Project Ideas. Semester long projects of medium scope. TAs presenting project ideas today. Students can submit their own ideas



Similar documents
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK

Using the owncloud Android App

Mobile Performance Management Tools Prasanna Gawade, Infosys April 2014

VPN: Virtual Private Network Setup Instructions

QuickBooks Online: Security & Infrastructure

CONFIGURATION AND SETUP USER GUIDE AND REFERENCE MANUAL

Table of contents. HTML5 Data Bindings SEO DMXzone

SESSION IDENTIFIER ARE FOR NOW, PASSWORDS ARE FOREVER

Reading an sent with Voltage Secur . Using the Voltage Secur Zero Download Messenger (ZDM)

Using Foundstone CookieDigger to Analyze Web Session Management

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Web Applications: Overview and Architecture

Application Code Development Standards

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.

Automatic vs. Manual Code Analysis

BUSINESS IMPACT OF POOR WEB PERFORMANCE

Hacking Web Apps. Detecting and Preventing Web Application Security Problems. Jorge Blanco Alcover. Mike Shema. Technical Editor SYNGRESS

Advanced ANDROID & ios Hands-on Exploitation

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Usable Crypto: Introducing minilock. Nadim Kobeissi HOPE X, NYC, 2014

Getting Started Guide for Developing tibbr Apps

elearning for Secure Application Development

Access to Kozminski University library databases from home

Revisiting SQL Injection Will we ever get it right? Michael Sutton, Security Evangelist

Content management system comparison

Document Structure Integrity: A Robust Basis for Cross-Site Scripting Defense

Web Application security testing: who tests the test?

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

Relax Everybody: HTML5 Is Securer Than You Think

BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS

Deploy. Friction-free self-service BI solutions for everyone Scalable analytics on a modern architecture

Finding and Preventing Cross- Site Request Forgery. Tom Gallagher Security Test Lead, Microsoft

A Practical Attack to De Anonymize Social Network Users

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

This document is for informational purposes only. PowerMapper Software makes no warranties, express or implied in this document.

Cloudy with a chance of 0-day

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Web-Application Security

Enterprise Application Security Workshop Series

The Top Web Application Attacks: Are you vulnerable?

Harvesting Developer Credentials in Android Apps

What is Web Security? Motivation

VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES. AUTHOR: Chema Alonso

Chrome Extensions: Threat Analysis and Countermeasures

Preventing the Revealing of Online Passwords to Inappropriate Websites with LoginInspector

Adobe Connect and Zoom are web conferencing tools with many features. Google Hangouts and Skype are primarily for voice calling or text chat.

The Cloud App Visibility Blindspot

WEB 2.0 AND SECURITY

Quick Start Guide. Installation and Setup

Discovering passwords in the memory

Google Cloud Print Guide

Lab 3 Assignment (Web Security)

Inventory and Analytics for Browser-based Applications in the Enterprise

Challenges in Android Application Development: A Case Study

SAFECode Security Development Lifecycle (SDL)

Remote Desktop Web Access. Using Remote Desktop Web Access

Enrollment Process for Android Devices

How To Manage Web Content Management System (Wcm)

You must download the desktop client before you start, this is found on the Yuuguu page on your Ezereach web portal.

My Stuff Everywhere Your Content On Any Screen

How to Build a Trusted Application. John Dickson, CISSP

Messing with the Android Runtime

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

What do a banking Trojan, Chrome and a government mail server have in common? Analysis of a piece of Brazilian malware

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Training module 2 Installing VMware View

Team Foundation Server 2013 Installation Guide

High-Speed Internet Quick Start Guide

A guide to affilinet s tracking technology

Adobe Systems Incorporated

WALKME WHITEPAPER. WalkMe Architecture

Remote Desktop Solution, (RDS), replacing CITRIX Home Access

Managed Devices - Web Browser/HiView

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

Handling of "Dynamically-Exchanged Session Parameters"

Creating Your Own TinyWeb Database. Ball State University - CS116 - Ashley Swartz

User s guide. Version 2.0. August / 23

GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

PSG College of Technology, Coimbatore Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

Customer Bank Account Management System Technical Specification Document

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification

AdwareMedic. About AdwareMedic How to use AdwareMedic Frequently Asked Questions Version History... 9 License Agreement...

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

E-LEARNING STUDENT S MANUAL

Recommended operating systems and software for end user services. Operating systems and software not supported for end user services

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015

Transcription:

Project Ideas Semester long projects of medium scope TAs presenting project ideas today Students can submit their own ideas Send to cs161projectidea@gmail.com To be approved by staff Short presentation of approved ideas this Wed.

Project Groups Each group is 6 people, no exceptions Can be with lab partner, but doesn t need to be Form your own groups Use the discussion forum!

Project Group Submission Groups choose top 2 project preferences We ll try hard to give top preference Multiple groups on same project Provide times the group can meet Needs to be many, many times! Web submission

Project Signup Schedule 1/23 Monday TA project presentation 1/24 Tuesday Students submit project ideas 1/25 Wednesday Approved ideas presented by students 2/1 Wednesday Group signups due

Web Security Joel

Content Security Policy for Web Applications Content Security Policies (CSP) can be applied to sites to stop XSS but requires modifying the application Modify a large application (e.g. MediaWiki) to use an effective CSP Show that the application still works with the policy applied

Privilege Granularity in Chrome Extensions Extensions add functionality to web browsers Chrome limits privileges to only those requested Coarse grained How well does the granularity match actual functionality? Evaluate this over several hundred extensions Find common patterns in extensions Propose alternative privileges?

