CS 7934 — Computer Systems Seminar, Fall 2010

Fridays, 2:00–3:00 PM, 3485 MEB

Organizer: Eric Eide

Overview

The fall 2010 offering of CS 7934 will cover a variety of systems topics, but with an eye toward three goals.

The first is to increase participants' understanding of systems approaches to security. Systems software—including operating systems, hypervisors, middleware, compilers, linkers/loaders, dynamic language interpreters, and Web browsers—plays an obvious, central, and ever-more critical role in implementing computer security. We will study recent research publications that present innovative, systems-based approaches to meeting the security needs of computer applications and computing platforms. We will investigate emerging technologies for security including hypervisors, sandboxing, and program analysis. We will also investigate the requirements for new classes of applications, e.g., Web-based and cloud-based systems. What threats are faced by the users and providers of modern applications, and how can those threats be mitigated through novel systems techniques? What does “cyber security” mean, anyway?

The second is to be a venue for student presentations. Every student participating in the seminar will be required to give at least one “formal” research presentation during the semester. Ideally these will be presentations of students' current work, but other topics are also possible.

The third is to stay abreast of papers from recent or imminent top-tier systems conferences: e.g., SOSP, OSDI, NSDI, SIGCOMM, and so on. Papers will be selected for their relevance to participants' research or upcoming Utah visitors.

CS 7934 is often called “the CSL seminar.” The name CSL is historic.

Mailing list

To get on the class mailing list, use Mailman to subscribe to csl-sem.

Credit

Although the course is listed as “variable credit,” the course is only available for one (1) credit in most circumstances. If you want to take the course for more than one credit, you will need to get approval from the instructor.

Those taking the course for credit must read all of the papers, submit a short summary of each paper prior to class (PDF, Postscript, LaTeX), participate in each discussion, and make at least one research presentation. We urge students to sign up for one credit if you're going to be attending anyway.

Schedule

(You can check out what we did last semester here.)

Week Date Topic(s) Facilitator Paper(s)
1 8/27 Eide no meeting — organizational email
2 9/3 capabilities Eide Capsicum: Practical Capabilities for UNIX. Robert N. M. Watson et al. In USENIX Security '10, Aug. 2010.
3 9/10 software routing, GPUs Sun PacketShader: A GPU-Accelerated Software Router. Sangjin Han et al. In SIGCOMM '10, Aug.–Sep. 2010.
4 9/17 selective system replay Burtsev System Recovery Using Selective Re-execution. Taesoo Kim et al. In OSDI '10, Oct. 2010. To appear. (This is the conference submission version, not the final version.)
5 9/24 deterministic parallelism Sharma Deterministic Process Groups in dOS. Tom Bergan et al. In OSDI '10, Oct. 2010. To appear.

Efficient System-Enforced Deterministic Parallelism. Amittai Aviram et al. In OSDI '10, Oct. 2010. To appear. (This is the conference submission version, not the final version.)
6 10/1 auditable execution Lin Accountable Virtual Machines. Andreas Haeberlen et al. In OSDI '10, Oct. 2010. To appear.
7 10/8 archival storage; deduplication Pullakandam Venti: A New Approach to Archival Storage. Sean Quinlan and Sean Dorward. In FAST '02, Jan. 2002.
8 10/15 no meeting — University fall break
9 10/22 caching Chikkulapelly Transactional Consistency and Automatic Management in an Application Data Cache. Dan R. K. Ports et al. In OSDI '10, Oct. 2010.
10 10/29 trusted computing Sachdev TrustVisor: Efficient TCB Reduction and Attestation. Jonathan M. McCune et al. In IEEE Symposium on Security and Privacy, May 2010.
11 11/5 SFI Liang Adapting Software Fault Isolation to Contemporary CPU Architectures. David Sehr et al. In USENIX Security '10, Aug. 2010.

Background: Native Client: A Sandbox for Portable, Untrusted x86 Native Code. Bennet Yee et al. In 2009 IEEE Symposium on Security and Privacy, May 2009.
12 11/12 OS structure; multicore Lin An Analysis of Linux Scalability to Many Cores. Silas Boyd-Wickizer et al. In OSDI '10, Oct. 2010.
13 11/19 data-race detection Jin Effective Data-Race Detection for the Kernel. John Erickson et al. In OSDI '10, Oct. 2010.
  11/24 wide-area services Ricci Optional meeting on Wed Nov 24 at 2:00 PM:

Mobitopolo: A Portable Infrastructure to Facilitate Flexible Deployment and Migration of Distributed Applications with Virtual Topologies. Richard Potter and Akihiro Nakao. In VISA '09, Aug. 2009.

Wide-Area Route Control for Distributed Services. Vytautas Valancius et al. In USENIX ATC '10, June 2010.
14 11/26 no meeting — Thanksgiving break
15 12/3 nested virtualization Kim The Turtles Project: Design and Implementation of Nested Virtualization. Muli Ben-Yehuda et al. In OSDI '10, Oct. 2010.
16 12/10 hash collisions Sharma Attacks on MD5 and SHA-1: Is This the “Sword of Damocles” for Electronic Commerce? Praveen Gauravaram et al. In AusCERT '06, May 2006.

Supplementary reading: MD5 Considered Harmful Today: Creating A Rogue CA Certificate. Alexander Sotirov et al. Dec. 2008.

Presentation slides: “Defeating SSL”: Impact of Hash Collisions on Cyber Security.

Potential Papers

Upcoming/recent OSDI, SIGCOMM, SOSP, NSDI, SIGMETRICS, SenSys, and similar conference proceedings are good sources of papers for discussion.