Paper presentation assignment

Paper Topic Name E-mail
CloudVisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization VM,Cloud Marcus Deng
GUITAR: Piecing Together Android App GUIs from Memory Images IOT,Andriod Jennifer Ward
Spotless Sandboxes: Evading Malware Analysis Systems using Wear-and-Tear Artifacts [SP 17] Sandbox Nick Ramos
Return-Oriented Programming: Systems, Languages, and Applications binary Eric Rogers
You can Run but you Can't read: preventing disclosure exploits in executable code binary Ricardo Alanis
The Security Architecture of the Chromium Browser VM,Sandbox Vinaya Khandelwal
Understanding Integer Overflow in C/C++ binary Dylan Yu
FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps Static, Android Melissa Fulfer
Towards a Timely Causality Analysis for Enterprise Security provenance,enterprise Christopher Wang
When Virtual is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments VM Lawrence Eric Evangelista
Fear and Logging in the Internet of Things IOT,provenance Ko-Chen Chen
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds cloud Yinglue Chen
Meltdown: Reading Kernel Memory from User Space cpu,kernel Alan Huang
Sensitive Information Tracking in Commodity IoT iot YUBO YAN
Control-Flow Integrity [CCS 05] binary Jonathan Creech
Linux kernel vulnerabilities: State-of-the-art defenses and open problems kernel Stephen Ballenger
ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks threat Asad-ullah Khan
Spectre Attacks: Exploiting Speculative Execution cpu,kernel Seth Bedford
LLVM: A Compilation Framework static Daniel Garcia
(State of) The Art of War: Offensive Techniques in Binary Analysis binary John Hatch
Compiler Assisted Code Randomization static Gil Popilski
Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools audit,provenance Ariel Capps
Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis threat Bradley Olbrey
Stuxnet: Dissecting a Cyberwarfare Weapon cps Nathan Elderbroom
Valgrind: A Framework for Heavyweight Dynamic Binary Instrumentation binary,static Carey Spence
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware Ransomware Tim Gowan
IOTFUZZER: Discovering Memory Corruptions in IoT Through App-based Fuzzing iot Carla Equihua Ramirez
Reading the Tea leaves: A Comparative Analysis of Threat Intelligence threat Sreevidhya Ravindran

Page last revised on: 2019-11-08