More Web Security Dev

Measuring Incoherencies on the Web Platform Goal: Write an addon and a crawler to measure the prevalence of same-origin-policy inconsistencies. For example, cross-origin overlap, document.domain usage. Motivation: Can t improve what you don t know. The current situation is a mess. Evaluation: Number of checks implemented and scale of data collected. Prereqs: HTML, JavaScript, the Web

Privilege Separation of HTML5 applications Goal: Implement privilege separated versions of popular HTML5 applications Motivation: TCB Reduction, auditability, SECURITY! Evaluation: TCB reduction achieved, functionality reduced, security analysis Prereqs: HTML, JavaScript

Implementation of DSI in Firefox Goal: Implement a nonce based approach to XSS mitigation Motivation: XSS is difficult to protect against purely on the server side. Enlist help from the browser. Evaluation: HTMLPurifier test cases passed Prereqs: C/C++ knowledge, HTML, JavaScript

Measuring JavaScript Dynamicity Goal: Write an addon and a crawler to measure the prevalence of crazy js on the web Motivation: JS consists of a number of crazy features that make analysis difficult. A measurement will tell us what we can ignore and what we can t. Evaluation: Number of checks implemented and scale of data collected. Prereqs: HTML, JavaScript

Android Security Steve

Similarity Among Android Applications by GUI Feature Extraction Goals: Develop a system to compute similarity between GUIs in Android apps Examine both static elements (XML) and dynamic elements (DEX) Motivation: Piracy, malware detection Similar looking applications with underlying differences in code is a good metric for detecting trojaned applications Copied or stolen interface detection Description: Feature extraction and comparisons Android GUIs Students will be expected to evaluate their tool against no less than 1000 applications and demonstrate and evaluate their approach Prereq: Android, Java, C++, machine learning a plus!

Measuring Intent Security Problems in Android Goals: Develop a tool to detect problems with Android intents and measure their prevalence among a large set of applications. Suggest proposals to fix most common bugs. Motivation: Intents can leak information or be used to abuse privilege Pressing need to quantify the prevalence of these errors Can shed insight into developing a better Intent system to make Android more secure. Description: Understand common flaws with the Intent system in android, classify and quantify their prevalence on a large dataset. Prereq: Android (very experienced!), Java

Android and Testing via Crowd Sourcing Kevin

Fine-grained permission control engine on Android The current coarse-grained permission system: Application-level Install-time decision All-or-nothing decision Goal: Fine-grained rule-based permission system (App, Package/Callstack, Permission) Outcome: Policy engine Sample rules

Testing via Crowd Sourcing HCI-based programs should be tested by a human Event-driven, user-interaction directed A first step towards that: describing interactions Type username Type pa****rd Click Login Click CS161 Click like Outcome: Interaction recorder and replayer

An Evaluation of Automated Bug-finding Approaches Cho

Automated Software Analysis Tidal Wave in constraint solving and symbolic execution techniques Analysis of software security will be increasingly automated and based on logic Different SE approaches Dynamic symbolic execution Static checking Model checking How do they compare? Source: A. Platzer

What do I need to do? Evaluate and compare the best-of-breed tools of the 3 approaches On a common set of real-world applications Focus on security bugs Soundness & Completeness [Practical] Determine the kind of programs each approach is well-suited for [Research] Gain insights into how they work / apply symbolic execution differently

ACID Test Evaluate your own suitability for this project (and your team-mates) Google: KLEE symbolic execution Difficulty: Was it a breeze? Interest: Does it make you want to learn more?

Privacy Emil

Enhance Privacy of Open Source Apps Goal: Combine popular open source applications with UC Berkeley s platform for private data. Example Apps: Online document editors, photo galleries, video conferencing, chat rooms, webmail. Why: Offer rich applications to users with strong privacy guarantees.

Privacy Extension for Browsers Goal: Prevent a website from sending user data to another website. Example: Your online tax software should not share your financial data with crooks. How: Develop a browser extension that intercepts HTTP requests.

Google+ Data Analysis Goal: Analyze Google+ data on a global scale. ** We have daily snapshots of the Google+ social graph and profile data. ** Explore and model how social patterns evolve. Determine importance and weights of traits in social networks. Why do people accept friend requests?

Graduate School Application System Goal: Create a single website for submitting applications to multiple graduate schools. Why: Offer enhanced privacy for students, and letter recommendation writers.

Virtual Machine Forking Goal: Efficiently isolate web sessions from each other on a server to improve security. Why: Prevent privacy breaches across users. How: Fork virtual machine metadata and memory mapping for each user session.

Memory Access Privacy Goal: Determine what an application is doing by analyzing its memory access pattern. Why: Demonstrate new form of attack on privacy for outsourced computation. How: Record and analyze memory traces of applications.

Alternative Authentication Daniele

Active Authentication based on mouse and keyboard usage Goal: write Javascript collection code and Python analysis code to distinguish mouse/keyboard usage patterns Motivation: Active authentication aims at strengthening the classic password authentication by observing user behavior Evaluation: Robustness and portability of Javascript code. Quality of the analysis (number and uniqueness of extracted features) Prereqs: HTML, JavaScript, Python