Uni-Logo
Sie sind hier: Startseite Lehre Frühere Veranstaltungen Universität Freiburg Practical Aspects of Network Security
Artikelaktionen

Seminar Practical Aspects of Network Security

In this seminar we discuss current topics of network security. It is a joint seminar of Dr. Alsbih and Prof. Schindelhauer.

Joint seminar of Dr. Amir Alsbih and Prof. Dr Christian Schindelhauer

News

  • 16.06.2014 presentations shifted to 30.06.2014
  • 11.04.2014 web pages online
  • 28.04.2014 registration closed

Dates

  • 28.04.2014 Registration and begin
  • 30.06.2014 Short presentations (10 minutes)
  • 11.07.2014 Deadline for written thesis (5-10 pages)
  • Saturday, 02.08.2014, Block seminar 10am-5pm, (30 minutes presentation)

Contents

We discuss up-to-date questions of IT security in enterprises. Topics will be announced asap.

  1. Diana Das Angeloose: Jekyll on iOS: When Benign Apps Become Evil
    http://www.cc.gatech.edu/~klu38/publications/security13.pdf
  2. Markus Weiß: An Analysis of Anonymity in the Bitcoin System
    http://arxiv.org/pdf/1107.4524.pdf
  3. Ezequiel Primo: Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space
    https://www.usenix.org/legacy/events/sec11/tech/full_papers/Mulazzani6-24-11.pdf
  4. Sabine Rogg: Static Detection of Access Control Vulnerabilities in Web Applications
    https://www.usenix.org/legacy/events/sec11/tech/full_papers/Sun.pdf
  5. Felix Thein: Gone in 360 Seconds: Hijacking with Hitag2
    https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final95.pdf
  6. Ekaterina Stepanova: My Software has a Vulnerability, should I Worry?
    http://arxiv.org/pdf/1301.1275v3.pdf
  7. Johannes Kern: Defending Networks with Incomplete Information: A Machine Learning  Approach
    https://media.blackhat.com/us-13/US-13-Pinto-Defending-Networks-with-Incomplete-Information-A-Machine-Learning-Approach-WP.pdf
  8. Simon Ebner: All Your Clouds are Belong to us – Security Analysis of Cloud Management Interfaces
    http://www.computerworld.com.pt/media/2011/10/AmazonSignatureWrapping.pdf
  9. Iman Dabbaghi Divshali: Enabling Security in Cloud Storage SLAs with CloudProof
    http://static.usenix.org/event/atc11/tech/final_files/Popa.pdf
  10. Mallikarjun Nuti: Software Migration Project Cost Estimation using  COCOMO II and Enterprise Architecture Modeling
    http://ceur-ws.org/Vol-1023/paper4.pdf
  11. Parupalli Ujwala: On the Feasibility of Utilizing Security Metrics in Software-Intensive Systems
    http://paper.ijcsns.org/07_book/201001/20100131.pdf

 

Organisation

Registration online with the University system.

Forum

For this lecture a forum is available. Here, substantive and organizational questions can be discussed. A registration is not necessary. 

Seminar

  • First meeting
    • Monday, 15.04.2013, 6pm-8pm, room 101-01-016
  • First presentations
    • Monday, 30.06.2014, 6pm-8pm, room 101-01-016 (if necessary also on 07.07.2014 same time, same room)
      • Diana Das Angeloose: Jekyll on iOS: When Benign Apps Become Evil
      • Markus Weiß: An Analysis of the Anonymity in the Bitcoin System
      • Ezequiel Primo: Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space
      • Sabine Rogg: Static Detection of Access Control Vulnerabilities in Web Applications
      • Felix Thein: Gone in 360 Seconds: Hijacking with Hitag2
      • Ekaterina Stepanova: My Software has a Vulnerability, should I Worry?
      • Johannes Kern: Defending Networks with Incomplete Information: A Machine Learning  Approach
      • Simon Ebner: All Your Clouds are Belong to us – Security Analysis of Cloud Management Interfaces
      • Iman Dabbaghi Divshali: Enabling Security in Cloud Storage SLAs with CloudProof
      • Mallikarjun Nuti: Software Migration Project Cost Estimation using  COCOMO II and Enterprise Architecture Modeling
      • Parupalli Ujwala: On the Feasibility of Utilizing Security Metrics in Software-Intensive Systems
  • Block seminar
    • Saturday, 02.08.2014, 10am-5pm, room 101-01-016
      • 10:00 Markus Weiß: An Analysis of the Anonymity in the Bitcoin System
      • 10:45 Ezequiel Primo: Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space
      • 11:30 Sabine Rogg: Static Detection of Access Control Vulnerabilities in Web Applications
      • 12:15 Felix Thein: Gone in 360 Seconds: Hijacking with Hitag2
      • 13:00-14:00 Lunch break
      • 14:00 Johannes Kern: Defending Networks with Incomplete Information: A Machine Learning  Approach
      • 14:45 Simon Ebner: All Your Clouds are Belong to us – Security Analysis of Cloud Management Interfaces
      • 15:30 Iman Dabbaghi Divshali: Enabling Security in Cloud Storage SLAs with CloudProof

Exam

It is necessary that each participants gives two presentations and a written report. Grading is based on the

  • Written thesis (deadline 11.07.2014)
  • Presentation and interaction in the seminar 

 

Benutzerspezifische Werkzeuge