Reading List

Lecture 1: Introduction

No papers

Lecture 2: Techniques to deal with liars

"Byzantine Generals Problem" by Leslie Lamport, Robert Shostak, Marshall Pease. ACM Transactions on Programming Languages and Systems (TOPLAS), 1982.

"The Byzantine Generals Strike Again" by Danny Dolev. Journal of Algorithms, 1982.

"Reliable Broadcast in Unknown Fixed Identity Networks" by L. Subramanian, R. H. Katz, V. Roth, S. Shenker and I. Stoica, ACM PODC 2005.

Lecture 3: Secure Routing in the Internet

"Network layer protocols with Byzantine Robustness" by Radia Perlman, PhD Thesis (read only chapters 2 and 3)

"Listen and Whisper: Security Mechanisms for BGP" by L. Subramanian, V. Roth, R.H. Katz, S. Shenker and I. Stoica. ACM NSDI 2004.

"SPV: Secure Path Vector Routing for BGP" by Yi Chin Hu, Adrian Perrig, Marvin Sirbu, ACM SIGCOMM 2005.

Lecture 4: Project Discussion and Secure Routing (contd)

No new papers

Optional: (to be briefly covered in class)

Hu, Yih-Chun, Dave Johnson, and Adrian Perrig. "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks." In Ad Hoc Networks Journal, 1(1):175-192, 2003.

Hu, Yih-Chun, Adrian Perrig, and Dave Johnson. "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks." In Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (ACM Mobicom), Atlanta, Georgia, September 23 - 28, 2002.

Lecture 5: Secure naming

(Background Reading on Kerberos and Authentication -will only be briefly covered)
Using Encryption for Authentication in  Large Networks of Computers. by Needham and Scroeder.
Communications of the ACM, 1978.

Limitations of the Kerberos Authentication System
. by Steven Bellovin and Michael Merritt. USENIX conference, 1991.

(Main papers)

Separating key management from file system security. (PDF)
by David Mazières, Michael Kaminsky, M. Frans Kaashoek, and Emmett Witchel.
In Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP '99), Kiawah Island, South Carolina, December 1999.

David Mazières. Self-certifying file system. PhD thesis, MIT, May 2000. thesis. (read Chapters 3,4)

DNSSEC - DNS Security Extensions. Refer to for papers and background information. Read RFC 4033, RFC 2538 (google for it or from DNSSEC website).


TrickleDNS: A Practical and Decentralized Approach to DNS Security. Will be distributed thru the mailing

Lecture 6: Byantine Fault Tolerant Systems

BASE: Using Abstraction to Improve Fault Tolerance
ACM Transactions on Computer Systems (TOCS). Volume 21, Issue 3, August 2003. Miguel Castro, Rodrigo Rodrigues and Barbara Liskov.

Practical Byzantine fault-tolerance and proactive recovery
ACM Transactions on Computer Systems (TOCS), Volume 20, Issue 4, November 2002. M. Castro and B. Liskov.

Lecture 7: Byzantine file systems

Continue with previous week papers.

"BAR Tolerance for Cooperative Services," A. Aiyer, L. Alvisi, A. Clement, M. Dahlin, J. Martin, C. Porth, Symposium on Operating Systems Principles (SOSP) Oct 2005 . pdf ps

Lecture 8: Security in P2P networks

Experience with an Object Reputation System for Peer-to-Peer Filesharing. Kevin Walsh and Emin Gun Sirer. Proceedings of NSDI 2006. PDF

Sybilproof Reputation Mechanisms. Alice Cheng and Eric Friedman. Proceedings of Third Workshop of Peer-to-Peer Systems. PDF

Lecture 9: Security in Enterprises

"SANE: A Protection Architecture for Enterprise Networks"
Martin Casado, Tal Garfinkel, Aditya Akella, Michael Freedman, Dan Boneh, Nick McKeown, Scott Shenker  15th Usenix Security Symposium, Vancouver, Canada, , August 2006  pdf

V. Paxson, Bro: A System for Detecting Network Intruders in Real-Time, Computer Networks, 31(23-24), pp. 2435-2463, 14 Dec. 1999. ( HTML)This paper is a revision of paper that previously appeared in Proc. 7th USENIX Security Symposium , January 1998.

Lecture 10: Intrusion Detection

Continue with Bro from previous lecture

H. Dreger, A. Feldmann, V. Paxson, and R. Sommer, Operational Experiences with High-Volume Network Intrusion Detection, Proc. ACM CCS, October 2004.

U. Shankar and V. Paxson, Active Mapping: Resisting NIDS Evasion Without Altering Traffic, Proc. IEEE Symposium on Security and Privacy, May 2003.

M. Handley, C. Kreibich and V. Paxson, Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics (HTML). (compressed Postscript) (PDF) Proc. USENIX Security Symposium 2001.

Lecture 11: Securty in Wireless Environments

Security flaws in 802.11 data link protocols
Nancy Cam-Winget, Russ Housley, David Wagner, and Jesse Walker. Communications of the ACM, 46(5), May 2003, Special Issue on Wireless networking security, pp.35-39. [ACM's archive]
Intercepting Mobile Communications: The Insecurity of 802.11
Nikita Borisov, Ian Goldberg, and David Wagner. MOBICOM 2001. [ps]
Adam Stubblefield, John Ioannidis, and Aviel D. Rubin, A Key Recovery Attack on the 802.11b Wired Equivalent Privacy Protocol (WEP) (pdf), ACM Transactions on Information and System Security, May, 2004.

Lecture 12: Worms

Kim, H.-A. and Karp, B., Autograph: Toward Automated, Distributed Worm Signature Detection, in Proceedings of the 13th Usenix Security Symposium (Security 2004), San Diego, CA, August, 2004. .ps.gz .pdf

Newsome, J., Karp, B., and Song, D., Polygraph: Automatically Generating Signatures for Polymorphic Worms, to appear in the Proceedings of the IEEE Symposium on Security and Privacy (Oakland 2005), Oakland, CA, May, 2005. .pdf

Sumeet Singh, Cristian Estan, George Varghese, and Stefan Savage,
Automated Worm Fingerprinting, Proceedings of the 6th ACM/USENIX Symposium on Operating System Design and Implementation (OSDI), San Francisco, CA, December 2004. (talk slides)

Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, and Paul Barham, "Vigilante: End-to-End Containment of Internet Worms", Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP'05), Brighton, UK, October 2005. [ ps | pdf ]

Lecture 12: OS security

``The {Flask Security Architecture: System Support for Diverse Security Policies}''
by Ray Spencer, Stephen Smalley, Peter Loscocco, Mike Hibler, David Andersen, and Jay Lepreau.
In Proc. 8th USENIX Security Symposium, (Washington, DC), Aug. 1999.
Details. Download: PDF, PostScript (gzipped).

Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler, and David Mazières. Making information flow explicit in HiStar. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation, pages 263-278, Seattle, WA, November 2006. paper.