Check out the new USENIX Web site.
HotSec '08 Banner


WORKSHOP SESSIONS

Please Note: This workshop is by invitation and/or acceptance of paper submission.

Session papers are available to workshop registrants immediately and to everyone beginning July 29, 2008.

All sessions will take place in the Empire Room unless otherwise noted.

Tuesday, July 29, 2008
7:30 a.m.–9:00 a.m.  Continental Breakfast, Regency Foyer
9:00 a.m.–9:10 a.m.

Opening Remarks

Program Chair: Niels Provos, Google

9:10 a.m.–10:40 a.m.

Securing Systems

Towards Application Security on Untrusted Operating Systems
Dan R.K. Ports, MIT CSAIL and VMware, Inc.; Tal Garfinkel, VMware, Inc.

Paper in HTML | PDF

Digital Objects as Passwords
Mohammad Mannan and P.C. van Oorschot, Carleton University

Paper in HTML | PDF

Security Benchmarking using Partial Verification
Thomas E. Hart, Marsha Chechik, and David Lie, University of Toronto

Paper in HTML | PDF

10:40 a.m.–11:00 a.m.    Break
11:00 a.m.–12:30 p.m.

Exploring New Directions

Securing Provenance
Uri Braun, Avraham Shinnar, and Margo Seltzer, Harvard School of Engineering and Applied Sciences

Paper in HTML | PDF

Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security
Tamara Denning, University of Washington; Kevin Fu, University of Massachusetts Amherst; Tadayoshi Kohno, University of Washington

Paper in HTML | PDF

Research Challenges for the Security of Control Systems
Alvaro A. Cárdenas, Saurabh Amin, and Shankar Sastry, University of California, Berkeley

Paper in HTML | PDF

12:30 p.m.–2:00 p.m.  Workshop Luncheon, Regency 1
2:00 p.m.–3:30 p.m.

Adversarial Security

Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications
Alexei Czeskis, David J. St. Hilaire, Karl Koscher, Steven D. Gribble, and Tadayoshi Kohno, University of Washington; Bruce Schneier, BT

Paper in HTML | PDF

Panic Passwords: Authenticating under Duress
Jeremy Clark and Urs Hengartner, University of Waterloo

Paper in HTML | PDF

Bootstrapping Trust in a "Trusted" Platform
Bryan Parno, Carnegie Mellon University

Paper in HTML | PDF

3:30 p.m.–4:00 p.m.   Break
4:00 p.m.–5:30 p.m.

Network Forensics

Towards Quantification of Network-Based Information Leaks via HTTP
Kevin Borders, Web Tap Security, Inc.; Atul Prakash, University of Michigan

Paper in HTML | PDF

Principles for Developing Comprehensive Network Visibility
Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, and Nicholas Weaver, ICSI

Paper in HTML | PDF

Challenges and Directions for Monitoring P2P File Sharing Networks—or—Why My Printer Received a DMCA Takedown Notice
Michael Piatek, Tadayoshi Kohno, and Arvind Krishnamurthy, University of Washington

Paper in HTML | PDF

5:30 p.m.–5:35 p.m.

Closing Remarks

Program Chair: Niels Provos, Google

footer
? Need help? Use our Contacts page.

Last changed: 23 July 2008 mn