|
WORKSHOP PROGRAM
All sessions will take place in California West unless otherwise noted.
All breakfast and refreshment breaks will take place in the California East/West Foyer,
Elizabethan Foyer, and Elizabethan C.
|
Monday, August 8, 2011
|
8:00 a.m.–8:30 a.m. Continental Breakfast
|
|
8:30 a.m.–8:45 a.m. |
Welcome and Best Paper Awards
David Brumley and Michal Zalewski, WOOT '11 Program Co-Chairs
|
8:45 a.m.–10:45 a.m. |
Attacks on Networks and Networking Equipment
Media Access Control Address Spoofing Attacks against Port Security
Andrew Buhr, Dale Lindskog, Pavol Zavarsky, and Ron Ruhl, Concordia University College of Alberta
Read the Abstract | Full paper
View the Video | Slides
Listen to the MP3
Fragmentation Considered Vulnerable: Blindly Intercepting and Discarding Fragments
Yossi Gilad and Amir Herzberg, Bar Ilan University
Read the Abstract | Full paper
View the Video | Slides
Listen to the MP3
Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design
Ang Cui, Jatin Kataria, and Salvatore J. Stolfo, Columbia University
Read the Abstract | Full paper
View the Video
Listen to the MP3
SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster
Theodore Reed, Joseph Geis, and Sven Dietrich, Stevens Institute of Technology
Read the Abstract | Full paper
View the Video
Listen to the MP3
|
10:45 a.m.–11:00 a.m. Break with coffee and tea
|
|
11:00 a.m.–12:30 p.m. |
Crossing into the Real World: Beyond IP-based Attacks
Getting the Face Behind the Squares: Reconstructing Pixelized Video Streams
Ludovico Cavedon, Luca Foschini, and Giovanni Vigna, University of California, Santa Barbara
Read the Abstract | Full paper
View the Video
Listen to the MP3
Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks
Keaton Mowery, Sarah Meiklejohn, and Stefan Savage, University of California, San Diego
Read the Abstract | Full paper
View the Video | Slides
Listen to the MP3
Packets in Packets: Orson Welles' In-Band Signaling Attacks for Modern Radios
Travis Goodspeed, University of Pennsylvania; Sergey Bratus, Ricky Melgares, Rebecca Shapiro, and Ryan Speers, Dartmouth College
Read the Abstract | Full paper
View the Video
Listen to the MP3
|
12:30 p.m.–2:00 p.m. Workshop Luncheon served in the Colonial Room |
|
2:00 p.m.–4:00 p.m. |
Targeting the Cloud and Commodity Computing Devices
Energy Attack on Server Systems
Zhenyu Wu, Mengjun Xie, and Haining Wang, The College of William and Mary
Read the Abstract | Full paper
View the Video | Slides
Listen to the MP3
Putting Out a HIT: Crowdsourcing Malware Installs
Chris Kanich, Stephen Checkoway, and Keaton Mowery, University of California, San Diego
Read the Abstract | Full paper
View the Video | Slides
Listen to the MP3
All Your Droid Are Belong to Us: A Survey of Current Android Attacks
Timothy Vidas, Daniel Votipka, and Nicolas Christin, Carnegie Mellon University
Read the Abstract | Full paper
View the Video | Slides
Listen to the MP3
Awarded Best Student Paper!
Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques with No Native Executable Code
James Oakley and Sergey Bratus, Dartmouth College
Read the Abstract | Full paper
View the Video | Slides
Listen to the MP3
|
4:00 p.m.–4:15 p.m. Break with beverages |
|
4:15 p.m.–5:45 p.m. |
Advances in Low-Level Exploitation
DieHarder: Securing the Heap
Gene Novark and Emery D. Berger, University of Massachusetts Amherst
Read the Abstract | Full paper (updated 7/7/11)
View the Video | Slides
Listen to the MP3
Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities Using Machine Learning
Fabian Yamaguchi and Felix "FX" Lindner, Recurity Labs GmbH; Konrad Rieck, Technische Universität Berlin
Read the Abstract | Full paper
View the Video | Slides
Listen to the MP3
Awarded Best Paper!
Exposing iClass Key Diversification
Flavio D. Garcia, Gerhard de Koning Gans, and Roel Verdult, Radboud University Nijmegen
Read the Abstract | Full paper
View the Video | Slides
Listen to the MP3
|
|
|