Registration | Organizers |
Invitation |
At a
Glance | Training | Tech Sessions
WiPs |
BoFs | Sponsors | Activities | Hotel/Travel | Help Promote!
Students | Questions? | Call for Papers | Past Proceedings
BIRDS-OF-A-FEATHER SESSIONS (BOFS)
Lead or attend a BoF! Meet with your peers! Present new work! Don't miss these special activities designed to maximize the value of your time at the conference. The always popular evening Birds-of-a-Feather sessions are very informal gatherings of persons interested in a particular topic.
To schedule a BoF, simply write the BoF title as well as your name and affiliation on one of the BoF Boards located in the registration area.
BoF Schedule (Current as of August 4, 2005)
Wednesday, August 3 |
ROOM |
# of Seats |
7:00 p.m. 8:00 p.m. |
8:00 p.m. 9:00 p.m. |
9:00 p.m. 10:00 p.m. |
10:00 p.m. 11:00 p.m. |
Chesapeake III |
50 |
Worms and Other Malcode Nicholar Weaver, ICSI
|
Poker Game (Crypto Protocols Analysis in the Real World)
|
|
|
Camden I |
50 |
Network IDS (Bro, Snort, etc.) Scott Campbell, LBL/NERSC
|
|
|
|
Camden II |
60 |
Raritan BoF: Security for KVM and Console ServersWhat You Need! Naim Malik
|
|
|
|
Thursday, August 4 |
ROOM |
# of Seats |
6:00 p.m. 7:00 p.m. |
7:00 p.m. 8:00 p.m. |
8:00 p.m. 9:00 p.m. |
9:00 p.m. 10:00 p.m. |
10:00 p.m. 11:00 p.m. |
Chesapeake III |
50 |
ROOM NOT AVAILABLE
|
Sun Security BoF Glenn Brunette, Sun Microsystems, Inc.
|
Old Bay SAGE Presents: SIG-Beer Baltimore!
|
Camden I |
50 |
ROOM NOT AVAILABLE
|
Security Issues in a University Environment Ruth-Anne Bevier, Caltech; George Drake, UMass, Amherst
|
|
|
|
Camden II |
60 |
ROOM NOT AVAILABLE
|
Arbor Networks
BoF/Reception: Practical Enterprise Security Dug Song, Arbor
Networks
|
Malicious Code Analysis: Tools, Techniques, and Strategies Cory Cohen, CERT/CC
|
|
BoF Descriptions
Teaching Computer Security and Privacy as a Public Service and for Money
Speaker: Ming Chow, Tufts University
Tuesday, August 2, 6:00 p.m.7:00 p.m., Camden I
Computer security and
privacy can be boring, but they are topics that the general public struggle with, especially teens and parents. Unfortunately, the problems
are only getting worse. However, there is a great reward and investment (professional, personal, and monetary) for the technical
community to educate the masses about the issues at hand. Topics of dicussion will include the USENIX influence, goals, training plan, where
to teach, and personal observations.
Arbor Networks
BoF/Reception: Practical Enterprise Security
Speaker: Dug Song, Arbor Networks
Tuesday, August 2, 7:00 p.m.9:00 p.m., Camden II
The enterprise perimeter security model is crumbling. Simple trust models,
and the static defenses that depend on them, are breaking down in the face of
constantly changing business needs. Through e-mail worms, exposed VPN
clients, and open wireless access points, attackers are exploiting the core
vulnerability of the modern enterprise
network: weak internal security. Come join us for a discussion of today's
internal security challenges, and the practical solutions we have for them in
Arbor's Peakflow X.
|