tag:blogger.com,1999:blog-85188166868383486832024-02-08T07:09:32.713-08:00Security Reading Group @ UVaSecurity Lunch @ UVahttp://www.blogger.com/profile/17170764293403242162noreply@blogger.comBlogger9125tag:blogger.com,1999:blog-8518816686838348683.post-15894479824348249232010-02-19T07:42:00.000-08:002010-02-19T07:44:53.297-08:00Spring 2010 ScheduleSecurity Reading Group is every other Monday at 330pm in Ollson 236D. The discussion leaders for the reading group this semester are as follows:<br /><br />Feb 15: Yan Huang<br />Mar 1: Minh Le<br />Mar 15: Yuchen<br />Mar 29: Jeff S.<br />Apr 12: Peter S.<br />Apri 26: Kate M.Security Lunch @ UVahttp://www.blogger.com/profile/17170764293403242162noreply@blogger.com0tag:blogger.com,1999:blog-8518816686838348683.post-84197250015002105132010-01-18T13:42:00.000-08:002010-01-18T13:48:00.491-08:00How to JoinYou are always welcome to participate in our discussion of interesting security problems, either physically (showing up at the bi-weekly meetings in 2010 Spring semester) or on-line at this blog-site. If you want to subscribe to our mail list, here is the link: <a href="http://groups.google.com/group/uva-cs-sec?hl=en">http://groups.google.com/group/uva-cs-sec?hl=en</a>.Security Lunch @ UVahttp://www.blogger.com/profile/17170764293403242162noreply@blogger.com0tag:blogger.com,1999:blog-8518816686838348683.post-46504816779886834592009-05-27T10:08:00.000-07:002009-05-27T11:18:44.443-07:00Schedules<style type="text/css">th,td {text-align:center}<br /></style><span class="Apple-style-span" style=" ;font-family:'times new roman';"><span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;"><span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; "><br /><table border="1"><tbody><tr><th style="text-align: center; ">Date</th><th style="text-align: center; ">Topic</th><th style="text-align: center; ">Presenter</th></tr><tr><td style="text-align: center; "><a href="http://groups.google.com/group/uva-cs-sec/browse_thread/thread/b4114e075cdb5ed1">Apr 27</a></td><td style="text-align: center; "><a href="http://www.security.ece.orst.edu/papers/j37acmon.pdf">Efficient Montgomery Multiplication on GPUs</a></td><td style="text-align: center; ">David Noble</td></tr><tr><td style="text-align: center; "><a href="http://groups.google.com/group/uva-cs-sec/browse_thread/thread/77e52ba9e8c5505e">Mar 30</a></td><td style="text-align: center; "><a href="http://waterken.sourceforge.net/web-key/web-key-submission.pdf">Web-key: Mashing with Permission</a></td><td style="text-align: center; ">Yan Huang</td></tr><tr><td style="text-align: center; "><a href="http://groups.google.com/group/uva-cs-sec/browse_thread/thread/bcf71ff94118163f">Mar 9</a></td><td style="text-align: center; "><a href="http://groups.google.com/group/uva-cs-sec/browse_thread/thread/bcf71ff94118163f">Towards Practical Privacy for Genomic Computation</a></td><td style="text-align: center; ">Chi-Hao Shen</td></tr><tr><td style="text-align: center; "><a href="http://groups.google.com/group/uva-cs-sec/browse_thread/thread/90c5c76fae8bd2f0">Feb 23</a></td><td style="text-align: center; "><a href="http://www.usenix.org/events/sec06/tech/full_papers/berger/berger.pdf">vTPM: Virtualizing the Trusted Platform Module</a></td><td style="text-align: center; ">Jeffrey Shirley</td></tr><tr><td style="text-align: center; "><a href="http://groups.google.com/group/uva-cs-sec/browse_thread/thread/ca3825b92276a0f">Feb 16</a></td><td style="text-align: center; "><a href="http://www.cs.berkeley.edu/~dmolnar/library.pdf">Privacy and Security in Library RFID: Issues, Practices, and Architectures</a></td><td style="text-align: center; ">Yu Yao</td></tr><tr><td style="text-align: center; "><a href="http://groups.google.com/group/uva-cs-sec/browse_thread/thread/bcd795f494c38ad7">Feb 9</a></td><td style="text-align: center; "><a href="http://www.cs.ucdavis.edu/~hchen/paper/ccs08.pdf">OMash: Enabling Secure Web Mashups via Object Abstractions</a></td><td style="text-align: center; ">Yan Huang</td></tr></tbody></table></span></span></span>Security Lunch @ UVahttp://www.blogger.com/profile/17170764293403242162noreply@blogger.com0tag:blogger.com,1999:blog-8518816686838348683.post-36062289808723133792008-07-20T08:29:00.000-07:002008-07-20T08:58:43.167-07:00Get Familiar With All Those Research Conferences (CS)To save your time with google, here is some links about the reputation of conferences in computer science. Anyway, as is always declared on every individual web page below, ranking the conferences is a subjective task, and they can only be used as a reference.