Friday, February 19, 2010

Spring 2010 Schedule

Security Reading Group is every other Monday at 330pm in Ollson 236D. The discussion leaders for the reading group this semester are as follows:

Feb 15: Yan Huang
Mar 1: Minh Le
Mar 15: Yuchen
Mar 29: Jeff S.
Apr 12: Peter S.
Apri 26: Kate M.

Monday, January 18, 2010

How to Join

You are always welcome to participate in our discussion of interesting security problems, either physically (showing up at the bi-weekly meetings in 2010 Spring semester) or on-line at this blog-site. If you want to subscribe to our mail list, here is the link:

Sunday, July 20, 2008

Get Familiar With All Those Research Conferences (CS)

To save your time with google, here is some links about the reputation of conferences in computer science. Anyway, as is always declared on every individual web page below, ranking the conferences is a subjective task, and they can only be used as a reference.

Computer Science Conference Ranking -- maintained by a dedicated organization -- there are many useful links to other ranking sources on this page.
Computer Science Conference Rankings -- maintained by Dr. Sourav S Bhowmick in NTU, Singapore
Computer Science Conference Rankings -- maintained by Ashwin Satyanarayana, a graduate student in SUNY Albany, US

Tuesday, July 15, 2008

07-16-2008 Seminar

Are you still able to remember all the elements of speculative execution, which you've learned in an architecture class way back in your college? Do you know there is a close relationship between this performance enhancement technique and an effective security insurance mechanism, such that we can shoot two birds with one stone?

If you feel a little bit confused, we are gathering in the default time, default room on Wednesday to dissolve your confusion. Yan is going to introduce an efficient dynamic taint analysis implementation that leverage hardware speculation support. The paper can be obtained from here.

As always, free lunch will be offered. Many thanks to Jeff for bringing the Indian food from Milan.

Sunday, June 22, 2008

06-26-2008 Seminar


Have you ever used any voice over IP service from companies such as Skype, Vonage, Yahoo? Recent years has witnessed a tremendous surge on this cool technology. However, despite their low charge (sometimes even free), do you know there are lots of security concerns associated with this business? Yes, the media has already given the public concern some coverage, for example, NewScientist had this article.

On the coming Thursday (06-26) Paul and Rachel are leading a discussion focusing on a potential tapping technique on
VOIP and possible countermeasures. It is a latest Security and Privacy paper, which is available from this link.

The seminar is open to anyone who is interested in the topic. As always, free lunch (French bread, cakes, donuts, and tomatoes) will be provided.

The presentation slides are available from here. (You need OpenOffice to open the file.)

Saturday, June 21, 2008

06-12-2008 Seminar

The paper discussed was the Patagonix paper from USENIX Security Symposium 2008. This is a interesting work about using virtualization technique to detect stealthy rootkits. The paper is available from this here .

The slides used in the discussion is available from here.