``You are always born under the wrong sign, and to live in this world properly you have to rewrite your own horoscope day by day.'' Umberto Eco

Cristina Nita-Rotaru

Cristina Nita-Rotaru

Assistant Professor
Department of Computer Sciences
Purdue University



CERIAS Security Reading Group


The group meets every Monday at 3 in CERIAS conference room (REC217).

Mailing list:security-reading-groupATcs.purdue.edu

Fall 2005
Spring 2005
Fall 2004
Spring 2004
Fall 2003


Fall 2004

    08/30/2004
    • Safe Kernel Extensions Without Run-Time Checking, George Necula and Peter Lee, OSDI'96
      Presented by Jacques
    09/06/2004
    • Labour Day.
    09/13/2004
    • Digital forensics:
      • Getting Physical with the Digital Investigation Process Brian Carrier and Eugene H. Spafford International Journal of Digital Evidence http://www.ijde.org/docs/03_fall_carrier_Spa.pdf
      • An Examination of Digital Forensic Models Mark Reith, Clint Carr, and Gregg Gunsch IJDE http://www.ijde.org/docs/02_fall_art2.pdf
      • Defining Event Reconstruction of Digital Crime Scenes Brian D. Carrier and Eugene H. Spafford Journal of Forensic Sciences https://www.cerias.purdue.edu/tools_and_resources/bibtex_archive/ archive/2004-37.pdf
      Presented by Brian.
    09/20/2004
    • Visualization of Wormholes in Sensor Networks to appear in WiSe 2004.
      Presented by Chao
    09/27/2004
    • Presenter: Courtney Falk Paper: The Memorability and Security of Passwords - Some Empirical Results by Yan et. al. http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/tr500.pdf (20-25 mins presentation)
    • Presenter: Abhilasha B. Spantzel Topic: Model Checking Papers: M. M uller-Olm, D.A. Schmidt, and B. Steffen. Model checking: a tutorial introduction. In Proceedings of the 6th Static Analysis Symposium, volume 1694 of Lecture Notes in Computer Science, pp. 330--354, 1999 http://www.cis.ksu.edu/~schmidt/papers/home.html
    10/04/2004
    • http://www.cs.umd.edu/~waa/class-pubs/rc4_ksaproc.ps
      Presented by Ulaf
    10/11/2004
      OCTOBER BREAK
    10/18/2004
    • Ziad
    • Mahesh http://www.cerias.purdue.edu/homes/tripunit/finalsod.pdf http://www.cerias.purdue.edu/homes/tripunit/simac.pdf
    10/25/2004
    • Marina
    • Hidden Access Control Policies with Hidden Credentials, Presented by Jiangtao.
    11/01/2004
    • Keith Frikken and Mahesh present an overview of WPES and FMSE from CCS 2004.
    11/08/2004
    • A Path Identification Mechanism to Defend against DDoS Attacks. www.ece.cmu.edu/~dawnsong/papers/pi.pdf. Presented by Bhagya.
    11/15/2004
    • Incentives for Sharing in Peer-to-Peer Networks" it is available here http://citeseer.ist.psu.edu/golle01incentives.html Presented by Tibi
    11/22/2004
    • Understanding BGP misconfigurations Ratul Mahajan, David Wetherall, and Tom Anderson ACM SIGCOMM, Aug 2002. URL: http://www.cs.washington.edu/homes/ratul/bgp/. Presented by HyoJeong
    11/29/2004
    • "Purpose Based Access Control for Privacy Protection in Relational Database Systems" by Ji-Won Byun, Elisa Bertino, Ninghui Li. Presented by Ji-Won
    12/06/2004