<br /><br /><a href="http://www.cs-conference-ranking.org/home.html">Computer Science Conference Ranking</a> -- maintained by a dedicated organization<br /><a style="font-style: italic;" href="http://cs.conference-ranking.net/index.html">http://cs.conference-ranking.net/index.html</a> -- there are many useful links to other ranking sources on this page.<br /><a href="http://www.ntu.edu.sg/home/ASSourav/crank.htm"><span style="font-style: italic;">Computer Science Conference Rankings</span></a> -- maintained by Dr. Sourav S Bhowmick in NTU, Singapore<br /><a href="http://www.cs.albany.edu/%7Eashwin/Conf_rank.html"><span style="font-style: italic;">Computer Science Conference Rankings</span></a> -- maintained by Ashwin Satyanarayana, a graduate student in SUNY Albany, USSecurity Lunch @ UVahttp://www.blogger.com/profile/17170764293403242162noreply@blogger.com0tag:blogger.com,1999:blog-8518816686838348683.post-40564230600853299392008-07-15T21:31:00.000-07:002008-07-15T21:44:54.258-07:0007-16-2008 SeminarAre you still able to remember all the elements of <span style="font-style: italic;">speculative execution,</span> which you've learned in an architecture class way back in your college? Do you know there is a close relationship between this performance enhancement technique and an effective security insurance mechanism, such that we can shoot two birds with one stone?<br /><br />If you feel a little bit confused, we are gathering in the default time, default room on Wednesday to dissolve your confusion. Yan is going to introduce an efficient dynamic taint analysis implementation that leverage hardware speculation support. The paper can be obtained from <a href="http://www.cs.ucsb.edu/%7Echong/papers/isca2008.pdf">here</a>.<br /><br />As always, free lunch will be offered. Many thanks to Jeff for bringing the Indian food from Milan.Security Lunch @ UVahttp://www.blogger.com/profile/17170764293403242162noreply@blogger.com0tag:blogger.com,1999:blog-8518816686838348683.post-42384983203086343382008-06-22T18:50:00.000-07:002008-07-06T09:08:30.210-07:0006-26-2008 Seminar<span style="font-weight: bold;font-family:georgia;" >Solicitation</span><br /><br /><span style="font-size:100%;">Have you ever used any voice over </span><span class="blsp-spelling-error" id="SPELLING_ERROR_0" style="font-size:100%;">IP</span><span style="font-size:100%;"> service from companies such as </span><span class="blsp-spelling-error" id="SPELLING_ERROR_1" style="font-size:100%;">Skype</span><span style="font-size:100%;">, </span><span class="blsp-spelling-error" id="SPELLING_ERROR_2" style="font-size:100%;">Vonage</span><span style="font-size:100%;">, Yahoo? Recent years has witnessed a tremendous surge on this cool technology. However, despite their low charge (sometimes even free), do you know there are lots of security concerns associated with this business? Yes, the media has already given the public concern some coverage, for example, NewScientist had this <a href="http://technology.newscientist.com/channel/tech/dn14124-compressed-web-phone-calls-are-easy-to-bug.html">article</a>.<br /><br />On the coming Thursday (06-26) Paul and Rachel are leading a discussion focusing on a potential tapping technique on </span><span class="blsp-spelling-error" id="SPELLING_ERROR_3" style="font-size:100%;">VOIP</span><span style="font-size:100%;"> and possible countermeasures. It is a latest Security and Privacy paper, which is available from this <a href="http://www.cs.jhu.edu/%7Ecwright/oakland08.pdf">link</a>.