Paper Leader
 Mon 1/26 Introduction
Keshav, S. (2007). How to read a paper. ACM SIGCOMM Computer Communication Review, 37(3), 83-84. LINK
 Roscoe, T. (2007). Writing reviews for systems conferences. LINK
 Wed 1/28 Measuring Attacks: Pay Per Install Colleen
Caballero, J., Grier, C., Kreibich, C., & Paxson, V. (2011). Measuring Pay-per-Install: The Commoditization of Malware Distribution. In USENIX Security Symposium. LINK VIDEO
 Mon 2/02
 Measuring Attacks: Government Attacks Colleen
Marczak, W. R., Scott-Railton, J., Marquis-Boire, M., & Paxson, V. (2014). When governments hack opponents: A look at actors and technology. In USENIX Security Symposium. LINK
 Wed 2/04
 Capabilities and Access Control Sam
Watson, R. N., Anderson, J., Laurie, B., & Kennaway, K. (2010). Capsicum: Practical Capabilities for UNIX. In USENIX Security Symposium (pp. 29-46). LINK
 Mon 2/09
 Low-level Software Attacks & Defenses Andrew
Cowan, C., Pu, C., Maier, D., Walpole, J., Bakke, P., Beattie, S., Grier, A., Wagle, P., Zhang, Q. & Hinton, H. (1998). StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In Usenix Security (Vol. 98, pp. 63-78). LINK
 Wed 2/11
 Privilege Separation  Corey
Provos, N., Friedl, M., & Honeyman, P. (2003). Preventing Privilege Escalation. In USENIX Security Symposium (Vol. 3). LINK
 Mon 2/16
 Inline Reference MonitorsColleen 
Goldberg, I., Wagner, D., Thomas, R., & Brewer, E. A. (1996). A secure environment for untrusted helper applications: Confining the wily hacker. In USENIX Security Symposium (Vol. 19). LINK
 Wed 2/18
 Sandboxing Corey
Sehr, D., Muth, R., Biffle, C., Khimenko, V., Pasko, E., Schimpf, K., Yee, B., & Chen, B. (2010). Adapting Software Fault Isolation to Contemporary CPU Architectures. In USENIX Security Symposium (pp. 1-12). LINK
 Mon 2/23
 Return Oriented Programming (ROP) Sarah G.
Shacham, H. (2007). The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In Proceedings of the 14th ACM conference on Computer and communications security (pp. 552-561). ACM. LINK (accessible from campus)
 Wed 2/25
 Control Flow Integrity (CFO) Sarah S.
Abadi, M., Budiu, M., Erlingsson, U., & Ligatti, J. (2005, November). Control-flow integrity. In Proceedings of the 12th ACM conference on Computer and communications security (pp. 340-353). ACM. LINK (accessible from campus)
 Mon 3/02
 CFI & ROP Mari
Davi, L., Lehmann, D., Sadeghi, A. R., & Monrose, F. (2014). Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection. In USENIX Security Symposium. LINK
 Wed 3/04
 No Class (colleen is out of town)
 Activity, no reading.  LINK
 Mon 3/09
 Browser Security #1 Andrew
Wang, H. J., Grier, C., Moshchuk, A., King, S. T., Choudhury, P., & Venter, H. (2009, August). The Multi-Principal OS Construction of the Gazelle Web Browser. In USENIX Security Symposium (Vol. 28). LINK
 Wed 3/11
 Browser Security #2 Linnea
Barth, A., Jackson, C., Reis, C., & TGC Team. (2008). The security architecture of the Chromium browser. Technical Report http://seclah. stanford. edu/websec/chromium. LINK
 Mon 3/16
 No Class (spring break)
  No reading
 Wed 3/18
 No Class (spring break)
  No reading
 Mon 3/23
 Static Analysis Mari
Bessey, A., Block, K., Chelf, B., Chou, A., Fulton, B., Hallem, S., Henri-Gros, C., Kamsky, A., McPeak, S., & Engler, D. A Few Billion Lines of Code Later: Using Static Analysis to Find Bugs in the Real World. Communications of the ACM, 53(2), 66-75. LINK
 Wed 3/25
 Smartphone Security #1 Linnea
Enck, W., Gilbert, P., Chun, B. G., Cox, L. P., Jung, J., McDaniel, P., & Sheth, A. N. (YEAR). TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In USENIX Security Symposium. LINK  VIDEO
 Mon 3/30
 Smartphone Security #2Chris
Egele, M., Kruegel, C., Kirda, E., & Vigna, G. (2011) PiOS: Detecting Privacy Leaks in iOS Applications. NDSS Symposium. LINK
 Wed 4/01
 Smartphone Security #3 Helen
Chen, Q. A., Qian, Z., & Mao, Z. M. (2014) Peeking into Your App without Actually Seeing it: UI State Inference and Novel Android Attacks. In USENIX Security SymposiumLINK  VIDEO
 Mon 4/06
 Symbolic Execution 18Davidson, D., Moench, B., Jha, S., & Ristenpart, T. (2013). FIE on Firmware: Finding Vulnerabilities in Embedded Systems using Symbolic Execution. in USENIX Security Symposium. LINK VIDEO
 Wed 4/08
 Web SecurityColleen
Felmetsger, V., Cavedon, L., Kruegel, C., & Vigna, G. (2010). Toward automated detection of logic vulnerabilities in web applications. In USENIX Security Symposium (pp. 143-160). LINK VIDEO
Felt, A. P., Ainslie, A., Reeder, R. W., Consolvo, S., Thyagaraja, S., Bettes, A., Harris, H., & Grimes, J. (2015) Improving SSL Warnings: Comprehension and Adherence. SIGCHI.
 Mon 4/13
 Software VerificationSarah S.
[Reference TO BE UPDATED] Modular Verification of Software Components in C, S. Chaki, et al. ICSE 2003. Link:
 Wed 4/15
 OS Security Sam
Murray, T., Matichuk, D., Brassil, M., Gammie, P., Bourke, T., Seefried, S., Lewis, C., Gao, X., & Klein, G. (2013). seL4: from General Purpose to a Proof of Information Flow Enforcement. IEEE Symposium on Security and Privacy. LINK
 Mon 4/20
 Isolated ExecutionColleen
McCune, J. M., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V., & Perrig, A. (2010). TrustVisor: Efficient TCB reduction and attestation. In Security and Privacy (SP), 2010 IEEE Symposium on (pp. 143-158). IEEE Symposium on Security and Privacy. LINK (available from campus)

Weinberger, J., Saxena, P., Akhawe, D., Finifter, M., Shin, R., & Song, D. (2011). A systematic analysis of XSS sanitization in web application frameworks. In Computer Security–ESORICS 2011 (pp. 150-171). Springer Berlin Heidelberg. LINK

 Wed 4/22
 Authentication Helen
Bonneau, J., Herley, C., van Oorschot, P. C., & Stajano, F. (2012) The Question to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes. IEEE Symposium on Security and Privacy. LINK
 Thurs 4/23
 Extra Class 11:00-12:00 (24)Presentations by UNC Chapel Hill graduate students in COMP 790-132 (Software Security)
 Mon 4/27
 Chip & Pin Sarah G.
Bond, M., Choudary, O., Murdoch, S. J., Skorobogatov, S., & Anderson, R. (YEAR). Chip and Skim: cloning EMV cards with the pre-play attack. IEEE Symposium on Security and Privacy. LINK
 Wed 4/29
 Last Class
 NOTES No reading