Reading List

This is a tentative list of research papers that we plan to read this semester. Please pick a paper that you are responsible to present, and register with me in person or by email no later than September 24, 2007. First come first serve. If the paper you have in mind has been chosen by other people, please pick another one that is still open. Schedule will be set up after everyone has chosen a paper.

Denial-of-Service Attacks

DDoS Defense by Offense, Michael Walsh, Mythili Vutukuru, Hari Balakrishnan, David Karger, Scott Shenker, Proceedings of SIGCOMM 2006, September 2006. -- to be presented by Ivanka Todorova

Countering DoS Attacks With Stateless Multipath Overlays, Angelos Stavrou, Angelos D. Keromytis, Proceedings of CCS 2005, November 2005.

A DoS-limiting Network Architecture, Xiaowei Yang, David Wetherall, Thomas Anderson, Proceedings of SIGCOMM 2005, August 2005. -- to be presented by Saurabh Lalwani

Roaming Honeypots for Mitigating Service-Level Denial-of-Service Attacks, Sherif M. Khattab, Chatree Sangpachatanaruk, Daniel Mossé, Rami Melhem, Taieb Znati, Proceedings of 24th International Conference on Distributed Computing Systems, March 2004. -- to be presented by Paul Sagona

802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions, John Bellardo and Stefan Savage, Proceedings of 12th USENIX Security Symposium, August 2003. -- to be presented by Hal Lindsey

Instrusion Detection

BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation, Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee, Proceedings of 16th USENIX Security Symposium, August 2007.

Polygraph: Automatically Generating Signatures for Polymorphic Worms, James Newsome, Brad Karp, Dawn Song, Proceedings of 2005 IEEE Symposium on Security and Privacy, May 2005.

Detecting Unknown Massive Mailing Viruses Using Proactive Methods, Ruiqi Hu, Aloysius K. Mok, Proceedings of 7th International Symposium on Recent Advances in Intrusion Detection (RAID 2004), September 2004.

Detecting Network Intrusions via Sampling: A Game Theoretic Approach, Murari Kodialam, T. V. Lakshman, Proceedings of IEEE INFOCOM 2003. -- to be presented by Eric Banks

Very Fast Containment of Scanning Worms, Nicholas Weaver, Stuart Staniford, and Vern Paxson, Proceedings of 13th USENIX Security Symposium, August 2004. 

Privacy and Anonymity

Providing Witness Anonymity in Peer-to-Peer Systems, Bo Zhu, Sanjeev Setia, and Shushil Jajodia, Proceedings of CCS 2006, October 2006.

M2: Multicasting Mixes for Efficient and Anonymous Communication, Ginger Perng, Michael K. Reiter, Chenxi Wang, Proceedings of 26th International Conference on Distributed Computing Systems, June 2006.

Anonymous Communications in Mobile Ad Hoc Networks, Yanchao Zhang, Wei Liu, Wenjing Lou, Proceedings of IEEE INFOCOM 2005, March 2005

Security and Privacy Issues in E-passports, Ari Juels, David Molnar, David Wagner, Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05), September 2005. -- to be presented by Anudeep Jassal

Tor: The Second-Generation Onion Router, Roger Dingledine, Nick Mathewson, Paul Syverson, Proceedings of 13th USENIX Security Symposium, August 2004. 

Key Management

Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage, Kevin Fu, Seny Kamara, Tadayoshi Kohno, Proceedings of 13th Annual Network and Distributed System Security Symposium, February 2006.

Key Infection: Smart Trust for Smart Dust, Ross Anderson, Haowen Chan, Adrian Perrig, Proceedings of 12th IEEE International Conference on Network Protocols, October 2004. -- to be presented by Sree P Kollipara

Just Fast Keying: Key Agreement in a Hostile Internet, William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold, ACM Transactions on Information and System Security (TISSEC), Vol. 7, No. 2, May 2004. -- to be presented by Jason Moulton

Tree-Based Group Key Management, Yongdae Kim, Adrian Perrig, Gene Tsudik, ACM Transactions on Information and System Security (TISSEC), Vol. 7, No. 1, February 2004.

Random Key Predistribution Schemes for Sensor Networks, Haowen Chan, Adrian Perrig, Dawn Song, Proceedings of 2003 IEEE Symposium on Security and Privacy, May 2003.  

Authentication

Seven Cardinal Properties of Sensor Network Broadcast Authentication, Mark Luk, Adrian Perrig, Bram Whillock, Proceedings of the fourth ACM Workshop on Security of Ad hoc and Sensor Networks (SASN 2006), October 2006.

An Effective Defense Against Email Spam Laundering, Mengjun Xie, Heng Yin, and Haining Wang, Proceedings of CCS 2006, October 2006.

Secure Authentication System for Public WLAN Roaming, Ana Sanz Merino, Yasuhiko Matsunaga, Manish Shah, Mobile Networks and Applications 10, 355–370, 2005. -- to be presented by Jordan Cardwell

New Approaches for Deniable Authentication, Mario Di Raimondo, Rosario Gennaro, Proceedings of CCS 2005, November 2005. -- to be presented by Krishna Nagar

A Modular Correctness Proof of IEEE 802.11i and TLS, Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell, Proceedings of CCS 2005, November 2005.

The Logic of Authentication Protocols, Paul Syverson and Iliano Cervesato, in Foundations of Security Analysis and Design, Springer Verlag LNCS 2171.

Access Control

On the Modeling and Analysis of Obligations, Keith Irwin, Ting Yu, and William H. Winsborough, Proceedings of CCS 2006, October 2006.

Comparing the Expressive Power of Access Control Models, Mahesh V. Tripunitara, Ninghui Li, Proceedings of CCS 2004, October 2004.

Firewall Design: Consistency, Completeness, and Compactness, Mohamed G. Gouda, Xiang-Yang Alex Liu, Proceedings of 24th International Conference on Distributed Computing Systems, March 2004. -- to be presented by Narendra Pentakota

Safety in Automated Trust Negotiation, William H. Winsborough, Ninghui Li, Proceedings of 2004 IEEE Symposium on Security and Privacy, May 2004.