<html>
<head>
<title>
CS657 - Advanced Security
</title>
<link rel="stylesheet" type="text/css" href="style/class.css" />
<style>
</style>
</head>
<body>
<div class="title">CS657 - Advanced Security</div>
<div class="subtitle">Hao Jiang   <span style="font-size:19px;font-weight:normal;">Fall 2013</span></div>
<div class="section_header">Course Brief</div>
<div class="section_content"></div>
<div class="section_header">Course Coverage</div>
<div class="section_content"></div>
<div class="section_header">Reactions</div>
<div class="section_content">
<table cellpadding="4">
<colgroup>
    <col span="1" style="width: 550px;">
    <col span="1">
</colgroup>
<tr>
<th>Read Paper</th>
<th>Reaction</th>
</tr>
<tr>
<td>
<a href="document/0828-sec13-paper_thomas.pdf">Trafflicking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse</a>
</td>
<td>
<a href="document/0828-Reaction-TraffickingFraudulentAccount.pdf">Reaction</a>
</td>
</tr>
<tr>
<td>
<a href="document/0902-sec13-paper_lian-DNSSEC.pdf">Measuring the Practical Impact 
of DNSSEC Deployment</a>
</td>
<td>
<a href="document/0902-Reaction-DNSSEC.pdf">Reaction</a>
</td>
</tr>
<tr>
<td>
<a href="document/0904-sec13-paper_ZMap.pdf">ZMap: Fast Internet-wide Scanning and Its Security Applications</a>
</td>
<td>
<a href="document/0904-Reaction-ZMap.pdf">Reaction</a>
</td>
</tr>
<tr>
<td>
<a href="document/0909-sec13-paper_CensorshipWeibo.pdf">The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions</a></td>
<td>
<a href="document/0909-Reaction-CensorshipWeibo.pdf">Reaction</a>
</td>
</tr> 
<tr>
<td>
<a href="document/0909-sec13-paper_PayPerViewNetwork.pdf">Impression Fraud in On-line Advertising via Pay-Per-View Networks</a>
</td>
<td>
<a href="document/0909-Reaction-PayPerViewNetwork.pdf">Reaction</a>
</td>
</tr>
<tr>
<td><a href="document/0911-sec13-paper_ExecScent.pdf">ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates</a>
</td>
<td><a href="document/0911-Reaction-ExecScent.pdf">Reaction</a>
</td>
</tr>
<tr>
<td><a href="document/0923-sec13-paper_MovieStealer_3.pdf">Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services</a>
</td>
<td>
<a href="document/0923-Reaction-MovieStealer.pdf">Reaction</a>
</td>
</tr>
<tr>
<td>
<a href="document/0923-sec13-paper_PollutionAttack.pdf">Take This Personally: Pollution Attacks on Personalized Services</a>
</td>
<td><a href="document/0923-Reaction-PollutionAttack.pdf">Reaction</a>
</td>
</tr>
<tr>
<td><a href="document/1004-sec13-paper_DNSRebinding.pdf">Eradicating DNS Rebinding with the Extended Same-Origin Policy</a>
</td>
<td><a href="document/1004-Reaction-DNSRebinding.pdf">Reaction</a>
</td>
</tr>
<tr>
<td>
<a href="document/1007-sec13-paper_kapravelos-Revolver.pdf">Revolver: An Automated Approach to the Detection of Evasive Web-based Malware</a>
</td>
<td>
<a href="document/1007-Reaction-Revolver.pdf">Reaction</a>
</td>
</tr>
<tr>
<td>
<a href="document/1007-sec13-paper_bhargavan-DJS.pdf">Language-based Defenses against Untrusted Browser Origins</a>
</td>
<td>
<a href="document/1007-Reaction-DJS.pdf">Reaction</a>
</td>
</tr>
<tr>
<td><a href="document/1009-sec13-paper_CellularNetwork.pdf">Let Me Answer That For You: Exploiting Broadcast Information in Cellular Networks</a>
</td>
<td><a href="document/1009-Reaction-CellularNetwork.pdf">Reaction</a>
</td>
</tr>
<tr>
<td>
<a href="document/1014-ResourceFreeAttacking.pdf">Resource-Freeing Attacks: Improve Your Cloud Performance (at Your Neighbor's Expense)</a>
</td>
<td>
<a href="document/1014-Reaction-ResourceFreeAttacking.pdf">Reaction</a>
</td>
</tr>
<tr>
<td>
<a href="document/1014-sec13-paper_DetectDNSCommunication.pdf">Practical Comprehensive Bounds on Surreptitious Communication Over DNS</a>
</td>
<td>
<a href="document/1014-Reaction-DetectDNSCommunication.pdf">Reaction</a>
</td>
</tr>
</table>
</div>
<div class="section_header">Presentation</div>
<div class="section_content">
<div class="text">
This is a presentation about paper "Jekyll on iOS: When Benign Apps Become Evil" from USENIX Security 2013. The authors present an interesting attacking idea against iOS system, which was previously considered to be secure and well defended against external security threats.
</div>
<iframe src="https://docs.google.com/presentation/d/1N1AopqMDQlo-lGotzfcQ3bxn3Tg6Z70t1OEY9N9ZJ9A/embed?start=false&loop=false&delayms=3000" frameborder="0" width="640" height="375" allowfullscreen="true" mozallowfullscreen="true" webkitallowfullscreen="true"></iframe>
</div>
<div class="section_header">Project</div>
<div class="section_content">
This is a on going project that targets at developing a new method of comparing webpages.
<br/>
<a href="progress-dec13.pdf">Progress Report</a>
</div>
</body>
</html>
