Circumventing measurement-based IP geolocation", Phillipa
Gill, Yashar Ganjali, David Lie, Bernard Wong. Proceedings of the
19th USENIX Symposium on Security, 2010.
18. (Kecong Tang) "CryptDB:
Protecting Confidentiality with Encrypted Query Processing",
Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, Hari
Balakrishnan, 23rd ACM Symposium on Operating Systems Principles
(SOSP), 2011.
19. (Melvin Rodriguez) "HomeAlone:
Co-Residency Detection in the Cloud via Side-Channel Analysis",
Yinqian Zhang, Ari Juels, Alina Oprea, Michael K. Reite, IEEE
Symposium on Security and Privacy 2011.
20. (Xinruo Zhang) "Click
Trajectories: End-to-End Analysis of the Spam Value Chain",
Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon
Enright, Mark Felegyhazi, Chris Grier, Tristan Halvorson, Chris
Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver,
Vern Paxson, Geoffrey M. Voelker, Stefan Savage IEEE Symposium on
Security and Privacy 2011,