Computer Sciences Dept.

Computer Security and Cryptography Reading Group Suggested Reading

The following topics and papers were suggested, but not yet "processed". In time, the entries below will migrate to the scheduled reading list and then to the archived reading list.

The entries are listed in the order they were suggested, oldest first.

If you have a suggestion, please email it to Matt Fredrikson (mfredrik).

Who & When What
Matt Fredrikson
1 October 2009

After perusing some of the conferences from this year, the following seem like a good mix for this group:

  • "Reactive Noninterference" - Aaron Bohannon, Benjamin C. Pierce, Vilhelm Sjoberg, Stephanie Weirich, and Steve Zdancewic
  • "Dynamic Provable Data Possession" - Chris Erway and Alptekin Kupcu and Charalampos Papamanthou and Roberto Tamassia
  • "A Calculus Approach to Secure Information Sharing" - Mudhakar Srivatsa
  • "Can They Hear Me Now? A Security Analysis of Law Enforcement Wiretaps" - Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark, and Matt Blaze
  • "Robust Signatures for Kernel Data Structures" - Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick Traynor and Jonathon Giffin
  • "Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors" - Periklis Akritidis, Computer Laboratory, University of Cambridge; Manuel Costa and Miguel Castro, Microsoft Research, Cambridge; Steven Hand, Computer Laboratory, University of Cambridge
  • "Memory Safety for Low-Level Software/Hardware Interactions" - John Criswell, University of Illinois; Nicolas Geoffray, Universite Pierre et Marie Curie, INRIA/Regal; Vikram Adve, University of Illinois
  • "Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications" - Michael Dalton and Christos Kozyrakis, Stanford University; Nickolai Zeldovich, CSAIL, MIT
  • "Vanish: Increasing Data Privacy with Self-Destructing Data" - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, and Henry M. Levy, University of Washington
  • "Gatekeeper: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code" - Salvatore Guarnieri and Benjamin Livshits
  • "Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol" - Michael Backes, Matteo Maffei, Dominique Unruh

< Back to the Sec Reading schedule page

Created by Mihai Christodorescu (http://www.cs.wisc.edu/~mihai)
Created: Wed Aug 13 10:30:10 CDT 2003
Last modified by Matt Fredrikson http://www.cs.wisc.edu/~mfredrik
Last modified: Thu Oct 1 2009
 
Computer Science | UW Home