Check out the new USENIX Web site.
INMWREN '10 Banner

NSDI '10

WORKSHOP PROGRAM

All sessions will take place in the Regency 2 Room unless otherwise noted.

Session papers are available to workshop registrants immediately and to everyone beginning April 27, 2010.

Tuesday, April 27, 2010
8:00 a.m.–9:00 a.m.    Continental Breakfast, Regency Foyer
9:00 a.m.–9:45 a.m.

Keynote Address

Why Don't I (Still) Trust Anything?
Jeff Moss, Founder, Black Hat and DEF CON

9:45 a.m.–10:35 a.m.

Botnets

Session Chair: Michael Bailey, University of Michigan

Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure
Chris Nunnery, Greg Sinclair, and Brent ByungHoon Kang, University of North Carolina at Charlotte

Read the Abstract | Full paper | Slides

Insights from the Inside: A View of Botnet Management from Infiltration
Chia Yuan Cho, University of California, Berkeley; Juan Caballero, Carnegie Mellon University and University of California, Berkeley; Chris Grier, University of California, Berkeley; Vern Paxson, ICSI and University of California, Berkeley; Dawn Song, University of California, Berkeley

Read the Abstract | Full paper | Slides

10:35 a.m.–11:00 a.m.    Break
11:00 a.m.–12:15 p.m.

Threat Measurement and Characterization

Session Chair: Stefan Savage, University of California, San Diego

The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution
Moheeb Abu Rajab, Lucas Ballard, Panayiotis Mavrommatis, Niels Provos, and Xin Zhao, Google Inc.

Read the Abstract | Full paper

Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent
Stevens Le Blond, Arnaud Legout, Fabrice Lefessant, Walid Dabbous, and Mohamed Ali Kaafar, I.N.R.I.A, France

Read the Abstract | Full paper | Slides

WebCop: Locating Neighborhoods of Malware on the Web
Jack W. Stokes, Microsoft Research; Reid Andersen, Christian Seifert, and Kumar Chellapilla, Microsoft Search

Read the Abstract | Full paper | Slides

12:15 p.m.–1:45 p.m.    Workshop Luncheon, Regency 1 Room
1:45 p.m.–2:30 p.m.

Invited Talk

Naked Avatars and Other Cautionary Tales About MMORPG Password Stealers
Jeff Williams, Microsoft Malware Protection Center

2:30 p.m.–3:45 p.m.

Threat Detection and Mitigation

Session Chair: Yinglian Xie, Microsoft Research

On the Potential of Proactive Domain Blacklisting
Mark Felegyhazi and Christian Kreibich, International Computer Science Institute; Vern Paxson, International Computer Science Institute and University of California, Berkeley

Read the Abstract | Full paper | Slides

Detection of Spam Hosts and Spam Bots Using Network Flow Traffic Modeling
Willa K. Ehrlich, Anestis Karasaridis, Danielle Liu, and David Hoeflin, AT&T Labs

Read the Abstract | Full paper | Slides

Extending Black Domain Name List by Using Co-occurrence Relation between DNS Queries
Kazumichi Sato and Keisuke Ishibashi, NTT Information Sharing Platform Laboratories, NTT Corporation; Tsuyoshi Toyono, Internet Multifeed Co.; Nobuhisa Miyake, NTT Information Sharing Platform Laboratories, NTT Corporation

Read the Abstract | Full paper | Slides

3:45 p.m.–4:15 p.m.    Break
4:15 p.m.–5:30 p.m.

New Threats and Challenges

Session Chair: Vinod Yegneswaran, SRI International

Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer
Stephen Checkoway and Hovav Shacham, University of California, San Diego; Eric Rescorla, RTFM, Inc.

Read the Abstract | Full paper | Slides

DNS Prefetching and Its Privacy Implications: When Good Things Go Bad
Srinivas Krishnan and Fabian Monrose, University of North Carolina at Chapel Hill

Read the Abstract | Full paper | Slides

Honeybot, Your Man in the Middle for Automated Social Engineering
Tobias Lauinger, Veikko Pankakoski, Davide Balzarotti, and Engin Kirda, EURECOM, Sophia-Antipolis, France

Read the Abstract | Full paper | Slides

5:30 p.m.–6:00 p.m.

Work-in-Progress Reports (WiPs)

Session Chair: Fabian Monrose, University of North Carolina, Chapel Hill

footer
? Need help? Use our Contacts page.

Last changed: 12 May 2010 jp