Please add yourself to a lecture by editing this Google Doc. I periodically grab this data from Google Docs and sync it to the course website, so it make take a little time before your updates are reflected here.

Date Slides Topic Required reading Optional reading Discussion leaders
1/6 [gdoc] Intro None Sam
1/8 [gdoc] Core OS Application performance and flexibility on exokernel systems. M. Frans Kaashoek, Dawson R. Engler, Gregory R. Ganger, Héctor M. Briceño, Russell Hunt, David Mazières, Thomas Pinckney, Robert Grimm, John Jannotti, and Kenneth Mackenzie. In the Proceedings of the 16th ACM Symposium on Operating Systems Principles (SOSP '97), Saint-Malô, France, October 1997.
Research topic: how to read a paper
Sam
1/10 [Slides] Core OS OS Fundamentals: VMMs. Optional readig: OSTEP Appendix B Sam
1/13 [Slides] Core OS Scale and performance in the Denali isolation kernel. Whitaker, A., Shaw, M., and Gribble, S. D. 2002. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation Sam
1/15 [Slides] Quiz 1 Shuo Tang, Haohui Mai, and Samuel T. King, Trust and Protection in the Illinois Browser Operating System. Proceedings of the 2010 Symposium on Operating Systems Design and Implementation (OSDI), October 2010.

Research topic: How to present
Sam
1/17 [Slides] Core OS ShortCut: accelerating mostly-deterministic code regions, X Dou, PM Chen, J Flinn Proceedings of the 27th ACM Symposium on Operating Systems Principles, 2019 Shiven Mian, Sandra Bae, Zee, Nan, Haixin, Kathleen Blanck, Shawn Qiu
1/20 [Slides] NO CLASS N/A
1/22 [Slides] Quiz 2 Research topic: How to think of new ideas Sam
1/24 [Slides] Modern OS Saba Eskandarian, Jonathan Cogan, Sawyer Birnbaum, Peh Chang Wei Brandon, Dillon Franke, Forest Fraser, Gaspar Garcia Jr., Eric Gong, Hung T. Nguyen, Taresh K. Sethi, Vishal Subbiah, Michael Backes, Giancarlo Pellegrino, Dan Boneh, Fidelius: Protecting User Secrets from Compromised Browsers. IEEE Symposium on Security and Privacy 2019: 264-280 Yunqiu, Tony, keyi wu, Binshuai Wang, Pengcheng Ding
1/27 [Slides] Modern OS 50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System Joel Reardon, University of Calgary / AppCensus Inc.; Álvaro Feal, IMDEA Networks Institute / Universidad Carlos III Madrid; Primal Wijesekera, U.C. Berkeley / ICSI; Amit Elazari Bar On, U.C. Berkeley; Narseo Vallina-Rodriguez, IMDEA Networks Institute / ICSI / AppCensus Inc.; Serge Egelman, U.C. Berkeley / ICSI / AppCensus Inc. Usenix Security 2019 Dhruvatara Bhogishetty, Jayneel Vora, Shubham Pandey, Anusha Bangi, Jailan Sabet
1/29 [Slides] Quiz 3 Research topic TBD Sam
1/31 [Slides] Cryptocurrencies Bitcoin: A Peer-to-Peer Electronic Cash System Nikhil Wadhwa, Prashanth Duggirala, Dhruv Krishnan, Priya Holani
2/3 [Slides] Cryptocurrencies Notary: a device for secure transaction approval Anish Athalye, Adam Belay, M. Frans Kaashoek, Robert T Morris, Nickolai Zeldovich, SOSP 2019 Jia-Wei Liang, Yi-Chen Liu, Yue Wu, Che-Yu Liu, Juanyi Xu, Muting Wu
2/5 Quiz 4 What to expect when you get a job + how to get a job Sam
2/7 [Slides] Distributed Storage "Bigtable: A Distributed Storage System for Structured Data. Fay Chang , Jeffrey Dean , Sanjay Ghemawat , Wilson C. Hsieh , Deborah A. Wallach , Mike Burrows , Tushar Chandra , Andrew Fikes , Robert E. Gruber, OSDI'06: Seventh Symposium on Operating System Design and Implementation, Seattle, WA, November, 2006." Sicheng Mu, Yalin Zhang, Neil Arakkal, Aakaash Kapoor
2/10 [Slides] Distributed Storage In Search of an Understandable Consensus Algorithm by Diego Ongaro and John Ousterhout. 2014 USENIX Annual Technical Conference. [Conference video] lihang pan, Tao Wang, Sajjad Rahnama, Rohan Sogani,Jiaqi Liu, Jared Li
2/12 Quiz 5 Meetings Sam
2/14 SPAM Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse Kurt Thomas,Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson, In 22th USENIX Security Symposium (USENIX Security 13), 2013 Julian Angeles, Matthew Farrer, Wenjing Fan, Zhuoer Tong, Alfred Liu, Shidi Yu
2/17 NO CLASS N/A
2/19 Quiz 6 Meetings Sam
2/21 [Slides] Authentication N. Karapanos, C. Marforio, C. Soriente, and S. Capkun. Sound-proof: Usable two-factor authentication based on ambient sound. In 24th USENIX Security Symposium (USENIX Security 15), pages 483–498, Washington, D.C., 2015. USENIX Association. Kun Qian, Yu Li, Qiangyang Wu, Mingyang Zhou, Yuheng Li
2/24 [Slides] Authentication Progressive authentication: deciding when to authenticate on mobile phones Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos 21st USENIX Security Symposium | August 2012 Xiaorui Wang, Mengxiao Lin, Chuyuan Qu,Jiemin Wu, Yubo Wang, Haitian Chen
2/26 Quiz 7 Meetings Sam
2/28 [Slides] Authentication B. Reaves, L. Blue, H. Abdullah, L. Vargas, P. Traynor and T. Shrimpton. AuthentiCall: Efficient Identity and Content Authentication for Phone Calls, In Proceedings of the USENIX Security Symposium (SECURITY), 2017. Peter Rong, Jingyuan Li,Zixin Chi,Sutej Kulkarni
3/2 Guest Lecture N/A
3/4 [Slides] Quiz 8 Meetings Sam
3/6 NO CLASS
3/9 NO CLASS
3/11 Presentations
3/13 Presentations
3/19 Final project due Final project due @1pm