The Paper Reading Seminar

Description

The Paper Reading Seminar meets in Spring each Wednesday from 2:00pm - 3:00pm in SEL 4224. Each week we select a paper which covers system issues, security issues or any other interesting topics from various conferences or journals. The people attend the seminar need to read the paper in advance. At the beginning of the seminar, a person gives a short summary of the paper first, then followed by the discussion including all attendees.

Paper List

  1. Security in Plan 9.Russ Cox, Eric Grosse, Rob Pike, Dave Presotto, Sean Quinlan. Sept. 16, 2011 (Presented by Dr. Solworth)
  2. A Software Flaw Taxonomy: Aiming Tools At Security. Sam Weber, Paul A. Karger, Amit Paradkar. Sept. 23, 2011 (Presented by YaoHua)
  3. How to Shop for Free Online (wang11shopforfree). Rui Wang, Shuo Chen, XiaoFeng Wang, Shaz Qadeer. Sept. 30, 2011 (Presented by Wenyuan)
  4. No Silver Bullet (brooks87noSilverBullet). Frederick P. Brooks, Jr. Oct. 7, 2011 (Presented by Mike)
  5. Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems(chen08overshadow). Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis, etc Oct. 14, 2011 (Presented by Dr. Solworth)
  6. The UNIX Time-sharing Systems(ritchie74unix). Dennis M. Ritchie and Ken Thompson Oct. 28, 2011 (Prsented by Francesco)
  7. Xen and the art of virtualization(barham03xen). Paul Barham and Boris Dragovic, etc Nov. 4, 2011 (Presented by Xu)
  8. Breaking Up is Hard to Do: Security and Functionality in a Commodity Hypervisor(colp11xoar). Patrick Colp, Mihir Nanavati, Jun Zhu, etc Nov. 11, 2011
  9. Eliminating the Hypervisor Attack Surface for a More Secure Cloud(szefer11nohype). Jakub Szefer, Eric Keller, Ruby B.Lee and Jennifer Rexford Nov. 18, 2011 (Presented by Yaohua)
  10. Android Permissions Demystified(felt11android). Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner Dec. 2, 2011 (Presented by Yaohua)
Information Approval Curriculum accredited by CNSS gratefully acknowledge funding by National Science Foundation

UIC Links

Security Links