Accepted Posters
The following posters will be presented during a happy hour on Wednesday, August 8, 6:00 p.m.7:30 p.m., in the Republic Ballroom.
Defacing Facebook: A Web 2.0 Case Study
Adrienne Felt,
Computer Science Department, University of Virginia
Fast Packet Classification Using Condition Factorization
Alok Tongaonkar and R. C. Sekar,
Computer Science Department, Stony Brook University
Towards Understanding IT Security Professionals and Their Tools
David Botta, Rodrigo Werlinger, Andre Gagne Konstantin Beznosov, Lee Iverson, Brian Fisher, and Sidney Fels,
University of British Columbia, Vancouver, Canada
Lockdown: Distributed Policy Analysis and Enforcement within the Enterprise Network
Andrew Blaich, Qi Liao, Aaron Striegel, and Douglas Thain,
Department of Computer Science and Engineering, University of Notre Dame
The Study of Identifying Critical Success Factors in Predicting PKI Implementation Success: A Bayesian Classifier Approach
Chaochang Chiu and Yu-Ching Tung,
Dept. of Information Management, Yuan Ze University, Taiwan;
Chi-I Hsu,
Dept. of Information Management, Kainan University, Taiwan
Locating Zombie Nodes and Botmasters in Decentralized Peer-to-Peer Botnets
Chris Nunnery, Brent ByungHoon Kang, and Vikram Sharma,
College of Computing and Informatics, University of North Carolina at Charlotte;
Julian Grizzard,
The Johns Hopkins University
Applied Physics Laboratory
Privacy-Preserving WLAN Access Point Discovery
Janne Lindqvist,
Helsinki University of Technology, Finland,
and International Computer Science Institute, Berkeley, CA
A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms
George I. Davida and Jeremy A. Hansen, Center for Cryptography, Computer and Network Security, University of WisconsinMilwaukee
KernelSecNet
Manigandan Radhakrishnan and Jon A. Solworth,
University of Illinois at Chicago
TRACKS: A Behavior Based Policy System to Detect Hidden Malware
Micha Moffie and David Kaeli,
Computer Architecture Research Laboratory,
Northeastern University;
Winnie Cheng,
Computer Science and Artificial Intelligence Lab,
Massachusetts Institute of Technology
NS3: Networked Secure Searchable Storage with Privacy and Correctness
Peter Williams, Radu Sion, and Erez Zadok,
Stony Brook Network Security and Applied Cryptography Lab
Tracefilter: A Tool for Locating Network Source Address Validation Filters
Robert Beverly and Steven Bauer,
MIT CSAIL
The Case for DDoS Resistant Membership Management in P2P Systems
Xin Sun, Ruben Torres, and Sanjay Rao,
Purdue University
Dynamically Establishing Trust: Can it Be Done Reliably?
Ryan Gardner, Sujata Garera, and Aviel D. Rubin,
Johns Hopkins University
Exploring the Social and Technical Aspects of Political Conflict On-Line
Thomas J. Holt,
Department of Criminal Justice,
The University of North Carolina at Charlotte;
Lyudmila Leslie, Joshua Soles, and Brittany Spaulding,
Department of Software and Information Systems,
The University of North Carolina at Charlotte
Authentication Considering a Dishonest Insider
Zhiyao Liang and Rakesh M Verma,
Computer Science Department,
University of Houston