|
WORKSHOP PROGRAM
All sessions will take place in California West unless otherwise noted.
All breakfast and refreshment breaks will take place in the California East/West Foyer,
Elizabethan Foyer, and Elizabethan C.
|
Tuesday, August 9, 2011
|
8:30 a.m.–9:00 a.m. Continental Breakfast
|
|
9:00 a.m.–9:05 a.m. |
Welcome
Program Chair: Patrick McDaniel, Pennsylvania State University
View the Video
Listen to the MP3
|
|
9:05 a.m.–10:35 a.m. |
New Age System Security
Session Chair: Patrick McDaniel, Pennsylvania State University
Building Secure Robot Applications
Murph Finnicum and Samuel T. King, University of Illinois
Read the Full paper
View the Video
Listen to the MP3
Security Fusion: A New Security Architecture for Resource-Constrained Environments
Suku Nair, Subil Abraham, and Omar Al Ibrahim, Southern Methodist University
Read the Full paper
View the Video | Slides
Listen to the MP3
DISTROY: Detecting Integrated Circuit Trojans with Compressive Measurements
Youngjune L. Gwon, H.T. Kung, and Dario Vlah, Harvard University
Read the Full paper (updated 7/7/11)
View the Video | Slides
Listen to the MP3
View the Post-Session Q&A Video
Listen to the Post-Session Q&A MP3
|
|
10:35 a.m.–11:00 a.m. Break with coffee and tea
|
|
11:00 a.m.–12:30 p.m. |
Privacy and Anonymity
Session Chair: Patrick Traynor, Georgia Institute of Technology
Privacy-Preserving Applications on Smartphones
Yan Huang, Peter Chapman, and David Evans, University of Virginia
Read the Full paper
View the Video | Slides
Listen to the MP3
Public vs. Publicized: Content Use Trends and Privacy Expectations
Jessica Staddon and Andrew Swerdlow, Google
Read the Full paper
View the Video
Listen to the MP3
Herbert West—Deanonymizer
Mihir Nanavati, Nathan Taylor, William Aiello, and Andrew Warfield, University of British Columbia
Read the Full paper
View the Video | Slides
Listen to the MP3
View the Post-Session Q&A Video
Listen to the Post-Session Q&A MP3
|
|
12:30 p.m.–2:00 p.m. Workshop Luncheon served in the Colonial Room
|
|
2:00 p.m.–3:30 p.m. |
Information Protection
Session Chair: Vern Paxson, University of California, Berkeley
Towards Practical Avoidance of Information Leakage in Enterprise Networks
Jason Croft and Matthew Caesar, University of Illinois at Urbana-Champaign
Read the Full paper
View the Video
Listen to the MP3
Towards Client-side HTML Security Policies
Joel Weinberger, University of California, Berkeley; Adam Barth, Google; Dawn Song, University of California, Berkeley
Read the Full paper
View the Video | Slides
Listen to the MP3
TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion
Liang Cai and Hao Chen, University of California, Davis
Read the Full paper
View the Video | Slides
Listen to the MP3
View the Post-Session Q&A Video
Listen to the Post-Session Q&A MP3
|
3:30 p.m.–4:00 p.m. Break with beverages |
|
4:00 p.m.–5:00 p.m. |
Emerging Areas in Security
Session Chair: Sam King, University of Illinois at Urbana-Champaign
On Dynamic Malware Payloads Aimed at Programmable Logic Controllers
Stephen McLaughlin, Pennsylvania State University
Read the Full paper
View the Video | Slides
Listen to the MP3
Effective Digital Forensics Research Is Investigator-Centric
Robert J. Walls, Brian Neil Levine, and Marc Liberatore, University of Massachusetts Amherst; Clay Shields, Georgetown University
Read the Full paper
View the Video | Slides
Listen to the MP3
View the Post-Session Q&A Video
Listen to the Post-Session Q&A MP3
|
|
|