Check out the new USENIX Web site.
Security '09 Banner


Ballroom East (Level 4)

Accepted Posters

The following posters will be presented during a happy hour on Thursday, August 13, 2009, 6:00 p.m.–7:30 p.m.

Expanded AV Product Testing to Include Blocking by Source Reputation
Anthony Arrott and Geoff Grindrod, Trend Micro, Inc.

An Examination of Secure Programming Practices Through Open Source Vulnerability Patch Characteristics
Mark Plemmons, Andrew Falivene, Jonathan Peterson, Adam Wenner, Will Quinley, Jing Xie, and Bill Chu, University of North Carolina at Charlotte

The Impact of Structured Application Development Framework on Web Application Security
Heather Lipford, Will Stranathans, Daniel Oakley, Jing Xie, and Bei-Tseng Chu, University of North Carolina at Charlotte

Securing the Application Acquisition Chain: Security Concerns & Human Factors of Application and System Acquisition in the Enterprise
Eric Goldman, Rochester Institute of Technology

Toward Enabling Secure Web 2.0 Content: Sharing Beyond Walled Gardens
San-Tsai Sun and Konstantin Beznosov, University of British Columbia

A Self-Certified Signcryption Scheme for Mobile Communications
Ki-Eun Shin and Hyoung-Kee Choi, Sungkyunkwan University

Comprehensive Redaction for Neurological Imaging
Alex Barclay, Laureate Institute for Brain Research; Nakeisha Schimke and John Hale, University of Tulsa

Beatrix: A Malicious Code Analysis Framework
Christian Wressnegger

Java Data Security Framework (JDSF) and Its Applications: API Design Refinement
Serguei A. Mokhov, Concordia University

SAND: An Architecture for Signature-based Automatic Network Protocol Detection
George Louthan and John Hale, The University of Tulsa

Large-scale Multitouch Interactive Network Visualization
Cody Pollet, George Louthan, and John Hale, The University of Tulsa

Exploring the Human-Behavior Driven Detection Approach in Identifying Outbound Malware Traffic
Huijun Xiong, Chih-Cheng Chang, Prateek Malhotra, and Danfeng (Daphne) Yao, Rutgers University

Towards Investigating User Account Control Practices in Windows Vista
Sara Motiee, Kirstie Hawkey, and Konstantin Beznosov, University of British Columbia

Towards Improving Identity Management Systems Through Heuristic Evaluation
Pooya Jaferian, David Botta, Kirstie Hawkey, and Konstantin Beznosov, University of British Columbia

A Spotlight on Security and Privacy for Future Household Robots: Attacks, Lessons, and Framework
Tamara Denning, Cynthia Matuszek, Karl Koscher, and Tadayoshi Kohno, University of Washington

Developing Security and Privacy Requirements for a Local Area COllaborative Meeting Environment (LACOME)
Fahimeh Raja, Kirstie Hawkey, and Kellogg S. Booth, University of British Columbia

Performance Testing the Vulnerability Response Decision Assistance (VRDA) Framework
Art Manion, CERT® Coordination Center; Kazuya Togashi, JPCERT/CC

FloVis: Flow Visualization System
Diana Paterson, Joel Glanfield, Chris Smith, Teryl Taylor, Stephen Brooks, and John McHugh, Dalhousie University; Carrie Gates, CA Labs

?Need help? Use our Contacts page.

Last changed: 6 Aug. 2009 jp