Computer Science


Seminars


Article Selection. Your seminar must be a coherent explanation of an advanced topic in Network Defence and Countermeasures, showing your careful reading and understanding of a research article. Read through the list of articles to choose the one you would like to present orally in COMPSCI 726. Choose a research article by Friday, July 23, 23:59 hrs NZ time via Canvas by joining one of the Research Article groups.


Seminar Details. Each student should have a comprehensive understanding of the article, and should present the idea clearly to the class. The presentation should cover 3 parts: introduction, solution, and your criticism. The introduction should include some motivation, background knowledge, and the problem. The solution presented in the article should be explained based on your understanding. The core idea should be clear, and you are expected to explain some details of the proposed technique in a way that can be easily followed by your classmates. Finally, you should share your own comments on this article, such as what is the limitation of the proposed idea and how one can overcome it. Note that you should come up with your own limitations instead of explaining those already listed in the article!


The slides should neither be too wordy nor too simple. The points listed in the slides should be clear and explained in some details. It would be better if you can use some visuals. Giving some examples will make your point easier to follow. Moreover, during the presentation, your voice should be clear. Your pace should be neither too high nor too low. You should also try to engage your audience by maintaining eye contact with them. We suggest not to read from notes or slides, since it will make your presentation less engaging.


You will get 15 minutes for your seminar and 5 to 10 minutes for the QA and discussion. Each of 3 parts (including introduction, solution, and criticism) will be evaluated separately. Each part is worth 4 marks. The marks are based on whether you make your presentation clear, the slides are good, the audience is engaged, your criticisms are convincing, and you give good answers in the Q&A session. Students are required to share the seminar slides right after their presentation so that others can benefit from them.


Peer Review. You also need to review one assigned presentation within a week after that presentation. In your review, first you need to justify which points were explained clearly, which points were not clear, and what important points were missing in the presentation. You also need to evaluate the criticism part, explaining whether it was good or not along with your justifications. Your review should not exceed one page and should be submitted by email. This review is worth 3 marks.


Seminar Schedule

Date Time Presenter Article Reviewer
September 23 10:05 Lucas Betts Research Article 12: [Perry-NDSS21] [Slides] Ken Fang
September 27 12:05 Ken Fang Research Article 6: [Hiller-CCS20] [Slides] Allen Zhao
September 29 11:05 Allen Zhao Research Article 14: [Zhang-CCS20] [Slides] Jordan He
September 30 10:05 Jordan He Research Article 1: [Alowaisheq-CCS20] [Slides] Lucas Betts
October 4 12:00 Louis Wang Research Article 5: [Griffioen-CCS20] [Slides] Nicholas Berg
October 4 12:25 Nicholas Berg Research Article 5: [Griffioen-CCS20] [Slides] Louis Wang
October 6 11:00 Zain Khan Research Article 7: [Jansen-NDSS21] [Slides] Haoyu Zhang
October 6 11:25 Haoyu Zhang Research Article 7: [Jansen-NDSS21] Zain Khan
October 7 10:00 Samuel Boyes Research Article 13: [Vanhoef-USENIX21] [Slides] Stephen Brough
October 7 10:25 Stephen Brough Research Article 13: [Vanhoef-USENIX21] [Slides] Samuel Boyes
October 11 12:00 Aditya Krishnan Research Article 9: [Klein-SP21] [Slides] Ingemar Watt
October 11 12:25 Ingemar Watt Research Article 9: [Klein-SP21] [Slides] Aditya Krishnan
October 13 11:00 Denise Jarry Research Article 8: [Kaleli-NDSS21] [Slides] Oliver Chamberlain
October 13 11:25 Oliver Chamberlain Research Article 8: [Kaleli-NDSS21] [Slides] Denise Jarry
October 14 10:00 Gemma Lowe Research Article 2: [Alrawi-USENIX21] [Slides] Shiv Prasad
October 14 10:25 Shiv Prasad Research Article 2: [Alrawi-USENIX21] [Slides] Gemma Lowe
October 18 12:00 Hongyi Lu Research Article 11: [Man-CCS20] [Slides] Peirong Zhao
October 18 12:25 Peirong Zhao Research Article 11: [Man-CCS20] [Slides] Hongyi Lu
October 20 11:00 Paul Fitzgerald Research Article 10: [Ma-USENIX21] Courtney Hunter
October 20 11:25 Courtney Hunter Research Article 4: [Brinkmann-USENIX21] [Slides] Paul Fitzgerald

