Content | Number of ParticipantsThe number of participants is limited to 14 students. Seminar Topics A seminar topic includes multiple papers, the following topics are available. Hint: Some papers are only obtainable from the university network! Trusted Browsers Supervisor: David Goltzsche- Saba Eskandarian, Jonathan Cogan, Sawyer Birnbaum, Peh Chang Wei Brandon, Dillon Franke, Forest Fraser, Gaspar Garcia Jr, Eric Gong, Hung T Nguyen, Taresh K Sethi and others: Fidelius: Protecting User Secrets from Compromised Browsers, in arXiv preprint arXiv:1809.04774, 2018 (eskandarian2018fidelius, BibTeX)
- David Goltzsche, Colin Wulf, Divya Muthukumaran, Konrad Rieck, Peter Pietzuch and Rüdiger Kapitza: TrustJS: Trusted Client-side Execution of JavaScript, in Proceedings of the 10th European Workshop on Systems Security, ACM, pages 7, 2017 (goltzsche2017trustjs, DOI, BibTeX)
Novel Programming Languages for the Web Supervisor: David Goltzsche- Gavin Bierman, Martín Abadi and Mads Torgersen: Understanding typescript, in European Conference on Object-Oriented Programming, Springer, pages 257-281, 2014 (bierman2014understanding, BibTeX)
- Andreas Haas, Andreas Rossberg, Derek L Schuff, Ben L Titzer, Michael Holman, Dan Gohman, Luke Wagner, Alon Zakai and JF Bastien: Bringing the web up to speed with WebAssembly, in Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation, ACM, pages 185-200, 2017 (haas2017bringing, BibTeX)
Private Web Search Supervisor: David Goltzsche- Sonia Ben Mokhtar, Antoine Boutet, Pascal Felber, Marcelo Pasin, Rafael Pires and Valerio Schiavoni: X-search: revisiting private web search using intel SGX, in Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, ACM, pages 198-208, 2017 (mokhtar2017x, BibTeX)
- Rafael Pires, David Goltzsche, Sonia Ben Mokhtar, Sara Bouchenak, Antoine Boutet, Pascal Felber, Rüdiger Kapitza, Marcelo Pasin and Valerio Schiavoni: Cyclosa: Decentralizing Private Web Search Through SGX-Based Browser Extensions, in Distributed Computing Systems (ICDCS), 2018 IEEE 38th International Conference on, IEEE, 2018 (pires2018cyclosa, DOI, BibTeX)
Side-channel Attacks on JavaScript Supervisor: David Goltzsche- Daniel Gruss, Clémentine Maurice and Stefan Mangard: Rowhammer. js: A remote software-induced fault attack in javascript, in International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Springer, pages 300-321, 2016 (gruss2016rowhammer, BibTeX)
- Michael Schwarz, Moritz Lipp and Daniel Gruss: JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks, in NDSS'18, 2018 (schwarz2018javascript, BibTeX)
From Desktop to Web Applications Supervisor: David Goltzsche- Amin Vahdat, Thomas Anderson, Michael Dahlin, Eshwar Belani, David Culler, Paul Eastham and Chad Yoshikawa: WebOS: Operating system services for wide area applications, in High Performance Distributed Computing, 1998. Proceedings. The Seventh International Symposium on, IEEE, pages 52-63, 1998 (vahdat1998webos, BibTeX)
- Helen J Wang, Alexander Moshchuk and Alan Bush: Convergence of desktop and web applications on a multi-service OS, in Proceedings of the 4th USENIX conference on Hot topics in security, USENIX Association, pages 11-11, 2009 (wang2009convergence, BibTeX)
Secure database environments Supervisor: Ines Messadi- Vasily Sartakov, Nico Weichbrodt, Sebastian Krieter, Thomas Leich and Rüdiger Kapitza: STANlite-a database engine for secure data processing at rack-scale level, in Cloud Engineering (IC2E), 2018 IEEE International Conference on, IEEE, pages 23-33, 2018 (sartakov2018stanlite, BibTeX)
- Christian Priebe, Kapil Vaswani and Manuel Costa: EnclaveDB: A Secure Database using SGX, in EnclaveDB: A Secure Database using SGX, IEEE, pages 0, 2018 (priebe2018enclavedb, BibTeX)
