Workshop Program
Please Note: This workshop is by invitation and/or acceptance of paper submission.
Session papers are available to workshop registrants immediately, to USENIX members starting August 7, 2007, and to everyone after August 6, 2008.
All sessions will take place in the Berkeley room (3rd Floor)
of the Sheraton Boston Hotel unless otherwise noted.
Tuesday, August 7, 2007
|
7:30 a.m.5:00 p.m. On-site Registration, Constitution Foyer |
|
9:00 a.m.9:30 a.m. |
|
Welcome
|
9:30 a.m.10:30 a.m. |
|
Securing Host Data
Transaction Generators: Root Kits for Web
Collin Jackson, Dan Boneh, and John Mitchell, Stanford University
Read the paper in PDF | HTML
Delegating Responsibility in Digital Systems: Horton's "Who Done It?"
Mark S. Miller, Google Research; James E. Donnelley, NERSC, LBNL; Alan H. Karp, Hewlett-Packard Labs
Read the paper in PDF | HTML
|
10:30 a.m.11:00 a.m. Break |
|
11:00 a.m.12:30 p.m. |
|
Security in-the-Large
Quantifying the Strength of Security Systems
David Lie, University of Toronto; M. Satyanarayanan, Carnegie Mellon University
Read the paper in PDF | HTML
Towards Application-Aware Anonymous Routing
Micah Sherr, Boon Thau Loo, and Matt Blaze, University of Pennsylvania
Read the paper in PDF | HTML
Rethinking Antivirus: Executable Analysis in the Network Cloud
Jon Oberheide, Evan Cooke, and Farnam Jahanian, University of Michigan
Read the paper in PDF | HTML
|
12:30 p.m.2:00 p.m. Workshop Luncheon, Dalton (3rd Floor)
|
|
2:00 p.m.3:30 p.m. |
|
How Do We Build Trust?
Turtles All the Way Down: Research Challenges in User-Based Attestation
Jonathan M. McCune, Adrian Perrig, and Arvind Seshadri, CMU/CyLaB; Leendert van Doorn, AMD
Read the paper in PDF | HTML
Securing Network Input via a Trusted Input Proxy
Kevin Borders and Atul Prakash, University of Michigan
Read the paper in PDF
Trust from Trusted Computing Hardware: Dead or Alive?
TBD
|
3:30 p.m.4:00 p.m. Break |
|
4:00 p.m.5:30 p.m. |
|
Better Identities
Self-Signed Executables: Restricting Replacement of Program Binaries by Malware
Glenn Wurster and P.C. van Oorschot, Carleton University
Read the paper in PDF | HTML
The Strengths of Weaker Identities: Opportunistic Personas
Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, and Nicholas Weaver, International Computer Science Institute
Read the paper in PDF | HTML
Do Strong Web Passwords Accomplish Anything?
Dinei Florêncio and Cormac Herley, Microsoft Research; Baris Coskun, Polytechnic University, Brooklyn
Read the paper in PDF
|
|
|