|
WORKSHOP SESSIONS
Session papers are available to workshop registrants immediately and to everyone beginning April 15, 2008.
All sessions will take place in the Gold Rush A room of the Holiday Inn Golden Gateway unless otherwise noted.
|
Monday, April 14, 2008
|
6:00 p.m.–7:00 p.m. |
NSDI '08 and Workshops Welcome Get-Together
|
Tuesday, April 15, 2008
|
8:30 a.m.–8:40 a.m. |
Opening Remarks
Program Chair:
Fabian Monrose, Johns Hopkins University
|
8:40 a.m.–10:40 a.m. |
Attacker Behavior
Session Chair: Niels Provos, Google Inc.
On the Spam Campaign Trail
Christian Kreibich, International Computer Science Institute; Chris Kanich, Kirill Levchenko, Brandon Enright, and Geoffrey M. Voelker, University of California, San Diego; Vern Paxson, International Computer Science Institute; Stefan Savage, University of California, San Diego
Paper in HTML | PDF
Listen in MP3 format
Characterizing Botnets from Email Spam Records
Li Zhuang, University of California, Berkeley;
John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov, and Geoff Hulten, Microsoft Research; J.D. Tygar, University of California, Berkeley
Paper in HTML | PDF
Listen in MP3 format
Peeking into Spammer Behavior from a Unique Vantage
Point
Abhinav Pathak and Y. Charlie Hu, Purdue University; Z. Morley Mao, University of Michigan
Paper in HTML | PDF
Listen in MP3 format
Behind Phishing: An Examination of Phisher Modi Operandi
D. Kevin McGrath and Minaxi Gupta, Indiana University, Bloomington
Paper in HTML | PDF
Listen in MP3 format
|
10:40 a.m.–11:00 a.m. Break
|
|
11:00 a.m.–12:30 p.m. |
New Threats and Related Challenges
Session Chair: Moheeb Rajab, Johns Hopkins University
Awarded Best Paper!
Designing and Implementing Malicious Hardware
Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, and Yuanyuan Zhou, University of Illinois at Urbana-Champaign
Paper in HTML | PDF
Listen in MP3 format
Catching Instant Messaging Worms with Change-Point Detection
Techniques
Guanhua Yan, Los Alamos National Laboratory; Zhen Xiao, Peking University; Stephan Eidenbenz, Los Alamos National Laboratory
Paper in HTML | PDF
Listen in MP3 format
Exploiting Machine Learning to Subvert Your Spam
Filter
Blaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I.P. Rubinstein, Udam Saini, Charles Sutton, J.D. Tygar, and Kai Xia, University of California, Berkeley
Paper in HTML | PDF
Listen in MP3 format
|
12:30 p.m.–2:00 p.m. Workshop Luncheon, Gold Rush B
|
|
2:00 p.m.–4:00 p.m. |
Measurements, Uncertainties, and Legal Issues
Session Chair: David Dagon, Georgia Institute of Technology
Conducting Cybersecurity Research Legally and
Ethically
Aaron J. Burstein, University of California, Berkeley, School of Law
Paper in HTML | PDF
Listen in MP3 format
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case
Study on Storm Worm
Thorsten Holz, University of Mannheim; Moritz Steiner, University of Mannheim and Institut Eurécom;
Frederic Dahl, University of Mannheim; Ernst Biersack, Institut Eurécom;
Felix Freiling, University of Mannheim
Paper in HTML | PDF
Listen in MP3 format
The Heisenbot Uncertainty Problem: Challenges in Separating Bots
from Chaff
Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, and Stefan Savage, University of California, San Diego
Paper in HTML | PDF
Listen in MP3 format
Ghost Turns Zombie: Exploring the Life Cycle of Web-based
Malware
Michalis Polychronakis, FORTH-ICS; Panayiotis Mavrommatis and Niels Provos, Google Inc.
Paper in HTML | PDF
Listen in MP3 format
|
4:00 p.m.–4:30 p.m. Break
|
|
4:30 p.m.–5:00 p.m. |
Work-in-Progress Session
Session Chair: Jaeyeon Jung, Intel Research
Listen in MP3 format
|
5:00 p.m. |
Closing Remarks
LEET Steering Committee: Vern Paxson, International Computer Science Institute;
Niels Provos, Google Inc.;
Stefan Savage, University of California, San Diego
|
|