Recommended Papers
The following papers have been recommended by seminar faculty for possible presentation by students, organized loosely by area.
Recommended Papers
Attacks
Privacy
Learning
Cryptocurrency
IoT
Networking
Hardware-like
General
Attacks
A first look at browser-based Cryptojacking
, recommended by
Prof. David Starobinski
return-to-csu: A New Method to Bypass 64-bit Linux ASLR
, recommended by
Prof. Ari Trachtenberg
Understanding Linux Malware
, recommended by
Prof. Manuel Egele
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
, recommended by Prof. Shengzhi Zhang
Devil’s Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices
, recommended by Prof. Shengzhi Zhang
Privacy
Toward detecting violations of differential privacy
recommended by
Prof. Gianluca Stringhini
EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements
, recommended by
Prof. Ari Trachtenberg
!SoK: Keylogging Side Channels
, recommended by
Prof. Ari Trachtenberg
Tracking Ransomware End-to-End
, recommended by
Prof. Manuel Egele
Learning
LEMNA: Explaining Deep Learning based Security Applications
recommended by
Prof. Gianluca Stringhini
Cryptocurrency
Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?
recommended by
Prof. David Starobinski
Redesigning Bitcoin’s fee market
, recommended by
Prof. David Starobinski
Blockchain mining games
, recommended by
Prof. David Starobinski
SMARTPOOL: Practical Decentralized Pooled Mining
, recommended by
Prof. David Starobinski
A Deal with the Devil: Breaking Smart Contracts
, recommended by
Prof. Ari Trachtenberg
When Good Turns Evil: Using Intel SGX to Stealthily Steal Bitcoins
, recommended by
Prof. Ari Trachtenberg
IoT
Security of GPS/INS based On-road Location Tracking Systems
recommended by
Prof. David Starobinski
Overcoming IoT Language Barriers Using Smartphone SDRs
, recommended by
Prof. David Starobinski
PhyCloak: Obfuscating Sensing from Communication Signals
, recommended by
Prof. David Starobinski
Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control
, recommended by
Prof. David Starobinski
Secrecy beyond Encryption: Obfuscating Transmission Signatures in Wireless Communications
, recommended by
Prof. David Starobinski
Defcon talks on SDRs
, recommended by
Prof. David Starobinski
LTE security, protocol exploits and location tracking experimentation with low-cost software radio
, recommended by
Prof. David Starobinski
Networking
Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane
recommended by
Prof. David Starobinski
Breaking LTE on Layer Two
recommended by
Prof. David Starobinski
Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones
, recommended by
Prof. Manuel Egele
Hardware-like
EnclaveDB – A Secure Database using SGX
, recommended by
Prof. Mayank Varia
.
kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels (Usenix Security 2017)
, recommended by
Prof. Manuel Egele
GRIFFIN: Guarding Control Flows Using Intel Processor Trace
, recommended by
Prof. Manuel Egele
General
On the Economics of Offline Password Cracking
, recommended by
Prof. Mayank Varia
.
Tracking Certificate Misissuance in the Wild
, recommended by
Prof. Manuel Egele