100 likes | 300 Views
CS457 – Introduction to Information Systems Security Projects. Elias Athanasopoulos elathan@ics.forth.gr. Project 1. On the Security of RC4 in TLS Usenix Security 2013.
E N D
CS457 – Introduction to Information Systems SecurityProjects Elias Athanasopoulos elathan@ics.forth.gr
Project 1 On the Security of RC4 in TLS Usenix Security 2013. NadhemAlFardan, Royal Holloway, University of London; Daniel J. Bernstein, University of Illinois at Chicago and TechnischeUniversiteit Eindhoven; Kenneth G. Paterson, Bertram Poettering, and Jacob C.N. Schuldt, Royal Holloway, University of London. Elias Athanasopoulos
Project 2 When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC ACM CCS 2008 E. Buchanan, R. Roemer, H. Shacham, and S. Savage. Suggested reading: The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86) ACM CCS 2007 H. Shacham. Elias Athanasopoulos
Project 3 Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code RandomizationSecurity and Privacy 2012 VasilisPappas, Michalis Polychronakis, and Angelos D. Keromytis Binary stirring: self-randomizing instruction addresses of legacy x86 binary code ACM CCS 2012 Richard Wartell, Vishwath Mohan, Kevin W. Hamlen, Zhiqiang Lin Elias Athanasopoulos
Project 4 Practical Control Flow Integrity & Randomization for Binary Executables Security and Privacy 2013 Chao Zhang, Tao Wei, Zhaofeng Chen , Lei Duan , Stephen McCamant , LászlóSzekeres, Dawn Song, and Wei Zou. Suggested reading: Control-Flow Integrity: Principles, Implementations, and Applications ACM CCS 2005 Abadi et al. Elias Athanasopoulos
Project 5 Out Of Control: Overcoming Control-Flow Integrity Security and Privacy 2014 EnesGöktaş, Elias Athanasopoulos, Herbert Bos, and GeorgiosPortokalidis Suggested reading: Practical Control Flow Integrity & Randomization for Binary Executables Security and Privacy 2013 Chao Zhang, Tao Wei, Zhaofeng Chen , Lei Duan , Stephen McCamant , LászlóSzekeres, Dawn Song, and Wei Zou. Elias Athanasopoulos
Project 6 Size Does Matter - Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard Usenix Security 2014 EnesGöktaş, Elias Athanasopoulos, MichalisPolychronakis, Herbert Bos, and GeorgiosPortokalidis Suggested reading: Transparent ROP Exploit Mitigation using Indirect Branch Tracing Usenix Security 2013 Vasilis Pappas, Michalis Polychronakis, and Angelos D. Keromytis Elias Athanasopoulos
Project 7 Cling: A Memory Allocator to Mitigate Dangling Pointers Usenix Security 2010 PeriklisAkritidis Elias Athanasopoulos
Project 8 Improving Integer Security for Systems with KINT OSDI 2012 Xi Wang and Haogang Chen, MIT CSAIL; ZhihaoJia, Tsinghua University IIIS; NickolaiZeldovich and M. FransKaashoek, MIT CSAIL Elias Athanasopoulos
Project 9 Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense NDSS 2009 YacinNadji , PrateekSaxena , Dawn Song Robust Defenses for Cross-Site Request Forgery ACM CCS 2008 Adam Barth, Collin Jackson, and John C. Mitchell Elias Athanasopoulos