Optimized Key-Value Services using RDMA Supervisor: Ines Messadi- Christopher Mitchell, Yifeng Geng and Jinyang Li: Using One-Sided RDMA Reads to Build a Fast, CPU-Efficient Key-Value Store., in USENIX Annual Technical Conference, pages 103-114, 2013 (mitchell2013using, BibTeX)
- Anuj Kalia, Michael Kaminsky and David G Andersen: Using RDMA efficiently for key-value services, in ACM SIGCOMM Computer Communication Review, ACM, pages 295-306, 2014 (kalia2014using, BibTeX)
Services replication using CRDTs Supervisor: Ines Messadi- Albert van der Linde, Pedro Fouto, Jo ao Leit ao, Nuno Preguiça, Santiago Casti neira and Annette Bieniusa: Legion: Enriching Internet Services with Peer-to-Peer Interactions, in Proceedings of the 26th International Conference on World Wide Web, International World Wide Web Conferences Steering Committee, pages 283-292, 2017 (van2017legion, BibTeX)
- Marek Zawirski, Nuno Preguiça, Sérgio Duarte, Annette Bieniusa, Valter Balegas and Marc Shapiro: Write fast, read in the past: Causal consistency for client-side applications, in Proceedings of the 16th Annual Middleware Conference, ACM, pages 75-87, 2015 (zawirski2015write, BibTeX)
Integrity verification services Supervisor: Ines Messadi- Pierre-Louis Aublin, Florian Kelbert, Dan O'Keeffe, Divya Muthukumaran, Christian Priebe, Joshua Lind, Robert Krahn, Christof Fetzer, David Eyers and Peter Pietzuch: LibSEAL: revealing service integrity violations using trusted execution, in Proceedings of the Thirteenth EuroSys Conference, ACM, pages 24, 2018 (aublin2018libseal, BibTeX)
- Rohit Sinha and Mihai Christodorescu: VeritasDB: High Throughput Key-Value Store with Integrity (sinhaveritasdb, BibTeX)
High-performance RDMA-based replication Supervisor: Ines Messadi- Yacine Taleb, Ryan Stutsman, Gabriel Antoniu and Toni Cortes: Tailwind: Fast and Atomic RDMA-based Replication, in 2018 USENIX Annual Technical Conference, USENIX ATC 2018, Boston, MA, USA, July 11-13, 2018., pages 851-863, 2018 (TalebSAC18, BibTeX)
- Marius Poke and Torsten Hoefler: Dare: High-performance state machine replication on rdma networks, in Proceedings of the 24th International Symposium on High-Performance Parallel and Distributed Computing, ACM, pages 107-118, 2015 (poke2015dare, BibTeX)
Seminar The talk and essay should be in English. Each participant will take one or more papers under a specific topic. Participants are responsible for a peer review, including: - Attend peer's presentation dry run and give feedback.
- Review peer's essay before submission.
- Collect questions to peer's presentation during discussion session.
NotesPlease submit the essay as well as your presentation slides. The requirements for presentation and essay are listed as follows: - Presentation and essay preferably in English.
- Presentation time about 20 minutes.
- Essay should comprise exact 6 pages without references.
Each participant is supposed to do further research based on the paper. The supervisors are always glad to help in this case. The strength of the university depends on academic and personal integrity. In this seminar, essays must be done in your own words. Plagiarism is an offense against the examination regulations. TemplatesThe LaTeX template for seminar essay can be found here. Additional considerations for the design of the essay can be found on the website of IBR. LaTeX templates for presentation slides can be found here. Additional considerations for the design can be found on the website of IBR. MaterialReview Template Download
The material is only available to registered attendees. In order to register, you need either an IBR account or a self-activated IBR-y-account. Afterwards you can login to this site (with the function at the top of this page). [ Podcast | Podcast aller Formate | Newsfeed aller Formate ] | Chapter | Slides | Exercises |
---|
1. Intro | | | 2. From Desktop to Web Applications | | | 4. Private Web Search | | |
|