RUMP SESSION
Accepted Presentations
The following were presented during a happy hour on Thursday, August 12, 2010, 6:00 p.m.7:30 p.m., in Thurgood Marshall South West.
A Methodology for Analyzing Permission-Based Security Models
David Barrera, Carleton University
Revisiting the Computational Practicality of Private Information Retrieval
Femi Olumofin, University of Waterloo
Somnolescent Cryptanalysis
Aniket Kate, University of Waterloo
Security on Memory Deduplication (of IaaS Cloud Computing)
Kuniyasu Suzaki, National Institute of Advanced Industrial Science and
Technology (AIST)
RFID-Based Electronic Voting: What Could Possibly Go Wrong?
Avishai Wool, Tel Aviv University
Dispatch Loops as Execution Signatures
Nathan Taylor, University of British Columbia
What Is the Name of My Cat?
Bart Preneel, Katholieke Universiteit Leuven
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Srdjan Capkun, ETH Zurich
Columbia University Privacy Study: Got Privacy?
Maritza Johnson, Columbia University
The Domestication of Software: The Case for Open Source
Jose Fernandez, Polytechnique Montréal
NoTamper: Automatic Blackbox Detection of Parameter Tampering Opportunities
in Web Applications
Prithvi Bisht, University of Illinois at Chicago
Simple IPSec
Steve Bellovin, Columbia University
The Human-Centered Authentication Attack
David Harmon, Columbia University
Job Opportunities at RIM
Ian Goldberg, University of Waterloo
Secure Systems Cannot be Engineered
Anil Somayaji, Carleton University
Pac-Man on the Sequoia AVC Edge Voting Machine
J. Alex Halderman, University of Michigan
The Wørd
Dan Wallach, Rice University
View the video of this presentation recorded during EVT/WOTE '10.
|