Paper presentation assignment

Paper Topic Name E-mail
CloudVisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization VM,Cloud Marcus Deng marcus.deng@utdallas.edu
GUITAR: Piecing Together Android App GUIs from Memory Images IOT,Andriod Jennifer Ward jmw150330@utdallas.edu
Spotless Sandboxes: Evading Malware Analysis Systems using Wear-and-Tear Artifacts [SP 17] Sandbox Nick Ramos nor140030@utdallas.edu
Return-Oriented Programming: Systems, Languages, and Applications binary Eric Rogers ejr140230@utdallas.edu
You can Run but you Can't read: preventing disclosure exploits in executable code binary Ricardo Alanis ria140230@utdallas.edu
The Security Architecture of the Chromium Browser VM,Sandbox Vinaya Khandelwal vxk180007@utdallas.edu
Understanding Integer Overflow in C/C++ binary Dylan Yu dsy160030@utdallas.edu
FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps Static, Android Melissa Fulfer mdf150230@utdallas.edu
Towards a Timely Causality Analysis for Enterprise Security provenance,enterprise Christopher Wang chw160030@utdallas.edu
When Virtual is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments VM Lawrence Eric Evangelista lce160130@utdallas.edu
Fear and Logging in the Internet of Things IOT,provenance Ko-Chen Chen kxc170002@utdallas.edu
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds cloud Yinglue Chen yxc180006@utdallas.edu
Meltdown: Reading Kernel Memory from User Space cpu,kernel Alan Huang alan.huang@utdallas.edu
Sensitive Information Tracking in Commodity IoT iot YUBO YAN yxy180030@utdallas.edu
Control-Flow Integrity [CCS 05] binary Jonathan Creech jbc150030@utdallas.edu
Linux kernel vulnerabilities: State-of-the-art defenses and open problems kernel Stephen Ballenger smb160530@utdallas.edu
ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks threat Asad-ullah Khan amk160230@utdallas.edu
Spectre Attacks: Exploiting Speculative Execution cpu,kernel Seth Bedford sab170730@utdallas.edu
LLVM: A Compilation Framework static Daniel Garcia ddg160030@utdallas.edu
(State of) The Art of War: Offensive Techniques in Binary Analysis binary John Hatch john.hatch@utdallas.edu
Compiler Assisted Code Randomization static Gil Popilski gxp151930@utdallas.edu
Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools audit,provenance Ariel Capps amc150430@utdallas.edu
Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis threat Bradley Olbrey bro160030@utdallas.edu
Stuxnet: Dissecting a Cyberwarfare Weapon cps Nathan Elderbroom nle160030@utdallas.edu
Valgrind: A Framework for Heavyweight Dynamic Binary Instrumentation binary,static Carey Spence carey@utdallas.edu
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware Ransomware Tim Gowan txg112130@utdallas.edu
IOTFUZZER: Discovering Memory Corruptions in IoT Through App-based Fuzzing iot Carla Equihua Ramirez cme150030@utdallas.edu
Reading the Tea leaves: A Comparative Analysis of Threat Intelligence threat Sreevidhya Ravindran sxr190010@utdallas.edu

Page last revised on: 2019-11-08