|
WORKSHOP SESSIONS
All sessions will take place in Salon 4/5 (Level 2) unless otherwise noted.
Session papers are available to workshop registrants immediately and to everyone beginning August 11, 2009.
|
Tuesday, August 11, 2009
|
8:30 a.m.–9:00 a.m. Continental Breakfast, Ballroom Foyer (Level 4)
|
|
9:00 a.m.–10:30 a.m.
|
Social Factors and Minimizing Trust
Using Social Factors in Digital Rights Management
Bader Ali and Muthucumaru Maheswaran, McGill University
Paper in
PDF
FaceTrust: Assessing the Credibility of Online Personas via Social Networks
Michael Sirivianos, Duke University; Kyungbaek Kim, University of California, Irvine; Xiaowei Yang, Duke University
Paper in
PDF
How to Print a Secret
Aleks Essex, University of Ottawa; Jeremy Clark and Urs Hengartner, University of Waterloo; Carlisle Adams, University of Ottawa
Paper in
PDF
|
10:30 a.m.–11:00 a.m. Break
|
|
11:00 a.m.–12:30 p.m. |
Networks and Software
MitiBox: Camouflage and Deception for Network Scan Mitigation
Erwan Le Malécot, Kyushu University and Institute of Systems, Information Technologies and Nanotechnologies
Paper in
PDF
SPAN: A Unified Framework and Toolkit for Querying Heterogeneous Access Policies
Swati Gupta, Indian Institute of Technology, Delhi; Kristen LeFevre and Atul Prakash, University of Michigan, Ann Arbor
Paper in
PDF
Pre-Patched Software
Jianing Guo, Jun Yuan, and Rob Johnson, Stony Brook University
Paper in
PDF | Slides
|
12:30 p.m.–2:00 p.m. Workshop Luncheon, Ballroom East (Level 4)
|
|
2:00 p.m.–3:30 p.m. |
Mobile and the User
Authentication Technologies for the Blind or Visually Impaired
Nitesh Saxena, Polytechnic Institute of New York University; James H. Watt, University of Connecticut
Paper in
PDF
Towards Trustworthy Participatory Sensing
Akshay Dua, Nirupama Bulusu, and Wu-chang Feng, Portland State University; Wen Hu, CSIRO ICT Centre, Australia
Paper in
PDF
Implicit Authentication for Mobile Devices
Markus Jakobsson, Elaine Shi, Philippe Golle, and Richard Chow, Palo Alto Research Center
Paper in
PDF | Slides
|
3:30 p.m.–4:00 p.m. Break
|
|
4:00 p.m.–5:30 p.m. |
Secure Systems and Applications
Garm: Cross Application Data Provenance and Policy Enforcement
Brian Demsky, University of California, Irvine
Paper in
PDF
Convergence of Desktop and Web Applications on a Multi-Service OS
Helen J. Wang, Microsoft Research, Redmond; Alexander Moshchuk, University of Washington, Seattle; Alan Bush, Microsoft Corporation
Paper in
PDF
System Configuration as a Privilege
Glenn Wurster and Paul C. van Oorschot, Carleton University
Paper in
PDF
|
|