University of Minnesota
Security and Privacy in Computing
index.php

Readings on: Subverted infrastructure

Reading (2/3) for Thursday, April 21st: Vasiios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, and George Danezis. “A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components.” In ACM CCS, October 2017.
[ACM DL]

Reading (2/2) for Tuesday, April 19th: Kaiyuan Yang, Matthew Hicks, Qing Dong, Todd Austin, and Dennis Sylvester. “A2: Analog Malicious Hardware.” In IEEE Security and Privacy, May 2016.
[IEEE Xplore]

Reading (1/3) for Thursday, April 21st: Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, and Hovav Shacham. “A Systematic Analysis of the Juniper Dual EC Incident.” In ACM CCS, August 2016.
[ACM DL]

Reading (1/2) for Tuesday, April 19th: Xavier de Carné de Carnavalet and Mohammad Mannan. “Challenges and implications of verifiable builds for security-critical open-source software.” In Annual Computer Security Applications Conference (ACSAC), December 2014.
[ACM DL]

Reading (3/3) for Thursday, April 21st: David A. Wheeler. “Countering Trusting Trust through Diverse Double-Compiling.” In Annual Computer Security Applications Conference (ACSAC), December 2005.
[Author's copy] [Author's page]