Basic Course Details:
|
Discussion Date | Topic/Theme/Papers |
Tuesday, March 29 | Intro to the Class no reading yet |
Thursday, April 1 |
War stories
Cliff Stoll, "Stalking the Wily Hacker," CACM 31(5), May 1988. Bill Cheswick, "Evening with Berferd," Proc. of the Winter USENIX Conference, 1990. Tsutomu Shimomura. Testimony before the United States House of Representatives Committee on Science, Subcommittee on Technology, February 11, 1997. Andrew H. Gross, "Analyzing Computer Intrusions," Ph.D Dissertation, University of California, San Diego, 1997. (§1.1 only)
|
Tuesday, April 6 |
Current state of forensics
Brian Carrier, "Getting Physical with the Digital Investigation Process," J. of Digital Evidence 2(2), Nov. 2003. Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, "Principles-Driven Forensic Analysis," Proc. of NSPW'05, September 2005.
|
Thursday, April 8 |
Current state of forensic applications: law, e-voting, human resources, crime, hackers
Sean Peisert, Matt Bishop, and Keith Marzullo, "Computer Forensics In Forensis," Proc. of IEEE-SADFE'08, May 2008. Steven J. Greenwald, "High Assurance Digital Forensics: A Panelist's Perspective," Proc. of SADFE'09, May 2009. Matt Bishop, Sean Peisert, Candice Hoke, Mark Graff, and David Jefferson, "E-Voting and Forensics: Prying Open the Black Box," Proc. of EVT/WOTE'09, August 2009. Matt Bishop, Mark Graff, Candice Hoke, David Jefferson, and Sean Peisert, "Resolving the Unexpected in Elections: Election Officials' Options, Tech Report, October 2008.
|
Tuesday, April 13 |
Disk/filesystem Forensics
Brian Carrier, Sleuth Kit Gene H. Kim and Eugene H. Spafford, "The design and implementation of Tripwire: a file system integrity checker," Proc of 2nd ACM CCS, 1994. Andrew H. Gross, "Analyzing Computer Intrusions," Ph.D Dissertation, University of California, San Diego, 1997. (§4–5 only)
|
Thursday, April 15 |
Logging
Matt Bishop, "A Standard Audit Trail Format," Proc of the 1995 National Information Systems Security Conference, 1995. Bruce Schneier and John Kelsey, "Secure Audit Logs to Support Computer Forensics," ACM TISSEC 2(2), May 1999. |
Tuesday, April 20 |
Host forensics
Samuel T. King and Peter M. Chen, "Backtracking Intrusions," ACM TOCS 23(1), February 2005. Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, "Analysis of Computer Intrusions Using Sequences of Function Calls," IEEE TDSC 4(2), April–June 2007. Ashvin Goel, Wu-chang Feng, David Maier, Wu-chi Feng, and Jonathan Walpole, "Forensix: A Robust, High-Performance Reconstruction System," Proc. of the International Conference on Distributed Computing Systems, 2005.
|
Thursday, April 22 |
Network forensics (1)
Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson, "Practical network support for IP traceback," Proc of ACM SIGCOMM'00, 2000. Peter Sommer, "Intrusion Detection Systems as Evidence," Proc. of RAID, 1998. Peter Stephenson, "The Application of Intrusion Detection Systems in a Forensic Environment," (extended abstract), Proc. of RAID, 2000.
|
Tuesday, April 27 |
Network forensics (2), Virtual machine introspection and the "observer" effect (1)
Samuel T. King, Z. Morley Mao, Dominic G. Lucchetti, and Peter M. Chen, Enriching Intrusion Alerts Through Multi-Host Causality," Proc. of NDSS, 2005. Wei Wang and Thomas E. Daniels, "A Graph Based Approach Toward Network Forensics Analysis," ACM TISSEC 12(1), 2008. George W. Dunlap, Samuel T. King, Sukru Cinar, Murtaza A. Basrai and Peter M. Chen, "ReVirt: enabling intrusion analysis through virtual-machine logging and replay," Proc of OSDI, 2002. Samuel T. King, George W. Dunlap, and Peter M. Chen, "Debugging Operating Systems with Time-Traveling Virtual Machines," Proc of USENIX'05, April 2005.
|
Thursday, April 29 |
VMs (2) and Models (1)
Brian Payne, "Secure and Flexible Monitoring of Virtual Machines," Proc of ACSAC, 2007. Brian Hay and Kara Nance, "Forensic Examination of Volatile System Data Using Virtual Introspection," ACM SIGOPS, 42(3), 2008. Matt Bishop, "A Model of Security Monitoring," Proc. of ACSAC, December 1989.
|
Tuesday, May 4 |
Models (2)
Matt Bishop, "A Model of Security Monitoring," Proc. of ACSAC, December 1989. Matt Bishop, Christopher Wee, and Jeremy Frank, "Goal-Oriented Logging and Auditing," 1996 (re-published as Computer Security: Art and Science §24.3) Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, "Toward Models for Forensic Analysis," Proc. of SADFE'07, April 2007.
|
Thursday, May 6 |
Models (3)
Andrew H. Gross, "Analyzing Computer Intrusions," Ph.D Dissertation, University of California, San Diego, 1997. (§2–3 only) Fred B. Schneider, "Enforceable Security Policies," ACM TISSEC, 3(1), Feb. 2000. Mark M. Pollitt, "An Ad Hoc Review of Digital Forensic Models," Proc. of SADFE, 2007. (available via Smartsite under "Resources")
|
Tuesday, May 11 |
Models (4)
Florian Buchholz and Clay Shields, "Providing Process Origin Information to Aid in Computer Forensic Investigations," J. of Computer Security 12(5), September 2004. Benjamin A. Kuperman, A Categorization of Computer Security Monitoring Systems and the Impact on the Design of Audit Sources, PhD Dissertation, Purdue University, 2004. (§3–5 only) |
Thursday, May 13 | Models (5) and Insider Threat (1)
Christian W. Probst and René R. Hansen, "Analysing Access Control Specifications," Proc of SADFE, 2009. (available via Smartsite under "Resources") Christian W. Probst, Jeffrey Hunker, Matt Bishop, and Dieter Gollmann, Countering Insider Threats (Dagstuhl Seminar Proceedings), 2008.
|
Tuesday, May 18 | No Class: Oakland Conference |
Thursday, May 20 | Insider threat (2) and Investigations of the scope and economics of Internet crime
Peter G. Neumann, "Combatting Insider Misuse, with Relevance to Integrity and Accountability in Elections and Other Applications," Dagstuhl Workshop on Insider Threats, 2008. Matt Bishop, Sophie Engle, Deborah A. Frincke, Carrie Gates, Frank L. Greitzer, Sean Peisert, and Sean Whalen, "A Risk Management Approach to the 'Insider Threat,'" Insider Threats in Cyber Security, Springer Verlag, 2010. Jason Franklin, Vern Paxson, Stefan Savage, and Adrian Perrig, "An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants" Proc of. ACM CCS, 2007. Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, and Stefan Savage, "Spamalytics: An Empirical Analysis of Spam Marketing Conversion, CACM 52(9):99-107, 2009.
|
Tuesday, May 25 | Guest Lecture |
Thursday, May 27 | Guest Lecture |
Tuesday, June 1 | Student Presentations |
Thursday, June 3 | Student Presentations |