Spring 2004

    01/12/2004
    • Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. Sanjay E. Sarma, Stephen A. Weis, Ronald L. Rivest and Daniel W. Engels. First International Conference on Security in Pervasive Computing.
    • RFID Systems and Security and Privacy Implications. Sanjay E. Sarma, Stephen A. Weis, and Daniel W. Engels. Cryptographic Hardware in Embedded Systems.
    01/26/2004
    • Low Cost Attacks on Tamper Resistant Devices by Ross Anderson, Markus Kuhn http://citeseer.nj.nec.com/anderson97low.html
    02/02/2004
    • A Security Policy Model for Clinical Information Systems, by Ross Anderson. S&P 1996. http://citeseer.nj.nec.com/anderson96security.html
    MEETING WILL BE AT 2:30 PM, CERIAS conference room.
    02/09/2004
    • "Why cryptosystems fail?" by Ross Anderson http://doi.acm.org/10.1145/168588.168615
    02/16/2004
    02/23/2004
    • The Emperor's old armor, Bob Blakley
      http://doi.acm.org/10.1145/304851.304855
    03/01/2004
    03/08/2004
    03/29/2004
    • Positive Results and Techniques for Obfuscation Benjamin Lynn and Manoj Prabhakaran and Amit Sahai. Eurocrypt 2004.
    04/05/2004
    • Efficient Private Matching and Set Intersection Michael J. Freedman and Kobbi Nissim and Benny Pinkas Eurocrypt 2004.
    04/12/2004
    • Anonymous Identification in Ad-Hoc Groups Yevgeniy Dodis and Aggelos Kiayias and Antonio Nicolosi and Victor Shoup Eurocrypt 2004.
    04/19/2004
    04/26/2004

Fall 2003

    09/03/2003 D. E. Denning, An Intrusion-detection Model, IEEE Trans. on Software Engg., SE-13, pp.222-232, February 1987.
    www.cs.georgetown.edu/~denning/infosec/ids-model.rtf
    09/08/2003 J. McHugh, Testing Intrusion Detection Systems: a Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory. TISSEC 3(4): 262-294, 2000
    http://portal.acm.org/citation.cfm?doid=382912.382923

    T. Ptacek, T. Newsham, Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection, 1998.
    http://citeseer.nj.nec.com/ptacek98insertion.html
    09/15/2003 P. Loscocco and S. Smalley, Meeting Critical Security Objectives with Security-Enhanced Linux, Proceedings of the 2001 Ottawa Linux Symposium.
    http://www.nsa.gov/selinux/doc/ottawa01/ottawa01.html
    09/22/2003 S. Savage, D. Wetherall, A. Karlin, T. Anderson, Practical Network Support for IP Traceback, SIGCOMM.
    http://citeseer.nj.nec.com/savage00practical.html 2000
    09/29/2003 R. Hauser, A. Przygienda and G. Tsudik, Reducing the Cost of Security in Link State Routing Proceedings of NDSS 1997.
    http://citeseer.nj.nec.com/hauser97reducing.html

    Securing Distance-Vector Routing Protocols, In Proceedings of NDSS 1997 B. R. Smith, S. Murthy, J.J. Garcia-Luna-Aceves.
    http://citeseer.nj.nec.com/smith97securing.html
    10/06/2003 Y.-C. Hu, A. Perrig, D. B. Johnson, Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks, Proceedings of MobiCom 2002
    http://citeseer.nj.nec.com/531013.html
    10/20/2003 B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. Journal of the ACM, 45(6):965-981, 1998. Earlier version in FOCS'95.
    http://citeseer.nj.nec.com/499507.html
    10/27/2003 S. Jha, O. Sheyner, and J. Wing, Minimization and Reliability Analyses of Attack Graphs.Technical Report. CMU.
    http://www-2.cs.cmu.edu/afs/cs.cmu.edu/project/calder/www/tr02-109.html
    11/03/2003 Christian Collberg, Clark Thomborson, Douglas Low. A Taxonomy of Obfuscating Transformations. Technical Report 148, Department of Computer Science, University of Auckland, July 1997.
    http://citeseer.nj.nec.com/collberg97taxonomy.html
    11/10/2003 Summary of CCS 2003.
    http://www.acm.org/sigs/sigsac/ccs/CCS2003
    11/17/2003 Identity based encryption from the Weil pairing. by D. Boneh and M. Franklin. SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003. Extended abstract in proceedings of Crypto '2001.
    http://citeseer.nj.nec.com/boneh01identitybased.html


Send your comments and questions to Cristina Nita-Rotaru