Please add yourself to a lecture by editing this Google Doc. I periodically grab this data from Google Docs and sync it to the course website, so it make take a little time before your updates are reflected here.
Date | Slides | Topic | Required reading | Optional reading | Discussion leaders |
---|---|---|---|---|---|
1/6 | [gdoc] | Intro | None | Sam | |
1/8 | [gdoc] | Core OS | Application performance and flexibility on exokernel systems. M. Frans Kaashoek, Dawson R. Engler, Gregory R. Ganger, Héctor M. Briceño, Russell Hunt, David Mazières, Thomas Pinckney, Robert Grimm, John Jannotti, and Kenneth Mackenzie. In the Proceedings of the 16th ACM Symposium on Operating Systems Principles (SOSP '97), Saint-Malô, France, October 1997. Research topic: how to read a paper |
Sam | |
1/10 | [Slides] | Core OS | OS Fundamentals: VMMs. Optional readig: OSTEP Appendix B | Sam | |
1/13 | [Slides] | Core OS | Scale and performance in the Denali isolation kernel. Whitaker, A., Shaw, M., and Gribble, S. D. 2002. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation | Sam | |
1/15 | [Slides] | Quiz 1 | Shuo Tang, Haohui Mai, and Samuel T. King, Trust and Protection in the Illinois Browser Operating System. Proceedings of the 2010 Symposium on Operating Systems Design and Implementation (OSDI), October 2010.
Research topic: How to present |
Sam | |
1/17 | [Slides] | Core OS | ShortCut: accelerating mostly-deterministic code regions, X Dou, PM Chen, J Flinn Proceedings of the 27th ACM Symposium on Operating Systems Principles, 2019 | Shiven Mian, Sandra Bae, Zee, Nan, Haixin, Kathleen Blanck, Shawn Qiu | |
1/20 | [Slides] | NO CLASS | N/A | ||
1/22 | [Slides] | Quiz 2 | Research topic: How to think of new ideas | Sam | |
1/24 | [Slides] | Modern OS | Saba Eskandarian, Jonathan Cogan, Sawyer Birnbaum, Peh Chang Wei Brandon, Dillon Franke, Forest Fraser, Gaspar Garcia Jr., Eric Gong, Hung T. Nguyen, Taresh K. Sethi, Vishal Subbiah, Michael Backes, Giancarlo Pellegrino, Dan Boneh, Fidelius: Protecting User Secrets from Compromised Browsers. IEEE Symposium on Security and Privacy 2019: 264-280 | Yunqiu, Tony, keyi wu, Binshuai Wang, Pengcheng Ding | |
1/27 | [Slides] | Modern OS | 50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System Joel Reardon, University of Calgary / AppCensus Inc.; Álvaro Feal, IMDEA Networks Institute / Universidad Carlos III Madrid; Primal Wijesekera, U.C. Berkeley / ICSI; Amit Elazari Bar On, U.C. Berkeley; Narseo Vallina-Rodriguez, IMDEA Networks Institute / ICSI / AppCensus Inc.; Serge Egelman, U.C. Berkeley / ICSI / AppCensus Inc. Usenix Security 2019 | Dhruvatara Bhogishetty, Jayneel Vora, Shubham Pandey, Anusha Bangi, Jailan Sabet | |
1/29 | [Slides] | Quiz 3 | Research topic TBD | Sam | |
1/31 | [Slides] | Cryptocurrencies | Bitcoin: A Peer-to-Peer Electronic Cash System | Nikhil Wadhwa, Prashanth Duggirala, Dhruv Krishnan, Priya Holani | |
2/3 | [Slides] | Cryptocurrencies | Notary: a device for secure transaction approval Anish Athalye, Adam Belay, M. Frans Kaashoek, Robert T Morris, Nickolai Zeldovich, SOSP 2019 | Jia-Wei Liang, Yi-Chen Liu, Yue Wu, Che-Yu Liu, Juanyi Xu, Muting Wu | |
2/5 | Quiz 4 | What to expect when you get a job + how to get a job | Sam | ||
2/7 | [Slides] | Distributed Storage | "Bigtable: A Distributed Storage System for Structured Data. Fay Chang , Jeffrey Dean , Sanjay Ghemawat , Wilson C. Hsieh , Deborah A. Wallach , Mike Burrows , Tushar Chandra , Andrew Fikes , Robert E. Gruber, OSDI'06: Seventh Symposium on Operating System Design and Implementation, Seattle, WA, November, 2006." | Sicheng Mu, Yalin Zhang, Neil Arakkal, Aakaash Kapoor | |
2/10 | [Slides] | Distributed Storage | In Search of an Understandable Consensus Algorithm by Diego Ongaro and John Ousterhout. 2014 USENIX Annual Technical Conference. [Conference video] | lihang pan, Tao Wang, Sajjad Rahnama, Rohan Sogani,Jiaqi Liu, Jared Li | |
2/12 | Quiz 5 | Meetings | Sam | ||
2/14 | SPAM | Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse Kurt Thomas,Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson, In 22th USENIX Security Symposium (USENIX Security 13), 2013 | Julian Angeles, Matthew Farrer, Wenjing Fan, Zhuoer Tong, Alfred Liu, Shidi Yu | ||
2/17 | NO CLASS | N/A | |||
2/19 | Quiz 6 | Meetings | Sam | ||
2/21 | [Slides] | Authentication | N. Karapanos, C. Marforio, C. Soriente, and S. Capkun. Sound-proof: Usable two-factor authentication based on ambient sound. In 24th USENIX Security Symposium (USENIX Security 15), pages 483–498, Washington, D.C., 2015. USENIX Association. | Kun Qian, Yu Li, Qiangyang Wu, Mingyang Zhou, Yuheng Li | |
2/24 | [Slides] | Authentication | Progressive authentication: deciding when to authenticate on mobile phones Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos 21st USENIX Security Symposium | August 2012 | Xiaorui Wang, Mengxiao Lin, Chuyuan Qu,Jiemin Wu, Yubo Wang, Haitian Chen | |
2/26 | Quiz 7 | Meetings | Sam | ||
2/28 | [Slides] | Authentication | B. Reaves, L. Blue, H. Abdullah, L. Vargas, P. Traynor and T. Shrimpton. AuthentiCall: Efficient Identity and Content Authentication for Phone Calls, In Proceedings of the USENIX Security Symposium (SECURITY), 2017. | Peter Rong, Jingyuan Li,Zixin Chi,Sutej Kulkarni | |
3/2 | Guest Lecture | N/A | |||
3/4 | [Slides] | Quiz 8 | Meetings | Sam | |
3/6 | NO CLASS | ||||
3/9 | NO CLASS | ||||
3/11 | Presentations | ||||
3/13 | Presentations | ||||
3/19 | Final project due | Final project due @1pm |