Below is the calendar for this semester course. This is the preliminary schedule, which will be altered as the semester progresses. It is the responsibility of the students to frequently check this web-page for schedule, readings, and assignment changes. As the professor, I will attempt to announce any change to the class, but this web-page should be viewed as authoritative. If you have any questions, please contact me (contact information is available at the course homepage).

Date Topic Assignments
Due
Readings for Discussion
(do readings before class)
01/14/25 Introduction
01/16/25 Vulnerabilities
01/21/25 Security Testing and Fuzzing (Part 1)
Fuzzing: Challenges and Reflections. link
The Art, Science, and Engineering of Fuzzing: A Survey. link
01/23/25 Security Testing and Fuzzing (Part 2)
NEUZZ: Efficient Fuzzing with Neural Program Smoothing. link
01/28/25 Program Analysis (Part 1) Project propsal due.
A Few Billion Lines of Code Later Using Static Analysis to Find Bugs in the Real World. link
Athena: Analyzing and Quantifying Side Channels of Transport Layer Protocols. link
01/30/25 Program Analysis (Part 2)
Neutaint: Efficient Dynamic Taint Analysis with Neural Networks. link
02/04/25 Symbolic Execution
KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. link
CUTE: A Concolic Unit Testing Engine for C. link
02/06/25 Formal Verification (Part 1)
02/11/25 Paper presentation 1
Formal Analysis (Mujtahid)
and Fuzzing (Ronit)
Paper Review 1: Due 2/10/2025.
Formal Analysis of Access Control Mechanism of 5G Core Network. link
Towards Generic Database Management System Fuzzing. link
02/13/25 Paper presentation 2
GPU Exploit (Deeksha)
DNS-Cache Tracking (Kanika)
Project - Part 1 - report and code submission
GPU memory exploitation for fun and profit. link
DNS Cache-Based User Tracking. link
02/18/25 Project Part 1 demo and presentation + Part 2 plan presentation (15 minutes per team) - Teams 6-10
02/20/25 Project Part 1 demo and presentation + Part 2 plan presentation (15 minutes per team) - Teams 1-5
02/25/25 Paper Presentation 3
Phishing (Chaithanya)
Suppy-chain (Himashveta)
IMU Attack (Raghav)
Paper Review 2: Due 2/24/2025.
Project - Part 1 Demo and Part 2 Proposal Presentation
PhishDecloaker: Detecting CAPTCHA-cloaked Phishing Websites via Hybrid Vision-based Interactive Models. link
Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages. link
StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice ssistant Using Zero-Permission sensors. link
02/27/25 Paper Presentation 4
Spec-Inconsistency (Rao)
Payment (Vedant)
LLM-Fuzzing (Ananna)
CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications. link
Security Analysis of Unified Payments Interface and Payment Apps in India. link
CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications . link
03/04/25 Automata Learning
Learning Regular Sets from Queries and Counterexamples*. link
Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G Basebands. link
03/06/25 Paper presentation 5
Fuzzing (Kapil)
SYN-flood defense (Khusagra)
Vuln. DL FW (Toufik)
Paper Review 3: Due 03/03/2025
Project - Part 2 Progress 1 Due on Mar 20
NEUZZ: Efficient Fuzzing with Neural Program Smoothing link
ISmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data Planes link
IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks link
03/13/25 Spring break! Let me take a break too :)
03/15/25 Spring break! Let me take a break too :)
03/18/25 Project Part 2 progress demo and presentation 1 (15 minutes per team) - Teams 10-6
03/20/25 Project Part 2 progress demo and presentation 1 (15 minutes per team) - Teams 5-1
03/25/25 Invariant Generation Paper Review 4: Due 03/24/2025
Dynamically discovering likely program invariants to support program evolution. link
ORANalyst: Systematic Testing Framework for Open RAN Implementations. link
03/27/25 Paper presentation 6
Smart Contract Verification (Aakash)
LLM Safety (Zhuoyi)
IoT Threats (Jiahe)
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit. link
Safety Layers in Aligned Large Language Models: The Key to LLM Security. link
Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart Homes. link
04/01/25 Paper presentation 7
Access Control (Mujtahid)
Fuzzing Kernel (Ronit)
Is Modeling Access Control Worth It? link
SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in the Linux Kernel. link
04/03/25 Project Part 2 progress demo and presentation 2 (7 minutes per team) - Teams 10-1
04/08/25 Paper presentation 8
GPU Side-Channel (Deeksha)
Fuzzing Javascript (Kanika)
Paper Review 5: Due 04/07/2025
Project - Part 2 Progress 2 Due on Apr 20
TunneLs for Bootlegging: Fully Reverse-Engineering GPU TLBs for Challenging Isolation Guarantees of NVIDIA MIG. link
FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities. link
04/10/25 Paper presentation 9
Certificate Validation (Chaithanya)
Supply-Chain Sec. (Himashveta)
TBD (Raghav)
V’CER: Efficient Certificate Validation in Constrained Networks. link
Exorcist: Automated Differential Analysis to Detect Compromises in Closed-Source Software Supply Chains. link
04/15/25 Paper presentation 10
LLM-Fuzzing (Rao)
GPT-based Evasion (Himashveta)
Paper Review 6: Due 04/14/2025
Large Language Model guided Protocol Fuzzing. link
EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection. link
04/17/25 Paper presentation 11
Web Privacy (Kapil)
Microarch. Bugs (Khusagra)
Javascript Fuzz (Toufik)
Leaky Images: targetted Privacy Attacks in the Web. link
LPensieve: Microarchitectural Modeling for Security Evaluation. link
LOptFuzz: Optimization Path Guided Fuzzing for JavaScript JIT Compilers. link
04/22/25 Paper presentation 12
Smart-Contract Analysis (Akash)
Phishing (Zhuoyi)
IoT Threats (Jiahe)
Panda: Security Analysis of Algorand Smart Contracts. link
KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-Based Phishing Detection. link
ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks. link
04/24/25 Formal Verification
(Part 2)
5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol.
04/29/25 Final project presentation (15 minutes per team) - Teams 1-5
05/01/25 Final project presentation (15 minutes per team) - Teams 1-5
.