Computer Science
Seminars
Article Selection. Your seminar must be a coherent explanation of an advanced topic in Network Defence and Countermeasures, showing your careful reading and understanding of a research article. Read through the list of articles to choose the one you would like to present orally in COMPSCI 726. Choose a research article by Friday, July 23, 23:59 hrs NZ time via Canvas by joining one of the Research Article groups.
Seminar Details. Each student should have a comprehensive understanding of the article, and should present the idea clearly to the class. The presentation should cover 3 parts: introduction, solution, and your criticism. The introduction should include some motivation, background knowledge, and the problem. The solution presented in the article should be explained based on your understanding. The core idea should be clear, and you are expected to explain some details of the proposed technique in a way that can be easily followed by your classmates. Finally, you should share your own comments on this article, such as what is the limitation of the proposed idea and how one can overcome it. Note that you should come up with your own limitations instead of explaining those already listed in the article!
The slides should neither be too wordy nor too simple. The points listed in the slides should be clear and explained in some details. It would be better if you can use some visuals. Giving some examples will make your point easier to follow. Moreover, during the presentation, your voice should be clear. Your pace should be neither too high nor too low. You should also try to engage your audience by maintaining eye contact with them. We suggest not to read from notes or slides, since it will make your presentation less engaging.
You will get 15 minutes for your seminar and 5 to 10 minutes for the QA and discussion. Each of 3 parts (including introduction, solution, and criticism) will be evaluated separately. Each part is worth 4 marks. The marks are based on whether you make your presentation clear, the slides are good, the audience is engaged, your criticisms are convincing, and you give good answers in the Q&A session. Students are required to share the seminar slides right after their presentation so that others can benefit from them.
Peer Review. You also need to review one assigned presentation within a week after that presentation. In your review, first you need to justify which points were explained clearly, which points were not clear, and what important points were missing in the presentation. You also need to evaluate the criticism part, explaining whether it was good or not along with your justifications. Your review should not exceed one page and should be submitted by email. This review is worth 3 marks.
Date | Time | Presenter | Article | Reviewer |
---|---|---|---|---|
September 23 | 10:05 | Lucas Betts | Research Article 12: [Perry-NDSS21] [Slides] | Ken Fang |
September 27 | 12:05 | Ken Fang | Research Article 6: [Hiller-CCS20] [Slides] | Allen Zhao |
September 29 | 11:05 | Allen Zhao | Research Article 14: [Zhang-CCS20] [Slides] | Jordan He |
September 30 | 10:05 | Jordan He | Research Article 1: [Alowaisheq-CCS20] [Slides] | Lucas Betts |
October 4 | 12:00 | Louis Wang | Research Article 5: [Griffioen-CCS20] [Slides] | Nicholas Berg |
October 4 | 12:25 | Nicholas Berg | Research Article 5: [Griffioen-CCS20] [Slides] | Louis Wang |
October 6 | 11:00 | Zain Khan | Research Article 7: [Jansen-NDSS21] [Slides] | Haoyu Zhang |
October 6 | 11:25 | Haoyu Zhang | Research Article 7: [Jansen-NDSS21] | Zain Khan |
October 7 | 10:00 | Samuel Boyes | Research Article 13: [Vanhoef-USENIX21] [Slides] | Stephen Brough |
October 7 | 10:25 | Stephen Brough | Research Article 13: [Vanhoef-USENIX21] [Slides] | Samuel Boyes |
October 11 | 12:00 | Aditya Krishnan | Research Article 9: [Klein-SP21] [Slides] | Ingemar Watt |
October 11 | 12:25 | Ingemar Watt | Research Article 9: [Klein-SP21] [Slides] | Aditya Krishnan |