<br /><br />The seminar is open to anyone who is interested in the topic. As always, free lunch (French bread, cakes, donuts, and tomatoes) will be provided.<br /><br />The presentation slides are available from <a href="http://www.cs.virginia.edu/%7Eyh8h/Security.Lunch.Jun26/Accent%20Spotting.odp">here</a>. (You need OpenOffice to open the file.)<br /></span>Security Lunch @ UVahttp://www.blogger.com/profile/17170764293403242162noreply@blogger.com0tag:blogger.com,1999:blog-8518816686838348683.post-62641376385826426312008-06-21T21:04:00.000-07:002008-06-23T12:46:08.790-07:0006-12-2008 SeminarThe paper discussed was the Patagonix paper from USENIX Security Symposium 2008. This is a interesting work about using virtualization technique to detect stealthy rootkits. The paper is available from this <a href="http://www.eecg.toronto.edu/%7Elie/papers/Patagonix-Web-2008.pdf">here</a> .<br /><br />The slides used in the discussion is available from <a href="http://www.cs.virginia.edu/%7Eyh8h/Security.Lunch.Jun12/06-12-2008-Patagonix.pdf">here</a>.Security Lunch @ UVahttp://www.blogger.com/profile/17170764293403242162noreply@blogger.com0tag:blogger.com,1999:blog-8518816686838348683.post-51969635734639885182008-06-21T20:21:00.000-07:002008-06-23T12:55:08.343-07:00General Information<span style="font-weight: bold;">Suggested Schedule<br /><br /></span>Normally, we are focused on one recent conference paper, along with necessary background information from relevant papers, per meeting. <span style="font-weight: bold;"><br /></span>The suggested time allocation for each seminar is given below. But if necessary, you, as the presenter, can lead the discussion according to your own time schedule.<br />12:30~12:45 Lunch<br />12:45~12:05 Presentation<br />12:05~13:45 Discussion<br /><br /><br /><span style="font-weight: bold;">Suggested Sources of Papers</span><br /><br />Feel free to select a paper of your interested research topics. But make sure it somehow raises security concerns in computing.<br /><br />For those who are searching interesting papers, here is a list of top conferences on computer security.<br /><a href="http://www.ieee-security.org/TC/SP-Index.html">Security & Privacy</a><br /><a href="http://www.acm.org/sigs/sigsac/ccs/">CCS</a><br /><a href="http://www.isoc.org/isoc/conferences/ndss/">NDSS</a><br /><a href="http://www.usenix.org/events/bytopic/security.html">USENIX Security Symposium</a><br /><a href="http://www.iacr.org/conferences/">Crypto</a><br /><a href="http://www.iacr.org/conferences/">EuroCrypto</a>Security Lunch @ UVahttp://www.blogger.com/profile/17170764293403242162noreply@blogger.com0tag:blogger.com,1999:blog-8518816686838348683.post-9968216051406170222008-06-19T14:42:00.000-07:002008-06-23T09:35:05.836-07:00Schedules in the Summer '08During this summer term, the security reading group is going to meet regularly once every two weeks, that is, on Thursday <span style="font-weight: bold; color: rgb(255, 0, 0);">12:30</span> at room <span style="font-weight: bold; color: rgb(255, 0, 0);">228E.</span> In case there is an exception so that we cannot make it in room 228E, I will surely send a notification about the temporary location to the mailing list. So scheduled dates are,<br />Jun. 12, 26<br />Jul. 10, 24<br />Aug. 7, 21<br /><br />Volunteers for presentations are always welcome. Please contact me (<span class="blsp-spelling-error" id="SPELLING_ERROR_0">yh</span>8h at cs <span class="blsp-spelling-error" id="SPELLING_ERROR_1">virginia</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_2">edu</span>) if you want to sign up for a talk.<br /><br />You are also welcome to present your own work. If you feel like a practise conference talk but are not so comfortable about the regular meeting time, we can work out special meeting time for you.<br /><br />Most Important Fact: Lunch will be offered before the discussion for free!Security Lunch @ UVahttp://www.blogger.com/profile/17170764293403242162noreply@blogger.com0