ABCDEFGHIJKLMNOPQRSTUVWXYZ
1
DatePaperDiscussion Leader
2
Week 1Monday, September 3No meeting, Kevin out of town.
3
Wednesday, September 5Organization meeting - choose papers and assign discussion leaders.
4
Week 2Monday, September 10The Matter of HeartbleedKei
5
Wednesday, September 12The Psychology of Security (short)Ellen
6
Reflections on Trusting Trust (short)
7
Week 3Monday, September 17The Emperor's New Security IndicatorsMichelle
8
Wednesday, September 19A Framework for Reasoning About the Human in the LoopGus
9
Week 4Monday, September 24Clickjacking: Attacks and DefensesLan
10
Wednesday, September 26Spamalytics: An Empirical Analysis of Spam Marketing ConversionKevin
11
Week 5Monday, October 1The Security Architecture of the Chromium BrowserYichuan
12
Wednesday, October 3
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Michelle
13
Week 6Monday, October 8Return-Oriented Programming: Systems, Languages, and ApplicationsDouglass B.
14
Wednesday, October 10Control-Flow IntegrityAmy
15
Fall Break
16
17
Week 7Monday, October 22Before We Knew It: An Empirical Study of Zero-Day Attacks in the Real WorldKei
18
Wednesday, October 24DEFCON Report on Cyber Vulnerabilities in U.S. Election Equipment, Databases, and InfrastructureHannah
19
Week 8Monday, October 29When Governments Hack Oppopents: A Look at Actors and TechnologySydney
20
Wednesday, October 31Spectre Attacks: Exploiting Speculative ExecutionTobin
21
Week 9Monday, November 5MeltdownMichael
22
Wednesday, November 7Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance ErrorsAmy
23
Week 10Monday, November 12Practical Byzantine Fault ToleranceJason
24
Wednesday, November 14https://groups.csail.mit.edu/tds/papers/Lynch/jacm85.pdfJason
25
Week 11Monday, November 19An Analysis of Using Reflectors for Distributed Denial-of-Service AttacksYichuan
26
Wednesday, November 21Computing Arbitrary Functions of Encrypted DataMichael
27
Week 12Monday, November 26Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute CloudsLan
28
Wednesday, November 28Computer Security and the Modern HomeTobin
29
Week 13Monday, December 3BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power GridSydney
30
Wednesday, December 5Televisions, Video Privacy, and Powerline Electromagnetic InterferenceDouglas C.
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100