Monday, July 31, 2006
|
8:45 a.m.10:30 a.m. |
Monday |
Session I
Introduction and Ground Rules
Matt Blaze, University of Pennsylvania
Incentive-Centered Design for Information Security
Rick Wash and Jeffrey K. MacKie-Mason, University of Michigan
Password Rescue: A New Approach to Phishing Prevention
Dinei Florêncio and Cormac Herley,
Microsoft Research
Security Through Publicity
Eric Osterweil, University of California, Los Angeles; Dan Massey and Batsukh Tsendjav, Colorado State University; Beichuan Zhang, University of Arizona; Lixia Zhang, University of California, Los Angeles
|
|
10:30 a.m.11:00 a.m. Break |
|
11:00 a.m.12:30 p.m. |
Monday |
Session II
Shame on Trust in Distributed Systems
Trent Jaeger, Patrick McDaniel, and Luke St. Clair, Pennsylvania State University; Ramón Cáceres and Reiner Sailer, IBM T. J. Watson Research Center
Sensor Network Security: More Interesting Than You Think
Madhukar Anand, Eric Cronin, Micah Sherr, Matt Blaze, Zachary Ives, and Insup Lee, University of Pennsylvania
Panel/Group Discussion
TBA
|
|
12:30 p.m.2:00 p.m. Lunch |
|
2:00 p.m.3:30 p.m. |
Monday |
Session III
Johnny Can Obfuscate: Beyond Mother's Maiden Name
William Cheswick, Lumeta Corp.
Secure Software Updates: Disappointments and New Challenges
Anthony Bellissimo, John Burgess, and Kevin Fu, University of Massachusetts Amherst
Privacy as an Operating System Service
Sotiris Ioannidis, Stevens Institute of Technology; Stelios Sidiroglou and Angelos D. Keromytis, Columbia University
|
|
3:30 p.m.4:00 p.m. Break |
|
4:00 p.m.6:00 p.m. |
Monday |
Session IV
Exposure Maps: Removing Reliance on Attribution During Scan Detection
David Whyte, P.C. van Oorschot, and Evangelos Kranakis, Carleton University
Toward Attack-Agnostic Defenses
David Brumley and Dawn Song, Carnegie Mellon University
Rethinking Hardware Support for Network Analysis and Intrusion Prevention
V. Paxson, International Computer Science Institute; K. Asanović, Massachusetts Institute of Technology; S. Dharmapurikar, Nuova Systems; J. Lockwood, Washington University;, R. Pang, Princeton University; R. Sommer and N. Weaver, International Computer Science Institute
|
|
|