Reading Assignments (to be updated)
 

Topic Area
Paper Name
Presenter  
Date
Cloud Attacks T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Compute Clouds," In Proceedings of the 16th ACM Conference on Computer and communications security, Chicago, IL, November 2009. (PDF)
Anoop Yadav
                           
January     29




Privacy and Anonymity M. Reiter and A. Rubin, "Crowds: Anonymity for Web Transactions" ACM Transactions on Information and System Security Vol. 1 no. 1. June 1998 (PDF)
Mikhail Strizhov
January 29
M. J. Freedman and R. Morris, "Tarzan: A Peer-to-Peer Anonymizing Network Layer. In Proceedings of the 2002 ACM Conference on Computer and Communications Security, Washington DC, November 2002. (PDF)
Dieudo Mulamba
February 5
R. Pang, M. Allman, V. Paxson and J. Lee, "The Devil and Packet Trace Anonymization," ACM SIGCOMM Computer Communication Review, Vol. 36, no. 1, January 2006, pp. 29 - 38. (PDF)
Subhojit Mukherjee
February 5
S. E. Coull, C. V. Wright, A. D. Keromytis, F. Monrose, and M. K. Reiter, "Taming the Devil: Techniques for Evaluating Anonymized Network Data," Proceedings of the 2008 Network and Distributed System Security Symposium, San Diego, CA, USA, February 2008. (PDF)
Joe Gersch
February 12
P. Samarati, "Protecting Respondents' Identities in Microdata Release," IEEE Transactions on Knowledge and Data Engineering, Vol. 13, no. 6, November/December 2011, pp. 1010-1027. (PDF) Anoop Yadav
February 26




Secure Outsourcing of Sensitive Data B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu, “Secure Multidimensional Range Queries Over Outsourced Data,” The VLDB Journal, vol. 21, no. 3, pp. 333–358, Jun. 2012. (PDF)
Dieudo Mulamba
March 5

N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy Preserving Multi-keyword Ranked Search Over Encrypted Cloud Data,” In Proceedings of 30th IEEE International Conference on Computer Communications, Shanghai, China, March 2011. (PDF)
Subhojit Mukherjee
March 5




Security Risk Modeling and Analysis
M. Albanese, S. Jajodia, and S. Noel. "Time-efficient and Cost-effective Network Hardening Using Attack Graphs". In International Conference on Dependable Systems and Networks, Boston, MA, USA, June 2012. (PDF)
Joe Gersch
March 26
R. Dewri, N. Poolsappasit, I. Ray and Darrell Whitley, "Optimal Security Hardening on Attack Tree Models of Networks: A Cost Benefit Analysis," International Journal of Information Security, Vol. 11(3), pp. 167-188,2012. (PDF)
Mikhail Strizhov
March 26
P. K. Manadhata and J. Wing, "An Attack Surface Metric," IEEE Transactions on Software Engineering, Vo. 37, no. 3, pp 371-386, May/June 2010. (PDF)
Anoop Yadav
April 2




Moving Target Defense
S. Antonatos, P. Akritidis, E. P. Markatos and K. G.Anagnostakis, "Defending Against Hitlist Worms using Network Address Space Randomization," Computer Networks: The International Journal of Computer and Telecommunications Networking archive Vol. 51 no. 12, August, 2007  pp. 3471-3490. (PDF)  Joe Gersch
April 2
B. Danev, R. J. Masti, G.O. Karame, and S. Capkun, "Enabling Secure VM-vTPM Migration in Private Clouds," In Proceedings of the 27th Annual Computer Security Applications Conference, Orlando, FL, USA, December 2011. (PDF)
Mikhail Strizhov
April 23
D. Evans, A. Nguyen-Tuong and J. Knight, "Effectiveness of Moving Target Defenses," In S. Jajodia et al. editors Moving Target Defense: An Asymmetric Approach to Cyber Security, Advances in Information Security, Vol. XV 2011, Springer. (PDF)
Subhojit Mukherjee
April 23