Topic Area
|
Paper Name
|
Presenter
|
Date
|
Cloud Attacks |
T. Ristenpart, E. Tromer, H.
Shacham, and S. Savage, "Hey, You, Get Off of My Cloud!
Exploring Information Leakage in Third-Party Compute
Clouds," In Proceedings of the 16th ACM Conference on
Computer and communications security, Chicago, IL, November
2009. (PDF)
|
Anoop Yadav
|
January 29
|
|
|
|
|
Privacy and
Anonymity |
M. Reiter and A. Rubin,
"Crowds: Anonymity for Web Transactions" ACM Transactions on
Information and System Security Vol. 1 no. 1. June 1998 (PDF)
|
Mikhail Strizhov
|
January 29
|
M. J. Freedman and R. Morris,
"Tarzan: A Peer-to-Peer Anonymizing Network Layer. In
Proceedings of the 2002 ACM Conference on Computer and
Communications Security, Washington DC, November 2002. (PDF)
|
Dieudo Mulamba
|
February 5
|
R. Pang, M. Allman, V. Paxson
and J. Lee, "The Devil and Packet Trace Anonymization," ACM
SIGCOMM Computer Communication Review, Vol. 36, no. 1,
January 2006, pp. 29 - 38. (PDF)
|
Subhojit Mukherjee
|
February 5
|
S. E. Coull, C. V. Wright, A.
D. Keromytis, F. Monrose, and M. K. Reiter, "Taming the
Devil: Techniques for Evaluating Anonymized Network Data,"
Proceedings of the 2008 Network and Distributed System
Security Symposium, San Diego, CA, USA, February 2008. (PDF)
|
Joe Gersch
|
February 12
|
P. Samarati, "Protecting
Respondents' Identities in Microdata Release," IEEE
Transactions on Knowledge and Data Engineering, Vol. 13, no.
6, November/December 2011, pp. 1010-1027. (PDF) |
Anoop Yadav
|
February 26
|
|
|
|
|
Secure Outsourcing of Sensitive Data |
B. Hore, S. Mehrotra, M.
Canim, and M. Kantarcioglu, “Secure Multidimensional Range
Queries Over Outsourced Data,” The VLDB Journal, vol. 21,
no. 3, pp. 333–358, Jun. 2012. (PDF)
|
Dieudo Mulamba
|
March 5
|
|
N. Cao, C. Wang, M. Li, K.
Ren, and W. Lou, “Privacy Preserving Multi-keyword Ranked
Search Over Encrypted Cloud Data,” In Proceedings of 30th
IEEE International Conference on Computer Communications,
Shanghai, China, March 2011. (PDF)
|
Subhojit Mukherjee
|
March 5
|
|
|
|
|
Security Risk
Modeling and Analysis
|
M. Albanese, S. Jajodia, and
S. Noel. "Time-efficient and Cost-effective Network
Hardening Using Attack Graphs". In International Conference
on Dependable Systems and Networks, Boston, MA, USA, June
2012. (PDF)
|
Joe Gersch
|
March 26
|
R. Dewri, N. Poolsappasit, I. Ray and Darrell
Whitley, "Optimal Security Hardening on Attack Tree Models
of Networks: A Cost Benefit Analysis," International
Journal of Information Security, Vol. 11(3), pp.
167-188,2012. (PDF)
|
Mikhail Strizhov
|
March 26
|
P. K. Manadhata and J. Wing,
"An Attack Surface Metric," IEEE Transactions on Software
Engineering, Vo. 37, no. 3, pp 371-386, May/June 2010. (PDF)
|
Anoop Yadav
|
April 2
|
|
|
|
|
Moving Target
Defense
|
S. Antonatos, P. Akritidis,
E. P. Markatos and K. G.Anagnostakis, "Defending Against
Hitlist Worms using Network Address Space Randomization,"
Computer Networks: The International Journal of Computer and
Telecommunications Networking archive Vol. 51 no. 12,
August, 2007 pp. 3471-3490. (PDF) |
Joe Gersch
|
April 2
|
B. Danev, R. J. Masti, G.O.
Karame, and S. Capkun, "Enabling Secure VM-vTPM Migration in
Private Clouds," In Proceedings of the 27th Annual Computer
Security Applications Conference, Orlando, FL, USA, December
2011. (PDF)
|
Mikhail Strizhov
|
April 23
|
D. Evans, A. Nguyen-Tuong and
J. Knight, "Effectiveness of Moving Target Defenses," In S.
Jajodia et al. editors Moving Target Defense: An Asymmetric Approach to
Cyber Security,
Advances in
Information Security, Vol. XV 2011, Springer. (PDF)
|
Subhojit Mukherjee
|
April 23
|