Security Reading Group, Summer 2008
Held weekly on Thursdays in Soda 606.
New time: Food arrives at 12:45, discussion starts at 1:00pm.
Fill out this form to join the mailing list.
View previous semesters' schedule of talks:
||TOR and two suggestions for improving its scalability. Suggested reading: Mix-networks with Restricted Routes, George Danezis; A Sybil-proof one-hop DHT, Chris Lesniewski-Laas; Internet Indirection Infrastructure, Ion Stoic et al.
||Using Processes to Improve the Reliability of Browser-based Applications, Charles Reis, Brian Bershad, Steven D. Gribble, Henry M. Levy. 2007
|Usenix - No Meeting|
||CCured in the Real World, Jeremy Condit et al. PLDI 2003; SafeDrive: Safe and Recoverable Extensions Using Language-Based Techniques, Feng Zhou et al. OSDI 2006; Safe Manual Memory Management, David Gay, Rob Ennals, Eric Brewer. ISMM 2007
||Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems
using Invisible Ink Confirmation Codes, David Chaum et al. EVT 2008
||Can Machine Learning Be Secure?, Marco Barreno et al.ASIACCS 2006