October 13 | 11:00 | Denise Jarry | Research Article 8: [Kaleli-NDSS21] [Slides] | Oliver Chamberlain |
October 13 | 11:25 | Oliver Chamberlain | Research Article 8: [Kaleli-NDSS21] [Slides] | Denise Jarry |
October 14 | 10:00 | Gemma Lowe | Research Article 2: [Alrawi-USENIX21] [Slides] | Shiv Prasad |
October 14 | 10:25 | Shiv Prasad | Research Article 2: [Alrawi-USENIX21] [Slides] | Gemma Lowe |
October 18 | 12:00 | Hongyi Lu | Research Article 11: [Man-CCS20] [Slides] | Peirong Zhao |
October 18 | 12:25 | Peirong Zhao | Research Article 11: [Man-CCS20] [Slides] | Hongyi Lu |
October 20 | 11:00 | Paul Fitzgerald | Research Article 10: [Ma-USENIX21] | Courtney Hunter |
October 20 | 11:25 | Courtney Hunter | Research Article 4: [Brinkmann-USENIX21] [Slides] | Paul Fitzgerald |
- [Alowaisheq-CCS20] Alowaisheq, Eihal, Siyuan Tang, Zhihao Wang, Fatemah Alharbi, Xiaojing Liao, and XiaoFeng Wang, Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting Referral, In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1307-1322, 2020. [Download]
- [Alrawi-USENIX21] Alrawi, Omar, Charles Lever, Kevin Valakuzhy, Kevin Snow, Fabian Monrose, and Manos Antonakakis, The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle, In USENIX Security Symposium, 2021. [Download]
[Bai-SP21] Bai, Zhihao, Ke Wang, Hang Zhu, Yinzhi Cao, and Xin Jin, Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks, In Proceedings of the IEEE Symposium on Security & Privacy, 2021. [Download]
- [Brinkmann-USENIX21] Brinkmann, Marcus, Christian Dresen, Robert Merget, Damian Poddebniak, Jens Müller, Juraj Somorovsky, Jörg Schwenk, and Sebastian Schinzel, ALPACA: Application Layer Protocol Confusion-Analyzing and Mitigating Cracks in TLS Authentication, In USENIX Security Symposium, 2021. [Download]
- [Griffioen-CCS20] Griffioen, Harm, and Christian Doerr, Examining Mirai's Battle over the Internet of Things, In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 743-756, 2020. [Download]
- [Hiller-CCS20] Hiller, Jens, Johanna Amann, and Oliver Hohlfeld, The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures, In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1289-1306, 2020. [Download]
- [Jansen-NDSS21] Jansen, Kai, Liang Niu, Nian Xue, Ivan Martinovic, and Christina Pöpper, Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance, In Proceedings of the Network and Distributed System Security Symposium, 2021. [Download]
- [Kaleli-NDSS21] Kaleli, Beliz, Brian Kondracki, Manuel Egele, Nick Nikiforakis, and Gianluca Stringhini, To Err. Is Human: Characterizing the Threat of Unintended URLs in Social Media, In Proceedings of the Network and Distributed System Security Symposium, 2021. [Download]
- [Klein-SP21] Klein, Amit, Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More), In Proceedings of the IEEE Symposium on Security & Privacy, 2021. [Download]
- [Ma-USENIX21] Ma, Zane, Joshua Mason, Manos Antonakakis, Zakir Durumeric, Michael Bailey, Sascha Fahl, Jörg Schwenk et al., What's in a Name? Exploring CA Certificate Control, In USENIX Security Symposium, 2021. [Download]
- [Man-CCS20] Man, Keyu, Zhiyun Qian, Zhongjie Wang, Xiaofeng Zheng, Youjun Huang, and Haixin Duan, DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels, In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1337-1350, 2020. [Download]
- [Perry-NDSS21] Perry, Yarin, Neta Rozen-Schiff, and Michael Schapira, A Devil of a Time: How Vulnerable is NTP to Malicious Timeservers?, In Proceedings of the Network and Distributed System Security Symposium, 2021. [Download]
- [Vanhoef-USENIX21] Vanhoef, Mathy, Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation, In USENIX Security Symposium, 2021. [Download]
- [Zhang-CCS20] Zhang, Mingming, Xiaofeng Zheng, Kaiwen Shen, Ziqiao Kong, Chaoyi Lu, Yu Wang, Haixin Duan, Shuang Hao, Baojun Liu, and Min Yang, Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks, In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1939-1952, 2020. [Download]
-
Related Programmes