Please find 2019 course survey page here!
complete the course, you must give a research survey presentation, which counts for 20% of the final grade (tentative). This presentation will be a summary and synthesis about one of the topics covered in the course, based on a recent research paper. The
presentation is done in groups of two. During the first week, you
will be asked to indicate three preferences for presentation topics from
the list of topics. If you like, you can also propose your own topic, in which case you must contact the course staff by 16.1. All students must register topic preferences through this Form before the deadline.
- 2018-01-09: Presentation topics published.
- 2018-01-23: Deadline for selecting top 3 presentation topic preferences (Form).
- 2018-01-25: Presentation topics assigned.
- 2018-03-20 & 03-22 & 03-27 & 03-29: Final presentations.
What is expected in the presentation
Your presentation should last 10 minutes. During your presentations, you will be warned at 8 minutes and you must stop by 10 minutes. It is recommended that the presentation slides should be 6-8 slides. All students must submit final slides (via email to firstname.lastname@example.org ) by Sunday 18.03 at 23:55 pm. No updates to the slides are allowed after that. We will arrange a laptop and a pointer for the presentations. The laptop will contain your slides. The following is an example structure, but your presentation may follow a different structure as long as you succeed in conveying the main ideas from the paper to the audience.
- a problem statement of the paper.
- a summary of the main ideas.
- evaluation results.
- your own synthesis about the topic. You can structure this part as you see fit. If it helps, you can attempt to answer questions like
- Is the paper correct and complete?
- Did you identify any flaws?
- Do you have some ideas on how to improve the solution(s) presented in the paper?
- How does this paper compare to other related work addressing the same or similar problems?
To present the synthesis, you are encouraged to read other related papers than the one that you were assigned. For example, you can find related papers by looking at the papers referred to by your assigned paper. You can also search resources like Google Scholar (http://scholar.google.com) with relevant search terms. The paper should be considered as a starting point and you are encouraged to search for more up-to-date information.
The presentation can be made with any presentation tool of your choice (PowerPoint, LaTeX, ...).Deadline: Slides must be submitted (via email to email@example.com) by Sunday 18.03 at 23:55 pm. If needed, a member of course staff will contact you to suggest changes.
At the bottom of the page (or at
the link above) you will find an example of a good presentation from
last year. Note that the format has changed since then.
Presenting on 20.03
- Dario Bernardi and Zaheer Gauhar: Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application
- Thien Tran and Vili Moisio: A Simple Generic Attack on Text Captchas
- Harri Jernström and Karthik Duggirala: World-Driven
Access Control for Continuous Sensing
- Antti Kurkinen and Markus Pajari: To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps Privacy Permission Settings
- Janne Hamalainen and Saba Ahsan: SCONE: Secure Linux Containers with Intel SGX
- Hasti Nariman Zadeh and Maria Riaz: DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket
Presenting on 22.03
- Jamil Ata Ul and Mariia Kovtun: Follow My Recommendations: A Personalized Privacy
Assistant for Mobile App Permissions
- Joel Pulkkinen and Tuomas Ebeling: Security Enhanced (SE) Android: Bringing Flexible MAC to Android
- Lukas Klein and Raine Nieminen: Usability
and Security of Text Passwords on Mobile Devices
- Alexander Gödeke and Tim Lücke: Drammer:
Deterministic Rowhammer attacks on mobile platforms
- Calle Halme and Sampsa Latvala: Towards Continuous and Passive Authentication via Touch
Biometrics: An Experimental Study on Smartphones
- Jami Lindh and Olli Kauppinen: Understanding the Mirai botnet
- Markus Teivo and Tapio Särkkä: Old, new,
borrowed, blue: a perspective on the evolution of mobile
platform security architectures
- Oliver Kaisti and Oscar Stigzelius: SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles
Presenting on 27.03
- Alexey Dmitrenko and Thibaut Issenhuth: Adversarial
- Antti Majakivi and Niklas Lumio: Spying on the
Smart Home: Privacy Attacks and Defenses on Encrypted IoT
- Muhammad Khan and Phillip Rieger: IoT
SENTINEL: Automated Device-Type Identification for
Security Enforcement in IoT
- Ilkka Saarnilehto and Tuukka Rouhiainen: Outside the Closed World: On Using Machine Learning for
Network Intrusion Detection
- Felipe Rodriguez Yaguache and Mandana Ghasemi: Understanding the Mirai botnet
- Markus Linnalampi and Mikko Mustonen: Evading
Classifiers by Morphing in the Dark
- Ari Orre and Jani Laalo: Oblivious Multi-Party Machine Learning on Trusted
You are welcome to propose your own topic. The proposed topic can be any system security topic, preferably covered in the course. If your topic is approved by the course staff, you can proceed with it.
|1||1||The Protection of Information in Computer Systems||Seminal paper introducing basic concepts in information security. Focus on Section I.A.3 "Design principles" on page 4|
|2||2||SoK: Lessons Learned from Android Security Research for Appified Software Platforms||The paper gives high-level overview of the Android security ecosystem, focusing on application developer perspective.
|3||2||Security Enhanced (SE) Android: Bringing Flexible MAC to Android||
The official mandatory access control architecture for Android.
|4||3||SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles||Systematic analysis of iOS application sandbox access control profiles.||yes|
|5||3||Old, new, borrowed, blue: a perspective on the evolution of mobile platform security architectures||A comparative survey of some early mobile platform security architectures.||yes
|6||3||Security Metrics for the Android Ecosystem||This paper defines a security metric to rank mobile device manufacturers and network operators in terms of their provision of software updates and their devices' exposure to critical vulnerabilities. This metric is applied to a large set of real devices.|
||Towards Taming Privilege-Escalation Attacks on Android||The paper addresses the designing and implementing a security framework to defend against application level privilege escalation attacks.|
|8||3||TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime||
The paper proposes TaintART, a system for realtime tracking of multiple source of sensitive data in the Android Run Time environment (ART).
