POSTER SESSION
Ballroom East (Level 4)
Accepted Posters
The following posters will be presented during a happy hour on Thursday, August 13, 2009, 6:00 p.m.7:30 p.m.
Expanded AV Product Testing to Include Blocking by Source Reputation
Anthony Arrott and Geoff Grindrod, Trend Micro, Inc.
An Examination of Secure Programming Practices Through Open Source Vulnerability Patch Characteristics
Mark Plemmons, Andrew Falivene, Jonathan Peterson, Adam Wenner, Will Quinley, Jing Xie, and Bill Chu, University of North Carolina at Charlotte
The Impact of Structured Application Development Framework on Web Application Security
Heather Lipford, Will Stranathans, Daniel Oakley, Jing Xie, and Bei-Tseng Chu, University of North Carolina at Charlotte
Securing the Application Acquisition Chain: Security Concerns & Human Factors of Application and System Acquisition in the Enterprise
Eric Goldman, Rochester Institute of Technology
Toward Enabling Secure Web 2.0 Content: Sharing Beyond Walled Gardens
San-Tsai Sun and Konstantin Beznosov, University of British Columbia
A Self-Certified Signcryption Scheme for Mobile Communications
Ki-Eun Shin and Hyoung-Kee Choi, Sungkyunkwan University
Comprehensive Redaction for Neurological Imaging
Alex Barclay, Laureate Institute for Brain Research; Nakeisha Schimke and John Hale, University of Tulsa
Beatrix: A Malicious Code Analysis Framework
Christian Wressnegger
Java Data Security Framework (JDSF) and Its Applications: API Design Refinement
Serguei A. Mokhov, Concordia University
SAND: An Architecture for Signature-based Automatic Network Protocol Detection
George Louthan and John Hale, The University of Tulsa
Large-scale Multitouch Interactive Network Visualization
Cody Pollet, George Louthan, and John Hale, The University of Tulsa
Exploring the Human-Behavior Driven Detection Approach in Identifying Outbound Malware Traffic
Huijun Xiong, Chih-Cheng Chang, Prateek Malhotra, and Danfeng (Daphne) Yao, Rutgers University
Towards Investigating User Account Control Practices in Windows Vista
Sara Motiee, Kirstie Hawkey, and Konstantin Beznosov, University of British Columbia
Towards Improving Identity Management Systems Through Heuristic Evaluation
Pooya Jaferian, David Botta, Kirstie Hawkey, and Konstantin Beznosov, University of British Columbia
A Spotlight on Security and Privacy for Future Household Robots: Attacks, Lessons, and Framework
Tamara Denning, Cynthia Matuszek, Karl Koscher, and Tadayoshi Kohno, University of Washington
Developing Security and Privacy Requirements for a Local Area COllaborative Meeting Environment (LACOME)
Fahimeh Raja, Kirstie Hawkey, and Kellogg S. Booth, University of British Columbia
Performance Testing the Vulnerability Response Decision Assistance (VRDA) Framework
Art Manion, CERT® Coordination Center; Kazuya Togashi, JPCERT/CC
FloVis: Flow Visualization System
Diana Paterson, Joel Glanfield, Chris Smith, Teryl Taylor, Stephen Brooks, and John McHugh, Dalhousie University; Carrie Gates, CA Labs
|