Security Reading Group, Summer 2008

Held weekly on Thursdays in Soda 606.
New time: Food arrives at 12:45, discussion starts at 1:00pm.

Fill out this form to join the mailing list.

View previous semesters' schedule of talks:

Meeting Schedule

Date Presenter Topic Food
July 17
Jayanth Kannan TOR and two suggestions for improving its scalability. Suggested reading: Mix-networks with Restricted Routes, George Danezis; A Sybil-proof one-hop DHT, Chris Lesniewski-Laas; Internet Indirection Infrastructure, Ion Stoic et al. Jayanth Kannan
July 24
Matt Piotrowski Using Processes to Improve the Reliability of Browser-based Applications, Charles Reis, Brian Bershad, Steven D. Gribble, Henry M. Levy. 2007 Cynthia Sturton
July 31
Usenix - No Meeting
Aug. 7
Adrian Mettler CCured in the Real World, Jeremy Condit et al. PLDI 2003; SafeDrive: Safe and Recoverable Extensions Using Language-Based Techniques, Feng Zhou et al. OSDI 2006; Safe Manual Memory Management, David Gay, Rob Ennals, Eric Brewer. ISMM 2007 Matt Piotrowski
Aug. 14
Arel Cordero Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes, David Chaum et al. EVT 2008 Bonnie Zhu
Aug. 21
Mark Winterrowd Can Machine Learning Be Secure?, Marco Barreno et al.ASIACCS 2006 Gelareh