SSL is a seminar for discussing recent technical papers in systems and security. The goal is to foster technical discussions among the GW research community. The seminar is open to all GW students interested in research. First and second year PhD students are especially welcome.

Talks will be advertised on the ssl-lunch mailing list.

Previous semesters: [Spring 2013][Fall 2012][Fall 2011]

Date Paper Presenter
09/25/13 Meet and greet
10/02/13 vTPM: Virtualizing the Trusted Platform Module
Stefan Berger, Ramón Cáceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, and Leendert van Doorn
USENIX Security 2006
Masoud Koleini
10/09/13 Predictable, Efficient System-Level Fault Tolerance in C^3
Jiguo Song, John Wittrock, and Gabriel Parmer
RTSS 2013
Jiguo Song
10/16/13 DeepDive: Transparently Identifying and Managing Performance Interference in Virtualized Environments
Dejan Novaković, Nedeljko Vasić, Stanko Novaković, Dejan Kostić, and Ricardo Bianchini
USENIX ATC 2013
Sunny Rajaserkaran
10/23/13 Moved to ECE conference room.
Belief Semantics of Authorization Logic
Andrew K. Hirsch and Michael R. Clarkson
CCS 2013
Michael Clarkson
10/30/13 Moved to Tompkins 107 (Dean's conference room).
Improving Interrupt Response Time in a Verifiable Protected Microkernel
Bernard Blackham, Yao Shi, and Gernot Heiser
EuroSys 2012
James Marshall
11/06/13 When Slower Is Faster: On Heterogeneous Multicores for Reliable Systems
Tomas Hruby, Herbert Bos, and Andrew S. Tanenbaum
USENIX ATC 2013
Qi Wang
11/13/13 Professional Development: The Mechanics of Publication Michael Clarkson
11/20/13 Professional Development: Research Methods in Computer Science Tim Wood
11/27/13 Thanksgiving Break
12/04/13 Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries.
Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, and Paul Syverson.
CCS 2013.
Aaron Johnson (NRL)

Reading list:

  1. Pinocchio: Nearly Practical Verifiable Computation
    Bryan Parno, Craig Gentry, Jon Howell, and Mariana Raykova
    Oakland 2013
  2. Hybrid Information Flow Monitoring Against Web Tracking
    Frédéric Besson, Nataliia Bielova, and Thomas Jensen
    CSF 2013
  3. Memory Trace Oblivious Program Execution
    Chang Liu, Michael Hicks and Elaine Shi
    CSF 2013
  4. Zerocoin: Anonymous Distributed E-Cash from Bitcoin
    Ian Miers, Christina Garman, Matthew Green, and Aviel D. Rubin
    Oakland 2013
  5. InkTag: Secure Applications on an Untrusted Operating System
    O. Hofmann A. Dunn, S. Kim, M. Lee, and E. Witchel
    ASPLOS 2013
  6. SecureCore: A Multicore based Intrusion Detection Architecture for Realtime Embedded Systems
    Man-Ki Yoon, Sibin Mohan, Jaesik Choi, Jung-Eun Kim, and Lui Sha
    RTAS 2013
  7. Parallel scheduling for cyber-physical systems: analysis and case study on a self-driving car
    Junsung Kim, Hyoseung Kim, Karthik Lakshmanan, and Ragunathan Rajkumar
    ICCPS 2013
  8. Verifying Security Invariants in ExpressOS
    Haohui Mai, Edgar Pek, Hui Xue, Samuel T. King, and P. Madhusudan
    ASPLOS 2013
  9. Iago Attacks: Why the System Call API is a Bad Untrusted RPC Interface
    Stephen Checkoway and Hovav Shacham
    ASPLOS 2013
  10. From L3 to seL4: What Have We Learnt in 20 Years of L4 Microkernels?
    Kevin Elphinstone and Gernot Heiser
    SOSP 2013
  11. Split/Merge: System Support for Elastic Execution in Virtual Middleboxes
    Shriram Rajagopalan, Dan Williams, Hani Jamjoom, and Andrew Warfield
    NSDI 13
  12. Using One-Sided RDMA Reads to Build a Fast, CPU-Efficient Key-Value Store
    Christopher Mitchell, Yifeng Geng, and Jinyang Li
    USENIX ATC 2013
  13. BOSS: Building Operating System Services
    Stephen Dawson-Haggerty, Andrew Krioukov, Jay Taneja, Sagar Karandikar, Gabe Fierro, Nikita Kitaev, and David Culler
    NSDI 13
  14. Lightweight Memory Tracing
    Mathias Payer, Enrico Kravina, and Thomas R. Gross
    USENIX ATC 2013