|
WORKSHOP SESSIONS
Session papers are available to workshop registrants immediately and to everyone beginning April 14, 2008.
|
Monday, April 14, 2008
|
8:00 a.m.–9:00 a.m. Continental Breakfast
|
|
9:00 a.m.–9:10 a.m. |
Greetings and Welcome
Program Chairs:
Rachna Dhamija, Harvard University; Elizabeth Churchill, Yahoo! Research
|
9:10 a.m.–10:00 a.m. |
Whirlwind Research Talks
Session Chair: Elizabeth Churchill, Yahoo! Research
We encourage you to submit an abstract or proposal for a 5-minute presentation
on your preliminary work to upsec08chairs@usenix.org.
Scheduled Speakers and Talks
- Dirk Balfanz, Google: (Under)mining Privacy in Social Networks
- Alessandro Aquisti, Carnegie Mellon University: Soft Paternalism and Behavioral Privacy
- Mary Ellen Zurko, IBM: Can We Create Standards from Usable Security Research?
- Diana Smetters, PARC: When Errors Attack
- Volker Roth, FXPAL: Questions I Ask Myself About Usable Security
- Rachel Greenstadt, Harvard University: Cognitive Security for Personal Devices
- Steve Bellovin, Columbia University: TBA
- Paul Van Oorschot, Carleton University: Where Am I, What's in My Box, and Where Did It Come From?
- Stuart Schechter, Microsoft Research: TBA
|
10:00 a.m.–10:30 a.m. |
Full Paper
Session Chair: Elizabeth Churchill, Yahoo! Research
A Framework for Reasoning About the Human in the Loop
Lorrie Faith Cranor, Carnegie Mellon University
Paper in HTML | PDF
|
10:30 a.m.–11:00 a.m. Break
|
|
11:00 a.m.–11:30 a.m. |
Full Paper
Session Chair: Paul Van Oorschot, Carleton University
Understanding Privacy Settings in Facebook with an Audience View
Heather Richter Lipford, Andrew Besmer, and Jason Watson, University of North Carolina at Charlotte
Paper in HTML | PDF
|
11:30 a.m.–12:15 p.m. |
Short Papers
Session Chair: Paul Van Oorschot, Carleton University
Where's The Beep? Security, Privacy, and User Misunderstandings of RFID
Jennifer King and Andrew McDiarmid, University of California, Berkeley
Paper in HTML | PDF
Biometric Daemons: Authentication via Electronic Pets
Pam Briggs, PaCT Lab, Northumbria University; Patrick Olivier, Newcastle University
Paper in HTML | PDF
Freezing More Than Bits: Chilling Effects of the OLPC XO Security Model
Meredith L. Patterson, University of Iowa; Len Sassaman and David Chaum, Katholieke Universiteit Leuven
Paper in HTML | PDF
|
12:15 p.m.–1:45 p.m. Workshop Luncheon and Discussion Tables
|
|
1:45 p.m.–2:15 p.m. |
Full Paper
Session Chair: Steven M. Bellovin, Columbia University
Centered Discretization with Application to Graphical Passwords
Sonia Chiasson, Carleton University, Ottawa, Canada; Jayakumar Srinivasan, Toronto, Canada; Robert Biddle and P.C. van Oorschot, Carleton University, Ottawa, Canada
Paper in HTML | PDF
|
2:15 p.m.–3:00 p.m. |
Short Papers
Session Chair: Steven M. Bellovin, Columbia University
Using Salience Differentials to Making Visual Cues Noticeable
Andreas Heiner and N. Asokan, Nokia Research Center, Helsinki, Finland
Paper in HTML | PDF
Predicted and Observed User Behavior in the Weakest-link Security Game
Jens Grossklags, University of California, Berkeley; Nicolas Christin, Carnegie Mellon University, Information Networking Institute, and CyLab Japan; John Chuang, University of California, Berkeley
Paper in HTML | PDF
Ad-hoc Guesting: When Exceptions Are the Rule
Brinda Dalal, Les Nelson, Diana Smetters, and Nathaniel Good, Palo Alto Research Center, Inc.; Ame Elliot, IDEO Palo Alto
Paper in HTML | PDF
|
3:00 p.m.–3:30 p.m. Break
|
|
3:30 p.m.–4:00 p.m. |
Full Paper
Session Chair: Stuart Schechter, Microsoft Research
iPhish: Phishing Vulnerabilities on Consumer Electronics
Yuan Niu, Francis Hsu, and Hao Chen, University of California, Davis
Paper in HTML | PDF
|
4:00 p.m.–4:45 p.m. |
Short Papers
Session Chair: Stuart Schechter, Microsoft Research
RUST: A Retargetable Usability Testbed for Web Site Authentication Technologies
Maritza L. Johnson, Columbia University; Chaitanya Atreya, Adobe Systems Inc.; Adam J. Aviv, University of Pennsylvania; Steven M. Bellovin and Gail E. Kaiser, Columbia University
Paper in HTML | PDF
A User Study Design for Comparing the Security of Registration Protocols
Chris Karlof, J.D. Tygar, and David Wagner, University of California, Berkeley
HTML | PDF
IRBs and Security Research: Myths, Facts and Mission Creep
Simson L. Garfinkel, Naval Postgraduate School and Harvard University
Paper in HTML | PDF
|
4:45 p.m.–5:30 p.m. Discussion and Wrap-up
|
|
6:00 p.m.–7:00 p.m. |
NSDI '08 and Workshops Welcome Get-Together
|
|
|