The paper builds on previous research such as TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
||3||These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications||The paper presents how two privacy controls are implemented to empower users in running applications but still preserving data privacy.|
||ASM: A Programmable Interface for Extending Android Security||An extensible architecture for adding new reference monitors for Android.|
||3||Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones||Techniques to transparently authenticate mobile users based on their interactions with their devices' touch screens.||yes|
||3||World-Driven Access Control for Continuous Sensing||This paper proposes a extensible framework for controlling access to sensor data on multi-application continuous sensing platforms.||yes|
||3||Boxify: Full-fledged App Sandboxing for Stock Android||This paper presents Boxify, an application-layer mechanism for additional sandboxing of untrusted apps on Android, using app virtualization and process-based privilege separation. The proposed solution requires no modification of the apps or Android OS.|
||3||Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android|| This paper presents Draco, a uniform and fine-grained access control framework for web code running on Android embedded browsers. The proposed solution requires no modifications to the Android OS.|
||4||BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments||Analysis of class of attacks where trusted code inside a TEEs is tricked in order to bypass REE platform security measures.|
||4||Drammer: Deterministic Rowhammer attacks on mobile platforms||This paper describes attacks against ARM Android based on the Rowhammer hardware bug in DRAM memory.||yes
||4||CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management||This paper describes faul injection attacks against TrustZone that exploit the lack of security-awareness in energy management mechanisms.|
||4||The Circle Game: Scalable Private Membership Test Using Trusted Hardware||The paper leverages Trusted Hardware to improve the scalability of Private Membership Test algorithm while maintaining the security guarantees.
|19||4||C-FLAT: Control-Flow Attestation for Embedded Systems Software||This paper describes a method for a remote trusted party to attest the run-time behavior of embedded systems.|
|20||4||SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment||The paper describes a method to establish a secure communication channel between Trusted Execution Environment and the untrusted part of the system, focusing on managing the channel key and verifying the TEE code integrity.
|21||4||SCONE: Secure Linux Containers with Intel SGX||The paper presents how to allow SGX enclaves to be executed inside Linux Containers.
||4||Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World||
Real-time mobile OS kernel protection using ARM TrustZone features as implemented on Samsung Galaxy devices.
||4||HIMA: A Hypervisor-Based Integrity Measurement Agent||
A design for both load-time and run-time integrity measurement and preservation architecture using hypervisor features.
||5||To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps Privacy Permission Settings||A crowdsourced user study on the usability impacts of disabling app permissions.||yes
||5||Usability and Security of Text Passwords on Mobile Devices||The paper compares the strength and usability of password creation on mobile devices and on desktops/laptops, and suggests improvements for mobile password entry.||yes
||5||Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions||The paper implements and tests a Personalized Privacy Assistant on Android, based on user privacy profiles.||yes
||5||Android Permissions Remystified: A Field Study on Contextual Integrity||A user study of the Android application permissions.
||5||AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems||
The paper describes an approach of user-driven access control where permission is granted based on existing user actions in the context of application.
The recorded presentation of this paper at CCS 2016 is available on YouTube (https://www.youtube.com/watch?v=SFdxC7z2hK8).
|29||4,6||Oblivious Multi-Party Machine Learning on Trusted Processors||This paper discusses how to
write data-oblivious machine learning algorithms for multiparty
computation leveraging Intel SGX. Five algorithms are described along
with several computational tricks.
||Evading Classifiers by Morphing in the Dark||A technique to modify malicious PDF files such that they will “evade” a targeted identification system (misclassified as benign files) while remaining malicious.
||Adversarial machine learning||A general introduction to the concept of "adversarial machine learning”: the attacks against machine learning systems.
||Outside the Closed World: On Using Machine Learning for Network Intrusion Detection||An analysis on the drawbacks of using machine learning techniques for intrusion detection and the reason why machine learning is generally not used in production system.
||DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket||A machine learning based technique for detecting malicious Android applications.
||Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application||A browser add-on for detecting phishing web-pages in real-time using machine learning.
|35||6,7||IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT||A technique for identifying and isolating vulnerable devices in Smart Home IoT networks. The device type identification leverages machine learning and the isolation uses SDN.
||7||Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic||Attacks and defences against privacy leakage from monitoring the Internet traffic of IoT devices.||yes|
|37||7||Understanding the Mirai botnet||A comprehensive analysis of the functioning of the Mirai botnet: the biggest IoT botnet to date.||yes|
|38||Extra||This paper presents a simple, low-cost but powerful attack that effectively breaks a wide range of text Captchas with distinct design features using a machine learning technique.||yes
|39||Extra||This paper proposes Bloom cookies that encode a userâ€™s profile in a compact and privacy-preserving way, while still allowing online services to use it for personalization purposes.|
||This paper investigates physically realizable and inconspicuous attacks on facial recognition systems, which allow an attacker to evade recognition or impersonate another individual.|