List of Articles

  1. [Alowaisheq-CCS20] Alowaisheq, Eihal, Siyuan Tang, Zhihao Wang, Fatemah Alharbi, Xiaojing Liao, and XiaoFeng Wang, Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting Referral, In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1307-1322, 2020. [Download]
  2. [Alrawi-USENIX21] Alrawi, Omar, Charles Lever, Kevin Valakuzhy, Kevin Snow, Fabian Monrose, and Manos Antonakakis, The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle, In USENIX Security Symposium, 2021. [Download]
  3. [Bai-SP21] Bai, Zhihao, Ke Wang, Hang Zhu, Yinzhi Cao, and Xin Jin, Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks, In Proceedings of the IEEE Symposium on Security & Privacy, 2021. [Download]
  4. [Brinkmann-USENIX21] Brinkmann, Marcus, Christian Dresen, Robert Merget, Damian Poddebniak, Jens Müller, Juraj Somorovsky, Jörg Schwenk, and Sebastian Schinzel, ALPACA: Application Layer Protocol Confusion-Analyzing and Mitigating Cracks in TLS Authentication, In USENIX Security Symposium, 2021. [Download]
  5. [Griffioen-CCS20] Griffioen, Harm, and Christian Doerr, Examining Mirai's Battle over the Internet of Things, In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 743-756, 2020. [Download]
  6. [Hiller-CCS20] Hiller, Jens, Johanna Amann, and Oliver Hohlfeld, The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures, In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1289-1306, 2020. [Download]
  7. [Jansen-NDSS21] Jansen, Kai, Liang Niu, Nian Xue, Ivan Martinovic, and Christina Pöpper, Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance, In Proceedings of the Network and Distributed System Security Symposium, 2021. [Download]
  8. [Kaleli-NDSS21] Kaleli, Beliz, Brian Kondracki, Manuel Egele, Nick Nikiforakis, and Gianluca Stringhini, To Err. Is Human: Characterizing the Threat of Unintended URLs in Social Media, In Proceedings of the Network and Distributed System Security Symposium, 2021. [Download]
  9. [Klein-SP21] Klein, Amit, Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More), In Proceedings of the IEEE Symposium on Security & Privacy, 2021. [Download]
  10. [Ma-USENIX21] Ma, Zane, Joshua Mason, Manos Antonakakis, Zakir Durumeric, Michael Bailey, Sascha Fahl, Jörg Schwenk et al., What's in a Name? Exploring CA Certificate Control, In USENIX Security Symposium, 2021. [Download]
  11. [Man-CCS20] Man, Keyu, Zhiyun Qian, Zhongjie Wang, Xiaofeng Zheng, Youjun Huang, and Haixin Duan, DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels, In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1337-1350, 2020. [Download]
  12. [Perry-NDSS21] Perry, Yarin, Neta Rozen-Schiff, and Michael Schapira, A Devil of a Time: How Vulnerable is NTP to Malicious Timeservers?, In Proceedings of the Network and Distributed System Security Symposium, 2021. [Download]
  13. [Vanhoef-USENIX21] Vanhoef, Mathy, Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation, In USENIX Security Symposium, 2021. [Download]
  14. [Zhang-CCS20] Zhang, Mingming, Xiaofeng Zheng, Kaiwen Shen, Ziqiao Kong, Chaoyi Lu, Yu Wang, Haixin Duan, Shuang Hao, Baojun Liu, and Min Yang, Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks, In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1939-1952, 2020. [Download]


Apply now!


Handbook

Postgraduate study options

Computer Science Blog



Please give us your feedback or ask us a question

This message is...


My feedback or question is...


My email address is...

(Only if you need a reply)

A to Z Directory | Site map | Accessibility | Copyright | Privacy | Disclaimer | Feedback on this page