Software & Systems Security Seminar

Time and Location

Schedule

Week Date Topic(s) Facilitator(s) Paper(s)
1 5/26 ML-based Security Chun Hin Cheng Dos and Don'ts of Machine Learning in Computer Security [Security 2022]
2 6/2 Trusted Bare-metal Embedded Systems CANCELLED PISTIS: Trusted Computing Architecture for Low-end Embedded Systems [Security 2022]
3 6/9 Data Race Attacks on Intel SGX Zelun Kong Controlled Data Races in Enclaves: Attacks and Detection [Security 2023]
4 6/16 Robot Operating System Security Zelun Kong On the (In)Security of Secure ROS2 [CCS 2022]
5 6/23 Autonomous Driving Software Testing CANCELLED Doppelganger Test Generation for Revealing Bugs in Autonomous Driving Software [ICSE 2023]
6 6/30 Provenance-based Attack Detection Takemaru Kodai DISTDET: A Cost-Effective Distributed Cyber Threat Detection System [Security 2023]
7 7/7 Patch Verification for Drone Control Firmware Sudharssan Mohan PatchVerif: Discovering Faulty Patches in Robotic Vehicles [Security 2023]
8 7/14 Evading Provenance-based Attack Detection Kunal Mukherjee Evading Provenance-Based ML Detectors with Adversarial System Actions [Security 2023]
9 7/21 Fuzzing for RTOS Zelun Kong SFuzz: Slice-based Fuzzing for Real-Time Operating Systems [CCS 2022]
10 7/28 Control Flow Integrity for Embedded Systems Sudharssan Mohan Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage [Security 2022]
11 8/4 Domain-specific Language for Drone Firmware Patching CANCELLED Reverse Engineering and Retrofitting Robotic Aerial Vehicle Control Firmware using Dispatch [MobiSys 2022]
12 8/11 Fuzzing Robotic Systems Sudharssan Mohan RoboFuzz: Fuzzing Robotic Systems over Robot Operating System (ROS) for Finding Correctness Bugs [FSE 2022]

Overview

The Summer 2023 offering of the Software & Systems Security Seminar will cover a variety of security topics, with an eye toward two goals.

  • Increase participants' familiarity with recent and important results in the areas of software and systems security research. Attendees will read and discuss papers from recent and imminent top-tier security conferences: e.g., IEEE S&P, USENIX Security, CCS, NDSS, and security-related systems and software engineering conferences, and so on.

  • Be a venue for student presentations. This may be a "formal" research presentation--ideally of a student's current work--or it may be an analysis of the research papers chosen for a seminar meeting.

Participation

To participate in the seminar, please get on the seminar mailing list. Use Sympa to subscribe to s3sem.

Potential Papers

Upcoming and recent conference proceedings are good sources of papers for discussion. Below are links to some relevant conference series.

Past Seminars