Date Reading Presenter
Mon
Jan. 14
How to Read a Paper, S. Keshav, University of Waterloo, 2013.
Writing reviews for systems conferences, Timothy Roscoe, ETH Zurich 2007.

SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security Critical Processor Bugs
M. Hicks, C. Sturton, S.T. King, J.M. Smith. ASPLOS 2015.
Cynthia Sturton
Mon
Jan. 21
Dr. Martin Luther King Jr. Day
Mon
Jan. 28
Identifying Security Critical Properties for the Dynamic Verification of a Processor
R. Zhang, N. Stanley, C. Griggs, A. Chi, C. Sturton. ASPLOS 2017.
Rui Zhang
Mining Security Critical Linear Temporal Logic Specifications for Processors
C. Deutschbein, C. Sturton. MTV 2018.
Calvin Deutschbein
Mon
Feb. 4
Groups Due
End-to-End Automated Exploit Generation for Validating the Security of Processor Designs
R. Zhang, C. Deutschbein, P. Huang, C. Sturton. MICRO 2018.
Rui Zhang
A Recursive Strategy for Symbolic Execution to Find Exploits in Hardware Designs
R. Zhang, C. Sturton. FMS 2018.
Mon
Feb. 11
Differential Power Analysis
P. Kocher, J. Jaffe, B. Jun. CRYPTO 1999.
Asher Scott
[lecture notes]
Cache-timing attacks on AES
D.J. Bernstein. 2005.
Asher Scott
[lecture notes]
Mon
Feb. 18
FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack
Y. Yarom, K. Falkner. USENIX 2014.
Andrew Vitkus
[lecture notes]
New Cache Designs for Thwarting Software Cache-based Side Channel Attacks
Z. Wang, R. B. Lee. ISCA 2007.
Yufeng Gong
[lecture notes]
Mon
Feb. 25
Project Proposals Due
Spectre Attacks: Exploiting Speculative Execution
P. Kocher et al. 2018.
Andrew Vitkus
[lecture notes]
Meltdown: Reading Kernel Memory from User Space
M. Lipp et al. 2018.
Kedrian James
[lecture notes]
Mon
Mar. 4
DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors
V. Kiriansky, I. Lebedev, S. Amarasinghe, S. Devadas, J. Emer. MICRO 2018.
Kedrian James
[lecture notes]
CheckMate: Automated Synthesis of Hardware Exploits and Security Litmus Tests
C. Trippel, D. Lustig, M. Martonosi. MICRO 2018.
Joshua Bakita
[lecture notes]
Mon
Mar. 11
Spring Break
Mon
Mar. 18
Sanctum: Minimal Hardware Extensions for Strong Software Isolation
V. Costan, I. Lebedev, S. Devadas. USENIX 2016.
Dylan Tastet
[lecture notes]
A Formal Foundation for Secure Remote Execution of Enclaves
P. Subramanyan, R. Sinha, I. Lebedev, S. Devadas, S. A. Seshia. CCS 2017.
Mac Malone
[lecture notes]
Mon
Mar. 25
Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution
J. Van Bulck et al. USENIX 2018.
Greg Sanders
[lecture notes]
Kami: a Platform for High-level Parametric Hardware Specification and Its Modular Verification
J. Choi, M. Vijayaraghavan, B. Sherman, A. Chlipala, Arvind. ICFP 2017.
Mac Malone
[lecture notes]
Mon
Apr. 1
Progress Report Due
An Embedded True Random Number Generator for FPGAs
P. Kohlbrenner, K. Gaj. FPGA 2004.
Yufeng Gong
[lecture notes]
A Provable-Security Analysis of Intel’s Secure Key RNG
T. Shrimpton, R. S. Terashima. EUROCRYPT 2015.
Joshua Bakita
[lecture notes]
Mon
Apr. 8
A2: Analog Malicious Hardware
K. Yang, M. Hicks, Q. Dong, T. Austin, D. Sylvester. SP 2016.
Xinran Lu
[lecture notes]
The Sorcerer’s Apprentice Guide to Fault Attacks
H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, C. Whelan. 2004.
Greg Sanders
[lecture notes]
Mon
Apr. 15
Design Principles for Tamper-Resistant Smartcard Processors
O. Kommerling, M. G. Kuhn. WOST 1999.
Xinran Lu
[lecture notes]
Chip and PIN is Broken
S. J. Murdoch, S. Drimer, R. Anderson, M. Bond. SP 2010.
Dylan Tastet
[lecture notes]
Mon
Apr. 22
Final Presentations
Please fill out the online Carolina Course Evaluation.
Fri
Apr. 26
Final Papers due @ 11:59 PM