Check out the new USENIX Web site.
UPSEC '08 Banner

WORKSHOP SESSIONS

Session papers are available to workshop registrants immediately and to everyone beginning April 14, 2008.

Monday, April 14, 2008
8:00 a.m.–9:00 a.m.  Continental Breakfast
9:00 a.m.–9:10 a.m.

Greetings and Welcome

Program Chairs: Rachna Dhamija, Harvard University; Elizabeth Churchill, Yahoo! Research

9:10 a.m.–10:00 a.m.

Whirlwind Research Talks

Session Chair: Elizabeth Churchill, Yahoo! Research

We encourage you to submit an abstract or proposal for a 5-minute presentation on your preliminary work to upsec08chairs@usenix.org.

Scheduled Speakers and Talks

  • Dirk Balfanz, Google: (Under)mining Privacy in Social Networks
  • Alessandro Aquisti, Carnegie Mellon University: Soft Paternalism and Behavioral Privacy
  • Mary Ellen Zurko, IBM: Can We Create Standards from Usable Security Research?
  • Diana Smetters, PARC: When Errors Attack
  • Volker Roth, FXPAL: Questions I Ask Myself About Usable Security
  • Rachel Greenstadt, Harvard University: Cognitive Security for Personal Devices
  • Steve Bellovin, Columbia University: TBA
  • Paul Van Oorschot, Carleton University: Where Am I, What's in My Box, and Where Did It Come From?
  • Stuart Schechter, Microsoft Research: TBA

10:00 a.m.–10:30 a.m.

Full Paper

Session Chair: Elizabeth Churchill, Yahoo! Research

A Framework for Reasoning About the Human in the Loop
Lorrie Faith Cranor, Carnegie Mellon University

Paper in HTML | PDF

10:30 a.m.–11:00 a.m.  Break
11:00 a.m.–11:30 a.m.

Full Paper

Session Chair: Paul Van Oorschot, Carleton University

Understanding Privacy Settings in Facebook with an Audience View
Heather Richter Lipford, Andrew Besmer, and Jason Watson, University of North Carolina at Charlotte

Paper in HTML | PDF

11:30 a.m.–12:15 p.m.

Short Papers

Session Chair: Paul Van Oorschot, Carleton University

Where's The Beep? Security, Privacy, and User Misunderstandings of RFID
Jennifer King and Andrew McDiarmid, University of California, Berkeley

Paper in HTML | PDF

Biometric Daemons: Authentication via Electronic Pets
Pam Briggs, PaCT Lab, Northumbria University; Patrick Olivier, Newcastle University

Paper in HTML | PDF

Freezing More Than Bits: Chilling Effects of the OLPC XO Security Model
Meredith L. Patterson, University of Iowa; Len Sassaman and David Chaum, Katholieke Universiteit Leuven

Paper in HTML | PDF

12:15 p.m.–1:45 p.m.  Workshop Luncheon and Discussion Tables
1:45 p.m.–2:15 p.m.

Full Paper

Session Chair: Steven M. Bellovin, Columbia University

Centered Discretization with Application to Graphical Passwords
Sonia Chiasson, Carleton University, Ottawa, Canada; Jayakumar Srinivasan, Toronto, Canada; Robert Biddle and P.C. van Oorschot, Carleton University, Ottawa, Canada

Paper in HTML | PDF

2:15 p.m.–3:00 p.m.

Short Papers

Session Chair: Steven M. Bellovin, Columbia University

Using Salience Differentials to Making Visual Cues Noticeable
Andreas Heiner and N. Asokan, Nokia Research Center, Helsinki, Finland

Paper in HTML | PDF

Predicted and Observed User Behavior in the Weakest-link Security Game
Jens Grossklags, University of California, Berkeley; Nicolas Christin, Carnegie Mellon University, Information Networking Institute, and CyLab Japan; John Chuang, University of California, Berkeley

Paper in HTML | PDF

Ad-hoc Guesting: When Exceptions Are the Rule
Brinda Dalal, Les Nelson, Diana Smetters, and Nathaniel Good, Palo Alto Research Center, Inc.; Ame Elliot, IDEO Palo Alto

Paper in HTML | PDF

3:00 p.m.–3:30 p.m.  Break
3:30 p.m.–4:00 p.m.

Full Paper

Session Chair: Stuart Schechter, Microsoft Research

iPhish: Phishing Vulnerabilities on Consumer Electronics
Yuan Niu, Francis Hsu, and Hao Chen, University of California, Davis

Paper in HTML | PDF

4:00 p.m.–4:45 p.m.

Short Papers

Session Chair: Stuart Schechter, Microsoft Research

RUST: A Retargetable Usability Testbed for Web Site Authentication Technologies
Maritza L. Johnson, Columbia University; Chaitanya Atreya, Adobe Systems Inc.; Adam J. Aviv, University of Pennsylvania; Steven M. Bellovin and Gail E. Kaiser, Columbia University

Paper in HTML | PDF

A User Study Design for Comparing the Security of Registration Protocols
Chris Karlof, J.D. Tygar, and David Wagner, University of California, Berkeley

HTML | PDF

IRBs and Security Research: Myths, Facts and Mission Creep
Simson L. Garfinkel, Naval Postgraduate School and Harvard University

Paper in HTML | PDF

4:45 p.m.–5:30 p.m.  Discussion and Wrap-up
6:00 p.m.–7:00 p.m.

NSDI '08 and Workshops Welcome Get-Together

footer
? Need help? Use our Contacts page.

Last changed: 15 May 2008 jel