Below is the calendar for this semester course. This is the preliminary schedule, which will be altered as the semester progresses. It is the responsibility of the students to frequently check this web-page for schedule, readings, and assignment changes. As the professor, I will attempt to announce any change to the class, but this web-page should be viewed as authoritative. If you have any questions, please contact me (contact information is available at the course homepage).

Readings for Discussion
(do readings before class)
01/11/11 Introduction
Course syllabus. link Presenter:
01/13/11 Overview
Operating Systems Security - Ch 1 link Presenter:
Chapter 2: Why Systems Are Not Secure?. Morrie Gasser, in Building a Secure Computer System, 1988. link Presenter:
The Risks Digest link Presenter:
Security Focus: BugTraq link Presenter:
01/18/11 Security Principles
Operating Systems Security - Ch 2 link Presenter:
Computer Security Archives Project, Matt Bishop. link Presenter:
Reference Monitor Concept, Trent Jaeger, Encyclopedia of Cryptography and Security, 2010. link Presenter:
01/20/11 Multics
Operating Systems Security, Chapter 3 link Presenter:
Introduction and Overview of the Multics System F. J. Corbato and V. A. Vyssotsky, in Proceedings of the Fall Joint Computer Conference, 1965. link Presenter:
01/25/11 Multics Analyses
Multics Security Evaluation: Vulnerability Analysis. Paul A. Karger and Roger R. Schell, Tech report ESD-TR-74-193, Hanscom AFB. link Presenter:
Final Report of the Multics Kernel Design Project. Part I, pgs 1-13 Tech Report MIT/LCS/TR-196, Michael Schroeder, David Clark, Jerome Saltzer, D. Wells, MIT, 1977. link Presenter:
01/27/11 Program Security
Secure Virtual Architecture: A Safe Execution Environment for Commodity Operating Systems. John Criswell, Andrew Lenharth, Dinakar Dhurjati, and Vikram Adve, in Proceedings of the 21st Symposium on Operating System Principles, 2007. link Presenter:
02/01/11 Program Security
(Slides) (Slides)
Type Safety link
Control-flow Integrity. Martin Abadi, Mihai Budiu, Ulfar Erlingsson, and Jay Ligatti, in Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005. link Presenter:
Securing software by enforcing data-flow integrity. Miguel Castro, Manuel Costa, and Tim Harris, in Proceedings of the 7th Symposium on Operating Systems Design and Implementation, 2006. link Presenter:
02/03/11 Ordinary Operating Systems
Operating Systems Security, Chapter 4 link Presenter:
The inevitability of failure: The flawed assumption of computer security in modern computing environments. P. Loscocco, S. Smalley, P. Muckelbauer, R. Taylor, J. Turner, and J. Farrell. In Proceedings of the 21st National Information Systems Security Conference, October 1998. link Presenter:
02/08/11 Mandatory Access Control Models
Operating Systems Security, Chapter 5 link Presenter:
Lattice-Based Access Control Models. Ravi S. Sandhu, IEEE Computer, 1993. link Presenter:
02/10/11 Mandatory Access Control Models
VM Installation link
A Comparison of Commercial and Military Computer Security Policies. David D. Clark and David R. Wilson. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987. link Presenter:
02/15/11 Security Kernels
Operating Systems Security, Chapter 5 link Presenter:
Scomp: A Solution to the Multilevel Security Problem. Lester J. Fraim in IEEE Computer, 1983. link Presenter:
02/17/11 Security Kernels
Fault Isolation for Device Drivers. Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, and Andrew S. Tanenbaum, in Proceedings of the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'09), pgs. 33-42, July 2009. link Presenter:
02/22/11 Retrofit Commercial
Operating Systems Security, Chapter 7 link Presenter:
Providing Policy Control Over Object Operations in a Mach Based System, Spencer E. Minear. In Proceedings of the Fifth USENIX UNIX Security Symposium, 1995. link Presenter:
02/24/11 Linux Security Modules
Runtime verification of authorization hook placement for the Linux Security Modules framework. Antony Edwards, Trent Jaeger, and Xiaolan Zhang. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 225-234, 2002. link Presenter:
