CAP6135: Malware and Software
Vulnerability Analysis
(Spring
2015)
Home
Schedule notes
Assignment
Class 1 (01/13): Course
introduction, Software
security introduction
Class 2 (01/15): Software security intro
(continue); term
project description (potential
term project topics)
Class 3 (01/20): Basic
network security introduction
Class 4 (01/22): Network security intro (continue);
Stack Overflow I: Attack
Introduction
Class 5 (01/27): Stack Overflow I: Attack Introduction
(continue)
Class 6 (01/29): Stack Overflow I: continue;
Stack Overflow example
using GDB; Programming Project 1 is released and
due Feb. 9th midnight via WebCourse
Class 7 (02/03): Stack
Overflow II: Defense
Class 8 (02/05): Find Software
Bugs
Class 9 (02/10):
Find software bugs (continue); Introduce instructor's ACSAC'07 best student award paper on
fuzzing
Class 10 (02/12): Email Spam
and Phishing Attacks; Homework 1 is assigned and due
Feb. 19th midnight
Class 11 (02/17): Email Spam (continue); Example of
man-made vulnerable code (fuzzTest-target.c,
fuzzTest100.c ) and
explanation slides
Class 12 (02/19): Explanation of program project 2;
Programming project 2 is assigned and due Mar. 3rd
midnight; Term project proposal slides are due Mar. 4th
midnight
Class 13 (02/24): Program
Verification & Other Types of Vulnerabilities
Class 14 (02/26): Botnets; Paper presentation and
Paper summary
Class 15 (03/03): Network
Traffic Monitoring Using Wireshark
Class 16 (03/05): Term project
proposal presentation
Class 17
(03/17): Paper presentation:
Continue Wireshark
introduction; Programming project 3 is
released and due Mar. 29th midnight via
WebCourse
(Joshua Keller) "Analyzing
Spammers' Social Networks For Fun and Profit
-- A Case Study of Cyber Criminal Ecosystem on
Twitter."
Class 18 (03/19): Paper
presentation:
(Rohit
Durvasula) "The Impact of Vendor
Customizations on Android
Security"
(Mohammed ALMARRI)
"Timing Analysis of Keystrokes and
Timing Attacks on SSH"
(Aleksandr
Nikolaev) "BotSniffer: Detecting
Botnet Command and Control
Channels in Network Traffic."
Class
19 (03/24): Paper
presentation:
(Rouda
Al-Kuwari)
"Efficient and
Scalable Socware
Detection in Online
Social Networks"
(Jaskaran
Bhatti) "Vetting
Undesirable Behaviors
in Android Apps with
Permission Use
Analysis."
(Vivek
Veeriah) "EXE:
automatically
generating inputs of
death"
Class
20 (03/26): First paper
summary assignment is assigned
for online session students
Paper presentation:
(Vishnu Vidyan)
"DART: directed automated random
testing"
(Vinay Chander)
"Preserving Link Privacy in Social
Network Based Systems"
(Aritz Lopez de
Brinas Gorosabel) "Detecting
Passive Content Leaks and
Pollution in Android
Applications,"
Class 21 (03/31): Paper presentation:
(Anusuya Arunachalam) "Verifiable
privacy-preserving multi-keyword text search
in the cloud supporting similarity-based
ranking"
(Sailakshmivaishnavi
Kalidindi) "Lares: An Architecture for
Secure Active Monitoring Using
Virtualization"
Class 22 (04/02): Paper presentation:
(Tripti Gupta) "TaintEraser:
protecting sensitive data leaks using
application-level taint tracking"
(Sindhu Muttineni)
"Privacy-preserving public auditing for
data storage security in cloud computing"
(Segrey Kovalenko) "An
Advanced Hybrid Peer-to-Peer Botnet"
Class 23 (04/07): Paper presentation:
(Gangadhar Mahadevan) "DTA++: Dynamic Taint
Analysis with Targeted Control-Flow
Propagation"
(Vinay Hegde Ganapati) "Dynamic taint
analysis for automatic detection,
analysis, and signature generation of
exploits on commodity software"
(Nishanth
Athelli) "On the Feasibility of
Side-Channel Attacks with Brain-Computer
Interfaces"
Class 24 (04/09): Paper presentation:
(Shrutha Keerthi Gandla) "TaintScope: A
Checksum-Aware Directed Fuzzing Tool for
Automatic Software Vulnerability Detection"
(Guillermo A. Gomez) "Large-Scale
Privacy-Preserving Mapping of Human
Genomic Sequences on Hybrid Clouds"
(Kumar Raghav
Poojari) "BotMiner: Clustering Analysis of
Network Traffic for Protocol- and
Structure-Independent Botnet Detection."
