|
WORKSHOP PROGRAM
All sessions will take place in Thurgood Marshall East unless otherwise noted.
Session papers are available to workshop registrants immediately and to everyone beginning on the day of the workshop.
|
Tuesday, August 10, 2010
|
9:00 a.m.–9:10 a.m. |
Introduction and Ground Rules
Wietse Venema, IBM Research
|
9:10 a.m.–10:40 a.m. |
Cloud and Web
Session Chair: Lucas Ballard, Google Inc.
Visual Security Policy for the Web
Terri Oda and Anil Somayaji, Carleton Computer Security Laboratory
Read the Abstract | Full paper | Slides
Cybercasing the Joint: On the Privacy Implications of Geo-Tagging
Gerald Friedland, International Computer Science Institute; Robin Sommer, International Computer Science Institute and Lawrence Berkeley National Laboratory
Read the Abstract | Full paper | Slides
On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing
Marten van Dijk and Ari Juels, RSA Laboratories
Read the Abstract | Full paper
|
10:40 a.m.–11:00 a.m. Break
|
|
11:00 a.m.–12:30 p.m. |
Systems and Defenses
Session Chair: Angelos Stavrou, George Mason University
Popularity Is Everything: A New Approach to Protecting Passwords from Statistical-Guessing Attacks
Stuart Schechter and Cormac Herley, Microsoft Research; Michael Mitzenmacher, Harvard University
Read the Abstract | Full paper | Slides
Moving from Logical Sharing of Guest OS to Physical Sharing of Deduplication on Virtual Machine
Kuniyasu Suzaki, Toshiki Yagi, Kengo Iijima, Nguyen Anh Quynh, and Cyrille Artho, National Institute of Advanced Industrial Science and Technology; Yoshihito Watanebe, Alpha Systems Inc.
Read the Abstract | Full paper | Slides
Embedded Firmware Diversity for Smart Electric Meters
Stephen McLaughlin, Dmitry Podkuiko, Adam Delozier, Sergei Miadzvezhanka, and Patrick McDaniel, Penn State University
Read the Abstract | Full paper | Slides
|
12:30 p.m.–2:00 p.m. Workshop Luncheon, Thurgood Marshall South West |
|
2:00 p.m.–3:30 p.m. |
Networks and Communications
Session Chair: Patrick McDaniel, Pennsylvania State University
Evading Cellular Data Monitoring with Human Movement Networks
Adam J. Aviv, Micah Sherr, Matt Blaze, and Jonathan M. Smith, University of Pennsylvania
Read the Abstract | Full paper | Slides
Challenges in Access Right Assignment for Secure Home Networks
Tiffany Hyun-Jin Kim, Lujo Bauer, James Newsome, and Adrian Perrig, Carnegie Mellon University; Jesse Walker, Intel Research
Read the Abstract | Full paper | Slides
Scalable Anonymous Communication with Provable Security
Prateek Mittal and Nikita Borisov, University of Illinois at Urbana-Champaign; Carmela Troncoso and Alfredo Rial, ESAT/COSIC, IBBT-K.U.Leuven
Read the Abstract | Full paper
|
3:30 p.m.–4:00 p.m. Break
|
|
4:00 p.m.–5:00 p.m. |
Catching Malware
Session Chair: Paul van Oorschot, Carleton University
Retroactive Detection of Malware with Applications to Mobile Platforms
Markus Jakobsson and Karl-Anders Johansson, FatSkunk Inc
Read the Abstract | Full paper | Slides
Scalable Web Object Inspection and Malfease Collection
Charalampos Andrianakis, Paul Seymer, and Angelos Stavrou, Center for Secure Information Systems, George Mason University
Read the Abstract | Full paper | Slides
|
5:00 p.m.–5:15 p.m. |
Closing Session
|
|