03/01/11 SELinux
(Slides) (Slides) (Slides)
Operating Systems Security, Chapter 8 link Presenter:
Integrating Flexible Support for Security Policies into the Linux Operating System, Peter Loscocco and Stephen Smalley. In Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, 2001. link Presenter:
03/03/11 SELinux Policy Analysis
LSM project link
Analyzing Integrity Protection in the SELinux Example Policy. Trent Jaeger, Xiaolan Zhang, and Reiner Sailer, in Proceedings of the 12th USENIX Security Symposium, 2003. link Presenter:
03/08/11 Spring Break - No class
03/10/11 Spring Break - No class
03/15/11 Trusted Solaris
Operating Systems Security, Chapter 8 link Presenter:
03/17/11 Capability Systems
Operating Systems Security, Chapter 10 link Presenter:
A Secure Identity-Based Capability System. Li Gong, 1989 IEEE Symposium Security and Privacy, May 1989. link Presenter:
03/22/11 Systems Security for Networks
Midterm (Take Home)
New Secmark-based Network Controls for SELinux, James Morris. link Presenter:
Leveraging IPsec for Mandatory Per-Packet Access Control, Trent Jaeger, David H. King, Kevin R. Butler, Serge Hallyn, Joy Latten, Xiaolan Zhang. Proceedings of Second International Conference on Security and Privacy in Communication Networks, 2006. link Presenter:
03/24/11 Virtual Machine Systems
Operating Systems Security, Chapter 11 link Presenter:
03/29/11 Virtual Machine Systems
Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems. Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis, Pratap Subrahmanyam, Carl A. Waldspurger (VMware), Dan Boneh (Stanford), Jeffrey Dwoskin (Princeton), and Dan R.K. Ports (MIT), in Proceedings of the 2008 Conference on Architectural Support for Programming Languages and Operating Systems, 2008. link Presenter:
Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable. Richard Ta-Min, Lionel Litty and David Lie, in Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2006). Pages 279-292. November 2006. link Presenter:
03/31/11 Assurance
(Slides) (Slides)
Operating Systems Security, Chapter 12 link Presenter:
04/05/11 Practical Integrity
(Slides) (Slides)
Attack Surface link
Usable Mandatory Integrity Protection for Operating Systems. Ninghui Li, Ziqing Mao, and Hong Chen, in Proceedings of the 2007 IEEE Symposium on Security and Privacy, 2007. link Presenter:
Toward Automated Information-Flow Integrity Verification for Security-Critical Applications. Umesh Shankar, Trent Jaeger, and Reiner Sailer, in Proceedings of the Symposium on Network and Distributed Systems Security, 2006. link Presenter:
04/07/11 Practical Integrity
A Decentralized Model for Information Flow Control. Andrew Myers and Barbara Liskov, in Proceedings of the 16th ACM Symposium on Operating Systems Principles, 1997. link Presenter:
04/12/11 System Information Flow
Information flow control for standard OS abstractions. Maxwell Krohn et al, in Proceedings of the ACM Symposium on Operating Systems Principles, 2007. link Presenter:
04/14/11 Trusted Computing
(Slides) (Slides)
Outbound Authentication for Programmable Secure Coprocessors. Sean W. Smith, International Journal on Information Security, May 2004. link Presenter:
Design and Implementation of a TCG-based Integrity Measurement Architecture. Reiner Sailer, Xiaolan Zhang, Trent Jaeger, and Leendert van Doorn, in Proceedings of the 13th USENIX Security Symposium, August 2004. link Presenter:
04/19/11 Storage Security
Rootkit-Resistant Disks. Kevin R. B. Butler, Stephen McLaughlin and Patrick D. McDaniel, in Proceedings of the 15th ACM Conference on Computer and Communications Security, 2008. link Presenter:
04/21/11 Web Security
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. Davide Balzarotti et al. in Proceedings of the 2008 IEEE Symposium on Security and Privacy, 2008. link Presenter:
04/26/11 Web Security
Secure web browsing with the OP web browser. Chris Grier, Shuo Tang, and Samuel T. King (UIUC), in Proceedings of the 2008 IEEE Symposium on Security and Privacy, 2008. link Presenter:
04/28/11 Final Exam