|
WORKSHOP PROGRAM
All sessions will take place in Elizabethan D unless otherwise noted.
All breakfast and refreshment breaks will take place in the California East/West Foyer,
Elizabethan Foyer, and Elizabethan C.
|
Monday, August 8, 2011
|
8:00 a.m.–8:30 a.m. Continental Breakfast
|
|
8:30 a.m.–8:40 a.m. |
Opening Remarks
Sean Peisert and Stephen Schwab, CSET '11 Program Co-Chairs
|
8:40 a.m.–10:10 a.m. |
Security Experimentation and the Real World
Should Security Researchers Experiment More and Draw More Inferences?
Kevin S. Killourhy and Roy A. Maxion, Carnegie Mellon University
Read the Abstract | Full paper
View the Slides
No Plan Survives Contact: Experience with Cybercrime Measurement
Chris Kanich, Neha Chachra, and Damon McCoy, University of California, San Diego; Chris Grier, University of California, Berkeley; David Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, University of California, San Diego
Read the Abstract | Full paper
View the Slides
|
10:10 a.m.–10:30 a.m. Break with coffee and tea |
|
10:30 a.m.–noon |
Experimental Methodology
Salting Public Traces with Attack Traffic to Test Flow Classifiers
Z. Berkay Celik, Jayaram Raghuram, George Kesidis, and David J. Miller, Pennsylvania State University
Read the Abstract | Full paper
Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols
Nathan S. Evans and Christian Grothoff, Technische Universität München
Read the Abstract | Full paper
View the Slides
Automating Network Monitoring on Experimental Testbeds
Michael Golightly, Princeton University; Jack Brassil, HP Laboratories
Read the Abstract | Full paper
View the Slides
|
Noon–1:00 p.m. Workshop Luncheon served in the Colonial Room |
|
1:00 p.m.–2:30 p.m. |
Bots and Overlays
Challenges in Experimenting with Botnet Detection Systems
Adam J. Aviv and Andreas Haeberlen, University of Pennsylvania
Read the Abstract | Full paper
View the Slides
ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation
Kevin Bauer, University of Waterloo; Micah Sherr, Georgetown University; Damon McCoy, University of California, San Diego; Dirk Grunwald, University of Colorado
Read the Abstract | Full paper
View the Slides
|
2:30 p.m.–2:45 p.m. Break with beverages |
|
2:45 p.m.–4:00 p.m. |
Methodology and Getting Real Data
On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned
Malek Ben Salem and Salvatore J. Stolfo, Columbia University
Read the Abstract | Full paper
View the Slides
Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware
Tudor Dumitras, Symantec Research Labs; Iulian Neamtiu, University of California, Riverside
Read the Abstract | Full paper
View the Slides
|
4:00 p.m.–4:10 p.m. Short Break |
|
4:10 p.m.–5:30 p.m. |
Education
Active Learning with the CyberCIEGE Video Game
Michael Thompson and Dr. Cynthia Irvine, Naval Postgraduate School
Read the Abstract | Full paper
View the Slides
Investigating Energy and Security Trade-offs in the Classroom with the Atom LEAP Testbed
Peter A.H. Peterson, Digvijay Singh, William J. Kaiser, and Peter L. Reiher, University of California, Los Angeles
Read the Abstract | Full paper
View the Slides
Experiences in Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise
Joseph Werther, Michael Zhivich, and Tim Leek, MIT Lincoln Laboratory; Nickolai Zeldovich, MIT CSAIL
Read the Abstract | Full paper
View the Slides
|
|