Seminar Practical Aspects of Network Security
In this seminar we discuss current topics of network security. It is a joint seminar of Dr. Alsbih and Prof. Schindelhauer.
Joint seminar of Dr. Amir Alsbih and Prof. Dr Christian Schindelhauer
News
- 16.06.2014 presentations shifted to 30.06.2014
- 11.04.2014 web pages online
- 28.04.2014 registration closed
Dates
- 28.04.2014 Registration and begin
- 30.06.2014 Short presentations (10 minutes)
- 11.07.2014 Deadline for written thesis (5-10 pages)
- Saturday, 02.08.2014, Block seminar 10am-5pm, (30 minutes presentation)
Contents
We discuss up-to-date questions of IT security in enterprises. Topics will be announced asap.
- Diana Das Angeloose: Jekyll on iOS: When Benign Apps Become Evil
http://www.cc.gatech.edu/~klu38/publications/security13.pdf - Markus Weiß: An Analysis of Anonymity in the Bitcoin System
http://arxiv.org/pdf/1107.4524.pdf - Ezequiel Primo: Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space
https://www.usenix.org/legacy/events/sec11/tech/full_papers/Mulazzani6-24-11.pdf - Sabine Rogg: Static Detection of Access Control Vulnerabilities in Web Applications
https://www.usenix.org/legacy/events/sec11/tech/full_papers/Sun.pdf - Felix Thein: Gone in 360 Seconds: Hijacking with Hitag2
https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final95.pdf - Ekaterina Stepanova: My Software has a Vulnerability, should I Worry?
http://arxiv.org/pdf/1301.1275v3.pdf - Johannes Kern: Defending Networks with Incomplete Information: A Machine Learning Approach
https://media.blackhat.com/us-13/US-13-Pinto-Defending-Networks-with-Incomplete-Information-A-Machine-Learning-Approach-WP.pdf - Simon Ebner: All Your Clouds are Belong to us – Security Analysis of Cloud Management Interfaces
http://www.computerworld.com.pt/media/2011/10/AmazonSignatureWrapping.pdf - Iman Dabbaghi Divshali: Enabling Security in Cloud Storage SLAs with CloudProof
http://static.usenix.org/event/atc11/tech/final_files/Popa.pdf - Mallikarjun Nuti: Software Migration Project Cost Estimation using COCOMO II and Enterprise Architecture Modeling
http://ceur-ws.org/Vol-1023/paper4.pdf - Parupalli Ujwala: On the Feasibility of Utilizing Security Metrics in Software-Intensive Systems
http://paper.ijcsns.org/07_book/201001/20100131.pdf
Organisation
Registration online with the University system.
Forum
For this lecture a forum is available. Here, substantive and organizational questions can be discussed. A registration is not necessary.
Seminar
- First meeting
- Monday, 15.04.2013, 6pm-8pm, room 101-01-016
- First presentations
- Monday, 30.06.2014, 6pm-8pm, room 101-01-016 (if necessary also on 07.07.2014 same time, same room)
- Diana Das Angeloose: Jekyll on iOS: When Benign Apps Become Evil
- Markus Weiß: An Analysis of the Anonymity in the Bitcoin System
- Ezequiel Primo: Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space
- Sabine Rogg: Static Detection of Access Control Vulnerabilities in Web Applications
- Felix Thein: Gone in 360 Seconds: Hijacking with Hitag2
- Ekaterina Stepanova: My Software has a Vulnerability, should I Worry?
- Johannes Kern: Defending Networks with Incomplete Information: A Machine Learning Approach
- Simon Ebner: All Your Clouds are Belong to us – Security Analysis of Cloud Management Interfaces
- Iman Dabbaghi Divshali: Enabling Security in Cloud Storage SLAs with CloudProof
- Mallikarjun Nuti: Software Migration Project Cost Estimation using COCOMO II and Enterprise Architecture Modeling
- Parupalli Ujwala: On the Feasibility of Utilizing Security Metrics in Software-Intensive Systems
- Monday, 30.06.2014, 6pm-8pm, room 101-01-016 (if necessary also on 07.07.2014 same time, same room)
- Block seminar
- Saturday, 02.08.2014, 10am-5pm, room 101-01-016
- 10:00 Markus Weiß: An Analysis of the Anonymity in the Bitcoin System
- 10:45 Ezequiel Primo: Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space
- 11:30 Sabine Rogg: Static Detection of Access Control Vulnerabilities in Web Applications
- 12:15 Felix Thein: Gone in 360 Seconds: Hijacking with Hitag2
- 13:00-14:00 Lunch break
- 14:00 Johannes Kern: Defending Networks with Incomplete Information: A Machine Learning Approach
- 14:45 Simon Ebner: All Your Clouds are Belong to us – Security Analysis of Cloud Management Interfaces
- 15:30 Iman Dabbaghi Divshali: Enabling Security in Cloud Storage SLAs with CloudProof
- Saturday, 02.08.2014, 10am-5pm, room 101-01-016
Exam
It is necessary that each participants gives two presentations and a written report. Grading is based on the
- Written thesis (deadline 11.07.2014)
- Presentation and interaction in the seminar