Below is the calendar for this semester course. This is the preliminary schedule, which will be altered as the semester progresses. It is the responsibility of the students to frequently check this web-page for schedule, readings, and assignment changes. As the professor, I will attempt to announce any change to the class, but this web-page should be viewed as authoritative. If you have any questions, please contact me (contact information is available at the course homepage).
Date | Topic | Assignments Due | Readings for Discussion (do readings before class) | |
01/11/11 | ( |
Course syllabus.
link Presenter: | ||
01/13/11 | ( |
Operating Systems Security - Ch 1
link Presenter:
Chapter 2: Why Systems Are Not Secure?. Morrie Gasser,
in Building a Secure Computer System, 1988.
link Presenter:
The Risks Digest
link Presenter:
Security Focus: BugTraq
link Presenter: | ||
01/18/11 | ( |
Operating Systems Security - Ch 2
link Presenter:
Computer Security Archives Project, Matt Bishop.
link Presenter:
Reference Monitor Concept, Trent Jaeger, Encyclopedia of Cryptography and Security, 2010.
link Presenter: | ||
01/20/11 | ( |
Operating Systems Security, Chapter 3
link Presenter:
Introduction and Overview of the Multics System F. J. Corbato and V. A. Vyssotsky, in Proceedings of the Fall Joint Computer Conference, 1965.
link Presenter: | ||
01/25/11 | ( |
Multics Security Evaluation: Vulnerability Analysis. Paul A. Karger and Roger R. Schell, Tech report ESD-TR-74-193, Hanscom AFB.
link Presenter:
Final Report of the Multics Kernel Design Project. Part I, pgs 1-13 Tech Report MIT/LCS/TR-196, Michael Schroeder, David Clark, Jerome Saltzer, D. Wells, MIT, 1977.
link Presenter: | ||
01/27/11 | ( |
Secure Virtual Architecture: A Safe Execution Environment for Commodity Operating Systems. John Criswell, Andrew Lenharth, Dinakar Dhurjati, and Vikram Adve, in Proceedings of the 21st Symposium on Operating System Principles, 2007.
link Presenter: | ||
02/01/11 | ( | Type Safety link |
Control-flow Integrity. Martin Abadi, Mihai Budiu,
Ulfar Erlingsson, and Jay Ligatti, in Proceedings of the
12th ACM Conference on Computer and Communications Security,
2005.
link Presenter:
Securing software by enforcing data-flow
integrity. Miguel Castro, Manuel Costa, and Tim Harris, in
Proceedings of the 7th Symposium on Operating Systems Design
and Implementation, 2006.
link Presenter: | |
02/03/11 | ( |
Operating Systems Security, Chapter 4
link Presenter:
The inevitability of failure: The flawed assumption of
computer security in modern computing environments. P. Loscocco,
S. Smalley, P. Muckelbauer, R. Taylor, J. Turner, and J. Farrell. In
Proceedings of the 21st National Information Systems Security
Conference, October 1998.
link Presenter: | ||
02/08/11 | ( |
Operating Systems Security, Chapter 5
link Presenter:
Lattice-Based Access Control Models. Ravi S. Sandhu, IEEE Computer, 1993.
link Presenter: | ||
02/10/11 | ( | VM Installation link |
A Comparison of Commercial and Military Computer
Security Policies. David D. Clark and David R. Wilson. In
Proceedings of the 1987 IEEE Symposium on Security and
Privacy, 1987.
link Presenter: | |
02/15/11 | ( |
Operating Systems Security, Chapter 5
link Presenter:
Scomp: A Solution to the Multilevel Security Problem. Lester J. Fraim in IEEE Computer, 1983.
link Presenter: | ||
02/17/11 | ( |
Fault Isolation for Device Drivers. Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, and Andrew S. Tanenbaum, in Proceedings of the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'09), pgs. 33-42, July 2009.
link Presenter: | ||
02/22/11 | ( |
Operating Systems Security, Chapter 7
link Presenter:
Providing Policy Control Over Object Operations in a
Mach Based System, Spencer E. Minear. In Proceedings of
the Fifth USENIX UNIX Security Symposium, 1995.
link Presenter: | ||
02/24/11 | ( |
Runtime verification of authorization hook placement for
the Linux Security Modules framework. Antony Edwards, Trent
Jaeger, and Xiaolan Zhang. In Proceedings of the 9th ACM
Conference on Computer and Communications Security, pages
225-234, 2002.