Class 25 (04/14): Paper presentation:
(Anvesh Thota) Garfinkel, Tal and Pfaff, Ben
and Chow, Jim and Rosenblum, Mendel and
Boneh, Dan. "Terra: A Virtual Machine-based
Platform for Trusted Computing"
(Basundhara Dey) "A Study
of Android Application Security"
Class 26 (04/16): Paper presentation:
(Kexin Liao) "P2PWNED:
Modeling and Evaluating the Resilience of
Peer-to-Peer Botnets"
(Navjot Singh Chhoker) "Protecting Browsers
from Extension Vulnerabilities"
Class 27 (04/21): Paper presentation:
(Shreyas Somashekara) "Whispers in the
Hyper-space: High-bandwidth and Reliable
Covert Channel Attacks inside the Cloud"
(Josh Eberst) "Hey, You,
Get Off of My Cloud: Exploring Information
Leakage in Third-Party Compute Clouds"
Class 28 (04/23): Virus Introduction; Our
Globecom'14 paper on click-tracking
blocker
Term project
presentation at the Final exam time (05/05
10:00am-12:50pm): Term project submission is
due May 3rd midnight via WebCourse; each
presentation lasts 10 to 15 minutes
In-Class Paper Presentation Paper List:
Fuzzing
1. (Vishnu Vidyan) "DART:
directed automated random testing", Godefroid,
Patrice; Klarlund, Nils; Sen, Koushik. ACM
SIGPLAN Conference on Programming Language Design and
Implementation (PLDI), 2005.
2. (Vivek Veeriah) "EXE: automatically
generating inputs of death", Cadar, Cristian and
Ganesh, Vijay and Pawlowski, Peter M. and Dill, David L.
and Engler, Dawson R. ACM Transaction on Information
System Security, 2008.
3. (Shrutha Keerthi Gandla) "TaintScope:
A Checksum-Aware Directed Fuzzing Tool for Automatic
Software Vulnerability Detection", Tielei Wang, Tao
Wei, Guofei Gu, Wei Zou. IEEE Symposium on
Security & Privacy (Oakland'10), 2010. (Best
Student Paper Award)
Tainted Analysis
1. (Vinay Hegde Ganapati) "Dynamic
taint analysis for automatic detection, analysis, and
signature generation of exploits on commodity software",
James Newsome, Dawn Song, Network and Distributed
Systems Security Symposium (NDSS), 2005.
2. (Gangadhar Mahadevan) "DTA++:
Dynamic Taint Analysis with Targeted Control-Flow
Propagation". Min Gyung Kang, Stephen McCamant,
Pongsin Poosankam, and Dawn Song. Proceedings of the
18th Annual Network and Distributed System Security
Symposium (NDSS), 2011.
3. (Tripti Gupta) "TaintEraser:
protecting sensitive data leaks using application-level
taint tracking". David (Yu) Zhu, Jaeyeon Jung,
Dawn Song, Tadayoshi Kohno, and David Wetherall. SIGOPS
Oper. Syst. Rev.,vol. 45(1), page(s): 142-154.
January 2011.
Cloud Security
1. (Josh Eberst) "Hey,
You, Get Off of My Cloud: Exploring Information Leakage
in Third-Party Compute Clouds", Thomas Ristenpart,
Eran Tromer, Hovav Shacham, and Stefan Savage, Proceedings
of the ACM Conference on Computer and Communications
Security (CCS), Chicago, IL, November 2009.
2. (Anusuya Arunachalam) "Verifiable
privacy-preserving multi-keyword text search in the
cloud supporting similarity-based ranking," W. Sun,
B. Wang, N. Cao, M. Li, W. Lou, Y.T. Hou, and H. Li,
IEEE Transactions on Parallel and Distributed Systems
(TPDS), 2014.
3. (Sindhu Muttineni) "Privacy-preserving
public auditing for data storage security in cloud
computing", Cong Wang, Qian Wang, Kui Ren, Wenjing
Lou, IEEE INFOCOM, 2010.
4. (Guillermo A. Gomez) "Large-Scale
Privacy-Preserving Mapping of Human Genomic Sequences on
Hybrid Clouds", Yangyi Chen, Bo Peng, Xiaofeng Wang
and Haixu Tang, NDSS Symposium 2012
Botnet
1. (Kumar Raghav Poojari) Guofei Gu,
Roberto Perdisci, Junjie Zhang, and Wenke Lee. "BotMiner:
Clustering Analysis of Network Traffic for Protocol- and
Structure-Independent Botnet Detection." In
Proceedings of the 17th USENIX Security Symposium
(Security'08), San Jose, CA, 2008.
2. (Segrey Kovalenko) Ping Wang, Sherri
Sparks, Cliff C. Zou. "An
Advanced Hybrid Peer-to-Peer Botnet", IEEE
Transactions on Dependable and Secure Computing, 7(2),
113-127, April-June,2010.
3. (Kexin Liao) "P2PWNED:
Modeling and Evaluating the Resilience of Peer-to-Peer
Botnets", Rossow, C.; Andriesse, D.; Werner, T.;
Stone-Gross, B.; Plohmann, D.; Dietrich, C.J.; Bos, H.,
IEEE Symposium on Security and Privacy, 2013.
