Schedule and student assignment for presentations

Here is the chronological list of topics to be presented and the corresponding students to present on each topic.

If there is an overview paper that you choose, that should typically be the first paper to present. For each topic, we should discuss between 3 and 5 papers. The objective is not to understand all the nitty-gritties of each paper but the overall idea, the neat technical solution, and the important results. For example, you can skip detailed comparison with related work, extensions of the technical approach to handle some corner cases, and experimental results that are put in there for completeness rather than for shedding light on the main technical approach.

(Within each topic, the order of student names is arbitrary.)

  1. Problem determination: Ignacio and Tanzima
  2. Vehicular ad-hoc networks: Nina and Matt
  3. Virtualization and security: Abhisek and Amiya
  4. Threading for embedded systems: Rajesh and Jinkyu
  5. Botnets: Gaspar and Sarah

Selection of Topics for Presentation at the DCSL Reading Group in Fall 2009

Where: MSEE 239

When: Wednesdays 5.30-7.00 starting September 30

Place a preference number next to a topic - 1 means most preferred, 5 least, N means you are not willing to present on this topic.

For each topic, I will select two presenters, one working on a closely related topic and another working on an unrelated topic.

Here is the list of topics and a suggested set of papers for each topic.

  1. Virtualization and security
    1. Perez, R.; van Doorn, L.; Sailer, R., "Virtualization and Hardware-Based Security," Security & Privacy, IEEE , vol.6, no.5, pp.24-31, Sept.-Oct. 2008
    2. Payne, B.D.; Carbone, M.; Sharif, M.; Wenke Lee, "Lares: An Architecture for Secure Active Monitoring Using Virtualization," Security and Privacy, 2008. SP 2008. IEEE Symposium on , vol., no., pp.233-247, 18-22 May 2008
    3. VICI--Virtual Machine Introspection for Cognitive Immunity. Timothy Fraser, Matthew Evenson, William Arbaugh. ACSAC 2008
  2. Threading for embedded systems
    1. Adam Dunkels, Oliver Schmidt, Thiemo Voigt, and Muneeb Ali. Protothreads: Simplifying Event-Driven Programming of Memory-Constrained Embedded Systems. In Proceedings of the Fourth ACM Conference on Embedded Networked Sensor Systems (SenSys 2006), Boulder, Colorado, USA, November 2006.
    2. TOSThreads: Safe and Non-Invasive Preemption in TinyOS. Kevin Klues, Chieh-Jan Liang, Jeongyeup Paek, Razvan Musaloiu-E, Philip Levis, Andreas Terzis, Ramesh Govindan. In Sensys 2009.
  3. Botnets
    1. Evan Cooke, Farnam Jahanian, and Danny McPherson. The Zombie roundup: Understanding, detecting, and disrupting botnets. In Proceedings of the Steps to Reducing Unwanted Traffic on the Internet (SRUTI 2005 Workshop), Cambridge, MA, July 2005.
    2. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation.Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee. In Proceedings of The 16th USENIX Security Symposium (Security'07), Boston, MA, August 2007.
    3. P2P as botnet command and control: a deeper insight, by David Dittrich and Sven Dietrich, in Proceedings of the 2008 3rd International Conference on Malicious and Unwanted Software (Malware), October 2008 ("Best Paper" award winner)
  4. Vehicular ad-hoc networks
    1. VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks. Jing Zhao; Guohong Cao; Vehicular Technology, IEEE Transactions on Volume 57, Issue 3, May 2008 Page(s):1910 - 1922.
    2. Wenrui Zhao , Mostafa H. Ammar, Message Ferrying: Proactive Routing in Highly-Partitioned Wireless Ad Hoc Networks, Proceedings of the The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS'03), p.308, May 28-30, 2003.
    3. R. Shah, S. Roy, S. Jain, and W. Brunette. Data MULEs: Modeling a Three-tier Architecture for Sparse Sensor Networks. Elsevier Ad Hoc Networks Journal, vol. 1, issues 2-3, Sept. 2003, pp. 215-233.
  5. Problem determination
    1. Problem Diagnosis in Large-Scale Computing Environments: Alexander V. Mirgorodskiy, Naoya Maruyama, Barton P. Miller, Supercomputing 2006.
    2. "PDA: A Tool for Automated Problem Determination". Hai Huang, Raymond Jennings III, Yaoping Ruan, Ramendra Sahoo, Sambit Sahu, and Anees Shaikh, pp. 153-166 of the Proceedings of the 21st Large Installation System Administration Conference (LISA '07).
    3. Chun Yuan, Ni Lao, Ji-Rong Wen, Jiwei Li, Zheng Zhang, Yi-Min Wang and Wei-Ying Ma, Automated Known Problem Diagnosis with Event Traces, Eurosys 2006.