CSc 620 |
---|
Security Through Obscurity |
Schedule |
||||
Lecture | When | Who | What | Handout | January |
---|---|---|---|---|
1 | Thu 10 | CC | Administrivia, Introduction | |
2 | Tue 15 | CC | Java VM | |
3 | Thu 17 | CC | Jasmin | |
4 | Tue 22 | CC | BCEL | |
5 | Thu 24 | CC | Program representation | |
6 | Tue 29 | CC | Steganography | |
7 | Thu 31 | CC | Cryptography | February |
8 | Tue 5 | CC | Watermarking |
|
9 | Thu 7 | CC | Watermarking | |
10 | Tue 12 | CC | Code Obfuscation |
|
11 | Thu 14 | TBA | TBA | |
12 | Tue 19 | CC | BLOAT | |
13 | Thu 21 | CC | BLOAT | |
14 | Tue 25 | Tapas R. Sahoo | Software Watermarking |
|
15 | Thu 28 | CC | Project 1 presentations, Dataflow Analysis | March |
16 | Tue 5 | Ginger Myles, Danny Mandel | Software Watermarking | |
17 | Thu 7 | Balamurgan Chirtsabesan, Anna Segurson | Obfuscation | |
Tue 12 | No class | |||
Thu 14 | No class | |||
18 | Tue 19 | TBA | TBA | |
19 | Thu 21 | TBA | TBA | |
20 | Tue 25 | TBA | TBA | |
21 | Thu 28 | TBA | TBA | April |
22 | Tue 2 | TBA | TBA | |
23 | Thu 4 | TBA | TBA | |
24 | Tue 9 | TBA | TBA | |
25 | Thu 11 | TBA | TBA | |
26 | Tue 18 | TBA | TBA | |
27 | Thu 18 | TBA | TBA | |
28 | Tue 23 | TBA | TBA | |
29 | Thu 25 | TBA | TBA | |
30 | Tue 30 | TBA | TBA |
Project 1 |
||
Team | Members | Project |
---|---|---|
Kelda and Martio | Kelly Heffner and Martin Stepp | #1, Rename Fields and Methods |
The Cool Dudettes | Ginger Myles, Miriam N Miklofsky | #2, Add Methods and Fields |
The Cool Undecideds | Ashok Purushotham, Rathnaprabhu Rajendran | #3, Add Bogus Initializers |
Exceptions | Tapas Ranjan Sahoo , Balamurgan Chirtsabesan | #4, Adding Bogus Expressions |
Andy and Xiangyu | Xiangyu Zhang and Andrew Huntwork | #5, Add Bogus Switch Statement |
Some cool name | Anna Segurson, Danny Mandel | #9, Add Bogus Locals |
Project 2 |
||
Team | Members | Project |
---|---|---|
#1, Rename Fields and Methods | ||
#2, Add Bogus Sub-Expressions | ||
The Cool Undecideds | Ashok Purushotham, Rathnaprabhu Rajendran | #3, Add Bogus Predicates |
Andy and Xiangyu | Xiangyu Zhang and Andrew Huntwork | #4, Add Bogus Method Arguments |
Exceptions | Tapas Ranjan Sahoo , Balamurgan Chirtsabesan | #5, Add Bogus Buggy Code |
#6, Encode Integer Constants | ||
The Cool Dudettes | Ginger Myles, Miriam N Miklofsky | #7, Add Bogus Fields |
Some cool name | Anna Segurson, Danny Mandel | #8, Promote Local Variables |
Kelda and Martio | Kelly Heffner and Martin Stepp | #9, Reordering Methods |
Papers 1 |
|||
Date | Author | Title | Presenter |
---|---|---|---|
Feb. 26 | Monden | A Practical Method for Watermarking Java Programs | TBA |
Feb. 26 | Stern | Robust Object Watermarking: Application to Code | Tapas R. Sahoo |
Feb. 28 | Venkatesan | A Graph Theoretic Approach to Software Watermarking | Daniel Mandel |
Feb. 28 | Qu | Fingerprinting IPs Using Constraint-Addition: Approach and Graph Coloring Case Study | Ginger Myles |
Mar. 5 | Tyma | Method for renaming identifiers of a computer program | Balamurugan Chirtsabesan |
Mar. 5 | Chang | Protecting Software Code by Guards | Anna Segurson |
Mar. 7 | Cohen | Operating System Protection Through Program Evolution | Andrew Huntwork |
Mar. 7 | Wang | Protection of Software-based Survivability Mechanisms and Software Tamper Resistance: Obstructing Static Analysis of Programs | Kelly T Heffner |
Mar. 19 | Johnson | Encoding Techniques for Software and hardware | TBA |
Mar. 19 | Hohl | Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts | RathnaPrabhu Rajendran |
Mar. 21 | Grangeret | Use of Pseudocode to Protect Software from Unauthorized Use | Xiangyu Zhang |
Mar. 21 | Horne | Dynamic Self-Checking Techniques for Improved Tamper Resistance | Miriam N Miklofsky |
Mar. 26 | Mambo | A Tentative Approach to Constructing Tamper-Resistant Software | Ashok P. Ramasamy Venkatraj |
Mar. 26 | Lie | Architectural Support for Copy and Tamper Resistant Software | Martin D Stepp |
Papers 2 |
|||
Date | Author | Title | Presenter |
---|---|---|---|
April 2 | Aucsmith | Tamper Resistant Software: An implementation | Tapas |
April 4 | Nickerson | The Encode Solution to Implementing Tamper Resistant Software; Extending Trust into a Hostile Environment; An Introduction to the Mathematics of Hiding Data in Software. | TBA |
April 4 | Jakobsson | Discouraging Software Piracy Using Software Aging | Ashok Ramasamy |
April 9 | Proebsting | Krakatoa: Decompilation in Java | Balamurugan M. Chirtsabesan |
April 9 | Cifuentes | Decompilation of Binary Programs | Rathnaprabhu |
April 11 | Fred Cohen | Computer Viruses - Theory and Experiments | Martin Stepp |
April 11 | AVP | Computer Virus Classification. | Miriam Miklofsky |
April 16 | Eichin | With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988. | Ginger |
April 16 | Dark Avenger | Various documents on polymorphic viruses, including Mutation Engine Report, Advanced Polymorphism Primer, etc. | Danny Mandel |
April 23 | Aleph One | Smashing the Stack for Fun and Profit | Kelly Heffner |
April 23 | Cesare | Anti-Debugger Techniques; Linux Anti-Debugger Techniques (Fooling the Debugger). | Xiangyu Zhang |
April 25 | InterTrust | Understanding DRM Systems; Golden times for Digital Rights Management? | Andrew Huntwork |
April 25 | Wayner | Mimic Functions | Anna Segurson |