|
WORKSHOP PROGRAM
All sessions will take place in Elizabethan B unless otherwise noted.
All breakfast and refreshment breaks will take place in the California East/West Foyer,
Elizabethan Foyer, and Elizabethan C.
|
Monday, August 8, 2011
|
8:30 a.m.–9:00 a.m. Continental Breakfast
|
|
9:00 a.m.–9:05 a.m. |
Opening Remarks
Nick Feamster and Wenke Lee, FOCI '11 Program Co-Chairs
|
9:05 a.m.–10:05 a.m. |
Keynote Address
Internet in a Suitcase
Josh King, Open Technology Initiative of New America Foundation
|
10:05 a.m.–10:30 a.m. Break with coffee and tea
|
|
10:30 a.m.–12:30 p.m. |
Measuring Censorship
Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance
Jeffrey Knockel, Jedidiah R. Crandall, and Jared Saia, University of New Mexico
Read the Abstract | Full paper
View the Slides
Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics
Joss Wright, Oxford Internet Institute; Tulio de Souza, Oxford University Computing Laboratory; Ian Brown, Oxford Internet Institute
Read the Abstract | Full paper
View the Slides
CensMon: A Web Censorship Monitor
Andreas Sfakianakis, Elias Athanasopoulos, and Sotiris Ioannidis, Foundation for Research and Technology, Hellas
Read the Abstract | Full paper
Work-in-Progress: Automated Named Entity Extraction for Tracking Censorship of Current Events
Antonio M. Espinoza and Jedidiah R. Crandall, University of New Mexico
Read the Abstract | Full paper
View the Slides
|
12:30 p.m.–1:30 p.m. Workshop Luncheon served in the Colonial Room |
|
1:30 p.m.–3:00 p.m. |
Policy and Power
Redirecting DNS for Ads and Profit
Nicholas Weaver and Christian Kreibich, ICSI; Vern Paxson, ICSI and the University of California, Berkeley
Read the Abstract | Full paper
User Freedom to Attach Devices
Scott Jordan and Gwen Shaffer, University of California, Irvine
Read the Abstract | Full paper
View the Slides
Infrastructures of Censorship and Lessons from Copyright Resistance
Wendy Seltzer, Princeton Center for Information Technology Policy
Read the Abstract | Full paper
|
3:00 p.m.–3:30 p.m. Break with beverages |
|
3:30 p.m.–5:00 p.m. |
Circumvention
Decoy Routing: Toward Unblockable Internet Communication
Josh Karlin, Daniel Ellard, Alden W. Jackson, Christine E. Jones, Greg Lauer, David P. Mankins, and W. Timothy Strayer, Raytheon BBN Technologies
Read the Abstract | Full paper
Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing
Nicholas Jones, Matvey Arye, Jacopo Cesareo, and Michael J. Freedman, Princeton University
Read the Abstract | Full paper
Bypassing Internet Censorship for News Broadcasters
Karl Kathuria, British Broadcasting Corporation and University of Toronto
Read the Abstract | Full paper
View the Slides
|
5:00 p.m.–5:30 p.m. |
New and Outrageous Ideas
Session Chair: Nick Feamster
View the Slides
|
|