link Presenter: | ||
03/01/11 | ( |
Operating Systems Security, Chapter 8
link Presenter:
Integrating Flexible Support for Security Policies into
the Linux Operating System, Peter Loscocco and Stephen
Smalley. In Proceedings of the FREENIX Track: 2001 USENIX
Annual Technical Conference, 2001.
link Presenter: | ||
03/03/11 | ( | LSM project link |
Analyzing Integrity Protection in the SELinux Example Policy. Trent Jaeger, Xiaolan Zhang, and Reiner Sailer, in Proceedings of the 12th USENIX Security Symposium, 2003.
link Presenter: | |
03/08/11 | Spring Break - No class | |||
03/10/11 | Spring Break - No class | |||
03/15/11 | ( |
Operating Systems Security, Chapter 8
link Presenter: | ||
03/17/11 | ( |
Operating Systems Security, Chapter 10
link Presenter:
A Secure Identity-Based Capability System. Li Gong,
1989 IEEE Symposium Security and Privacy, May 1989.
link Presenter: | ||
03/22/11 | ( | Midterm (Take Home) |
New Secmark-based Network Controls for SELinux, James
Morris.
link Presenter:
Leveraging IPsec for Mandatory Per-Packet Access
Control, Trent Jaeger, David H. King, Kevin R. Butler, Serge
Hallyn, Joy Latten, Xiaolan Zhang. Proceedings of Second
International Conference on Security and Privacy in
Communication Networks, 2006.
link Presenter: | |
03/24/11 | ( |
Operating Systems Security, Chapter 11
link Presenter: | ||
03/29/11 | ( |
Overshadow: A Virtualization-Based Approach to
Retrofitting Protection in Commodity Operating
Systems. Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis,
Pratap Subrahmanyam, Carl A. Waldspurger (VMware), Dan Boneh
(Stanford), Jeffrey Dwoskin (Princeton), and Dan R.K. Ports
(MIT), in Proceedings of the 2008 Conference on
Architectural Support for Programming Languages and
Operating Systems, 2008.
link Presenter:
Splitting Interfaces: Making Trust Between Applications
and Operating Systems Configurable. Richard Ta-Min, Lionel
Litty and David Lie, in Proceedings of the 7th USENIX
Symposium on Operating Systems Design and Implementation
(OSDI 2006). Pages 279-292. November 2006.
link Presenter: | ||
03/31/11 | ( |
Operating Systems Security, Chapter 12
link Presenter: | ||
04/05/11 | ( | Attack Surface link |
Usable Mandatory Integrity Protection for Operating
Systems. Ninghui Li, Ziqing Mao, and Hong Chen, in
Proceedings of the 2007 IEEE Symposium on Security and
Privacy, 2007.
link Presenter:
Toward Automated Information-Flow Integrity Verification for Security-Critical Applications. Umesh Shankar, Trent Jaeger, and Reiner Sailer, in Proceedings of the Symposium on Network and Distributed Systems Security, 2006.
link Presenter: | |
04/07/11 | ( |
A Decentralized Model for Information Flow
Control. Andrew Myers and Barbara Liskov, in Proceedings of
the 16th ACM Symposium on Operating Systems Principles,
1997.
link Presenter: | ||
04/12/11 | ( |
Information flow control for standard OS abstractions. Maxwell Krohn et al, in Proceedings of the ACM Symposium on Operating Systems Principles, 2007.
link Presenter: | ||
04/14/11 | ( |
Outbound Authentication for Programmable Secure Coprocessors. Sean W. Smith, International Journal on Information Security, May 2004.
link Presenter:
Design and Implementation of a TCG-based Integrity Measurement Architecture. Reiner Sailer, Xiaolan Zhang, Trent Jaeger, and Leendert van Doorn, in Proceedings of the 13th USENIX Security Symposium, August 2004.
link Presenter: | ||
04/19/11 | ( |
Rootkit-Resistant Disks. Kevin R. B. Butler, Stephen McLaughlin and Patrick D. McDaniel, in Proceedings of the 15th ACM Conference on Computer and Communications Security, 2008.
link Presenter: | ||
04/21/11 | ( |
Saner: Composing Static and Dynamic Analysis to
Validate Sanitization in Web Applications. Davide Balzarotti
et al. in Proceedings of the 2008 IEEE Symposium on Security
and Privacy, 2008.
link Presenter: | ||
04/26/11 | ( |
Secure web browsing with the OP web browser. Chris Grier, Shuo Tang, and Samuel T. King (UIUC), in Proceedings of the 2008 IEEE Symposium on Security and Privacy, 2008.
link Presenter: | ||
04/28/11 | Final Exam |
.