NCS590 (Topic) – Advanced Research Topics in Cloud Security



The class syllabus can be found here


I expect to cover at least two papers per week. Students are expected to have read the assigned papers, watch the conference talk videos if available, and engage in online discussion each week. Students will also write up a two to three page reaction to each paper which will include the following:

  • A summary of the paper’s important details (2-3 paragraphs at most!)
  • Resources that were required to perform the research
  • Repeatability of the research
    • Can the work be repeated by a group of SUNY Poly students? Justify your answer!
  • Extendability of the research
    • What is your best idea for extending the research?
    • What resources would be required?
  • Your reaction, critique, and critisim of the work
  • A list of the top two references from the work that you think are worth exploring further and why

Class Schedule – (tentative)

Week 1 Paper: How (and How Not) to Write a Good Systems Paper
Paper: Efficient Reading of Papers in Science and Technology
Week 2 Paper: Self-service cloud computing

Paper: CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
Week 3 Paper: Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems

Paper: Hourglass schemes: how to prove that cloud files are encrypted
Week 4 Paper: Benchmarking the Performance of OpenStack and CloudStack

Video: OpenStack: Leading the Open Source Cloud Revolution
Week 5 Paper: Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform

Paper: On fault resilience of OpenStack
Week 6 Paper: LiveCloud: A lucid orchestrator for cloud datacenters

Paper: A Compartive Study of Cloud Computing Middleware
Week 7 Paper: Towards Secure and Dependable Software-Defined Networks

Paper: Towards SDN enabled network control delegation in clouds
Week 8 Spring Break – NO Classes
Week 9 Paper: Dark Clouds on the Horizon: Using Cloud Storage as Attack
Vector and Online Slack Space

Paper: Looking inside the (Drop) box
Week 10 Paper: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds

Paper: Resource-freeing attacks: improve your cloud performance (at your neighbor’s expense)
Week 11 Paper: Cross-VM side channels and their use to extract private keys

Paper: Secure virtualization for cloud computing
Week 12 Paper: ZMap: Fast Internet-wide Scanning and Its Security Applications

Paper: Zippier ZMap: internet-wide scanning at 10 Gbps
Week 13 Paper: Take This Personally: Pollution Attacks on Personalized Services

Paper: Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
Week 14 Paper: Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services

Paper: Scalability, fidelity, and containment in the potemkin virtual honeyfarm
Week 15 Take-home Final Exam
Week 16 Final Exam Due May 6th!