4. (Aleksandr Nikolaev) Guofei Gu, Junjie
Zhang, and Wenke Lee. "BotSniffer:
Detecting Botnet Command and Control Channels in Network
Traffic." In Proceedings of the 15th Annual
Network and Distributed System Security Symposium
(NDSS'08), San Diego, CA, February 2008.
Smartphone Security
1. (Aritz Lopez de Brinas Gorosabel) Yajin
Zhou, Xuxian Jiang, "Detecting
Passive Content Leaks and Pollution in Android
Applications," Proceedings of the 20th Network and
Distributed System Security Symposium (NDSS 2013), San
Diego, CA, February 2013.
2. (Basundhara Dey) "A Study of
Android Application Security", William Enck, Damien
Octeau, Patrick McDaniel,and Swarat Chaudhuri, USENIX
Security Symposium, August 2011.
3. (Rohit Durvasula) Lei Wu, Michael Grace,
Yajin Zhou, Chiachih Wu, Xuxian Jiang, "The
Impact of Vendor Customizations on Android Security,"
Proceedings of the 20th ACM Conference on Computer and
Communications Security (CCS 2013), Berlin, Germany,
November 2013.
4. (Jaskaran Bhatti) Yuan Zhang, Min Yang,
Bingquan Xu, Zhemin Yang, Guofei Gu, Peng Ning, X. Sean
Wang and Binyu Zang. "Vetting
Undesirable Behaviors in Android Apps with Permission
Use Analysis." In Proc. of the 20th ACM Conference
on Computer and Communications Security (CCS’13), Berlin,
Germany, November 2013.
Social Networking Security
1. (Joshua Keller) Chao Yang, Robert Harkreader,
Jialong Zhang, Suengwon Shin, and Guofei Gu. "Analyzing
Spammers' Social Networks For Fun and Profit -- A Case
Study of Cyber Criminal Ecosystem on Twitter." in
Proceedings of the 21st International World Wide Web
Conference (WWW'12), Lyon, France, April 2012.
2. (Vinay Chander) "Preserving
Link Privacy in Social Network Based Systems".
Prateek Mittal, Charalampos Papamanthou, Dawn Song.
Proceedings of the 19th Annual Network and Distributed
System Security Symposium (NDSS). February 2013.
3. (Rouda Al-Kuwari) "Efficient
and Scalable Socware Detection in Online Social Networks",
Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha,
Michalis Faloutsos, USENIX Security Symposium 2012 .
Virtual Machine Security
1. (Anvesh Thota) Garfinkel, Tal and Pfaff, Ben and
Chow, Jim and Rosenblum, Mendel and Boneh, Dan. "Terra:
A Virtual Machine-based Platform for Trusted Computing",
Proceedings of the Nineteenth ACM Symposium on Operating
Systems Principles (SOSP'03), 2003.
2. (Sailakshmivaishnavi Kalidindi) Payne, Bryan D.
and Carbone, Martim and Sharif, Monirul and Lee,
Wenke, "Lares:
An Architecture for Secure Active Monitoring Using
Virtualization", Proceedings of the 2008 IEEE
Symposium on Security and Privacy (SP '08), 2008.
3. Ryan Riley, Xuxian Jiang, Dongyan Xu, "Guest-Transparent
Prevention of Kernel Rootkits with VMM-based Memory
Shadowing," Proceedings of the 11th International
Symposium on Recent Advances in Intrusion Detection (RAID
2008), Boston, MA, September 2008.
4. Zhi
Wang, Xuxian Jiang, "HyperSafe:
A Lightweight Approach to Provide Lifetime Hypervisor
Control-Flow Integrity," Proceedings of the 31st
IEEE Symposium on Security and Privacy (Oakland 2010),
Oakland, CA, May 2010.
Side-Channel Attack
1. (Mohammed ALMARRI) "Timing
Analysis of Keystrokes and Timing Attacks on SSH".
Song, Dawn Xiaodong and Wagner, David and Tian, Xuqing,
USENIX Security Symposium, 2001.
2. (Nishanth Athelli) "On
the Feasibility of Side-Channel Attacks with
Brain-Computer Interfaces", Ivan Martinovic, Doug
Daviesy, Mario Franky, Daniele Peritoy, Tomas Rosz, Dawn
Song, USENIX Security Symposium 2012.
3. (Shreyas Somashekara) Zhenyu Wu,
Zhang Xu, and Haining Wang, "Whispers
in the Hyper-space: High-bandwidth and Reliable Covert
Channel Attacks inside the Cloud", To appear in
IEEE/ACM Transactions on Networking, 2014.
Web Security
1. (Navjot Singh Chhoker) "Protecting
Browsers from Extension Vulnerabilities", Adam Barth
, Adrienne Porter Felt, Prateek Saxena, Aaron Boodman,
NDSS Symposium 2010.