Before each session, students will have to read the assigned papers (at least one, possibly two).
Students who are not presenting in the session, will have to submit a one-page reading critique for each paper.
The reading critique has a maximum length of 1 page and needs to include a couple of paragraphs summarizing the paper,
3 positive aspects of the paper, and 3 constructive criticisms of the paper.
The reading critiques are expected to show that the student understands the contributions, as well as the limitations of the
solutions proposed in the paper.
Each paper will be presented by a student or an invited speaker. The presentations will typically last 25-30 minutes and
will be followed by questions and a discussion about the paper.
In addition, we will feature one conference rump session, where each person attending the session (regardless if a student)
will select a paper from a previously selected and recent security conference and present it in 7 minutes, followed by a 5 minute discussion about the paper.
We may also feature an improv presentation session, which Boris promises will be fun! (more details later in the semester)
Date | Session | Presenter | Papers |
Feb. 21th | Introduction | Boris, Juan | Small Guide to Giving Presentations Reading a Computer Science Research Paper |
Mar. 6th | Network Security | Antonio, Leydi | JACKSTRAWS: Picking Command and Control Connections from Bot Traffic Detecting Malware Domains at the Upper DNS Hierarchy |
Mar. 27th | Applied Cryptography | Shiva, Leydi | OpenConflict: Preventing Real Time Map Hacks in Online Games PINQ: Privacy Integrated Queries |
Apr. 17th | System Security | Shiva, Antonio | Hey you, get off my cloud MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones |
May 8th | Rump Session | Everyone | Choose one from the program of IEEE S&P 2012 |