|
TECHNICAL SESSIONS
|
All sessions will take place in Fairfax (3rd Floor) unless otherwise noted. |
Workshop abstracts are available to everyone. Full papers are available to NSDI and workshop registrants immediately and to everyone beginning March 29, 2011. |
Tuesday, March 29 |
8:45 a.m.–9:00 a.m. |
Tuesday |
Opening Remarks
LEET '11 Program Chair: Christopher Kruegel, University of California, Santa Barbara
Listen to the MP3
|
|
9:00 a.m.–9:45 a.m. |
Tuesday |
Invited Talk
Tor and Circumvention: Lessons Learned
Nick Mathewson, The Tor Project
View the Slides
Listen to the MP3
|
|
9:45 a.m.–10:35 a.m. |
Tuesday |
Attacking Large-Scale, Real-World Systems
Session Chair: Stefan Savage, University of California, San Diego
Exposing the Lack of Privacy in File Hosting Services
Nick Nikiforakis, DistriNet, Katholieke Universiteit Leuven, Belgium; Marco Balduzzi, Institute Eurecom, Sophia Antipolis, France; Steven Van Acker and Wouter Joosen, DistriNet, Katholieke Universiteit Leuven, Belgium; Davide Balzarotti, Institute Eurecom, Sophia Antipolis, France
Read the Abstract | Full paper
View the Slides
Listen to the MP3
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users
Stevens Le Blond, Pere Manils, Abdelberi Chaabane, Mohamed Ali Kaafar, Claude Castelluccia, Arnaud Legout, and Walid Dabbous, I.N.R.I.A., France
Read the Abstract | Full paper
View the Slides
Listen to the MP3
|
|
10:35 a.m.–11:00 a.m. Break |
|
11:00 a.m.–12:15 p.m. |
Tuesday |
Studying Cyber-Criminals and Their Tools
Session Chair: Christopher Kruegel, University of California, Santa Barbara
The Nuts and Bolts of a Forum Spam Automator
Youngsang Shin, Minaxi Gupta, and Steven Myers, Indiana University, Bloomington
Read the Abstract | Full paper
View the Slides
Listen to the MP3
The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns
Brett Stone-Gross, University of California, Santa Barbara and LastLine, Inc.; Thorsten Holz, Ruhr-University Bochum and LastLine, Inc.; Gianluca Stringhini, University of California, Santa Barbara; Giovanni Vigna, University of California, Santa Barbara, and LastLine, Inc.
Read the Abstract | Full paper
Listen to the MP3
On the Effects of Registrar-level Intervention
He (Lonnie) Liu and Kirill Levchenko, University of California, San Diego; Márk Félegyházi, Budapest University of Technology and Economics and International Computer Science Institute; Christian Kreibich, University of California, Berkeley, and International Computer Science Institute; Gregor Maier, International Computer Science Institute; Geoffrey M. Voelker and Stefan Savage, University of California, San Diego
Read the Abstract | Full paper
View the Slides
Listen to the MP3
|
|
12:15 p.m.–1:45 p.m. Workshop Luncheon, Republic Ballroom |
|
1:45 p.m.–2:30 p.m. |
Tuesday |
Invited Talk
Complex Web of Search Engine Spam
Sasi Parthasarathy, Bing
View the Slides
Listen to the MP3
|
|
2:30 p.m.–3:15 p.m. Break |
|
3:15 p.m.–4:30 p.m. |
Tuesday |
Threat Measurement and Modeling
Session Chair: Giovanni Vigna, University of California, Santa Barbara, and LastLine, Inc.
Characterizing Internet Worm Infection Structure
Qian Wang, Florida International University; Zesheng Chen and Chao Chen, Indiana University—Purdue University Fort Wayne
Read the Abstract | Full paper
View the Slides
Listen to the MP3
Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm
Nathaniel Husted and Steven Myers, Indiana University
Read the Abstract | Full paper
View the Slides
Listen to the MP3
Inflight Modifications of Content: Who Are the Culprits?
Chao Zhang, Polytechnic Institute of NYU; Cheng Huang, Microsoft Research; Keith W. Ross, Polytechnic Institute of NYU; David A. Maltz and Jin Li, Microsoft Research
Read the Abstract | Full paper
View the Slides
Listen to the MP3
|
|
4:30 p.m.–4:45 p.m. Short Break |
|
4:45 p.m.–6:00 p.m. |
Tuesday |
New Threats and Challenges
Session Chair: Engin Kirda, Northeastern University
Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus Software
Mohammed I. Al-Saleh and Jedidiah R. Crandall, University of New Mexico
Read the Abstract | Full paper
View the Slides
Listen to the MP3
Reconstructing Hash Reversal based Proof of Work Schemes
Jeff Green, Joshua Juen, Omid Fatemieh, Ravinder Shankesi, Dong Jin, and Carl A. Gunter, University of Illinois at Urbana-Champaign
Read the Abstract | Full paper
Listen to the MP3
Andbot: Towards Advanced Mobile Botnets
Cui Xiang, Fang Binxing, Yin Lihua, Liu Xiaoyi, and Zang Tianning, Institute of Computing Technology, Chinese Academy of Sciences
Read the Abstract | Full paper
View the Slides
Listen to the MP3
|
|
|