SecVisor: Security reading group

Reading group about Security topics at IITD

JOIN US
Meetings
Internal Link (accessible within IITD only)

Research Interests:

Block chains
Control flow integiry
Side channel attacks
Trusted Execution Environment

Meetings:

Date Paper Resources
16th Aug 2019, Aditya Blockchain mining games. Slides
2nd Aug 2019, Ismi DIAT:Data Integrity Attestation for Resilient Collaboration of Autonomous Systems Slides
26nd July 2019, Himashu FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature Slides
7th June 2019, Vijay BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid Slides
31th May 2019, Aditya Algorand: Scaling Byzantine Agreements for Cryptocurrencies Slides
24th May 2019, Ovia Majority is not Enough: Bitcoin Mining is Vulnerable Slides
17th May 2019, Sandeep F-LaaS: A Control-Flow-Attack Immune License-as-a-Service Model Slides
10th May 2019, Ovia Discussion on the block chain security issues like, chain split and hijaking of the chain by malicious users.  
3rd May 2019 , Omais Morphable Counters: Enabling Compact Integrity Trees For Low-Overhead Secure Memories Sides
26th Apr 2019, Sandeep Camouflage: Memory Traffic Shaping to Mitigate Timing Attacks, HPCA 2017. Slides
17th Apr 2019, Presented by: Himanshu Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet, NDSS 2019. Slides
12nd Apr 2019, Geeta SeCloak: ARM Trustzone-based Mobile Peripheral Control, Mobisys 2018.  

Guidelines:

Participants: