Summit Program

All sessions will be held in Regency B unless otherwise noted.

Downloads for Registered Attendees

Attendee Files 
HotSec '15 Attendee List

 

Tuesday, August 11, 2015

8:00 am–9:00 am Tuesday

Continental Breakfast

9:00 am–9:15 am Tuesday

Welcome and Discussion Format

Program Co-Chairs: Joseph Bonneau, Stanford University and Electronic Frontier Foundation, and Carrie Gates, Dell Research

9:15 am–10:15 am Tuesday

Discussion 1

What Is a Hot Topic?

Jeremy Epstein, National Science Foundation, and Douglas Maughan, Department of Homeland Security

What makes a hot topic? Is it that researchers are inspired by some new idea or approach? Or is it driven by funding from external organizations? And what role does industry play in this? For example, at one point applying machine learning to IDS’s was hot, but now, while still researched, the topic itself does not inspire the same kind of fervor that it once did within the research community. Yet it is currently a hot topic within industry, but using the phrase security analytics instead to describe the same underlying techniques. Another example is that continuous authentication / mobile authentication is currently a hot topic. Why? And what role should funding play in developing or encouraging hot topics, versus supporting more basic research? For example, should funding go towards continuous authentication, or should more basic research (e.g., in passwords) be supported?

What makes a hot topic? Is it that researchers are inspired by some new idea or approach? Or is it driven by funding from external organizations? And what role does industry play in this? For example, at one point applying machine learning to IDS’s was hot, but now, while still researched, the topic itself does not inspire the same kind of fervor that it once did within the research community. Yet it is currently a hot topic within industry, but using the phrase security analytics instead to describe the same underlying techniques. Another example is that continuous authentication / mobile authentication is currently a hot topic. Why? And what role should funding play in developing or encouraging hot topics, versus supporting more basic research? For example, should funding go towards continuous authentication, or should more basic research (e.g., in passwords) be supported?

We will encourage discussion on deciding what makes a topic in security "hot," and if having hot topics is good, or if it does a disservice to the security community in general by not supporting the not-hot, yet still unsolved, security research issues.

Available Media
10:15 am–10:45 am Tuesday

Break with Refreshments

10:45 am–noon Tuesday

Discussion 2

How Security Research Can Impact Policy

Ed Felten, White House Office of Science and Technology Policy, and Ashkan Soltani, Federal Trade Commission

Today, nearly every major policy debate has a technical aspect to it: healthcare, energy, consumer protection, national security, etc. Yet, relatively few technologists are engaged in informing policy outside of the major “science agencies” such as the National Science Foundation and the Department of Energy. This needs to change. In addition to technical knowledge, all that is required to participate productively in policy is a basic understanding of the law and policy, and the ability to communicate in a way policymakers can understand.

Come hear from Ed Felten, Deputy U.S. CTO at the White House Office of Technology Policy and Ashkan Soltani, Chief Technologist at the Federal Trade Commission, on how technologists can contribute to making policy that is more technically sound.

We’ll discuss opportunities across government, effective communication, and ultimately, the need for greater participation from the technical community.

Today, nearly every major policy debate has a technical aspect to it: healthcare, energy, consumer protection, national security, etc. Yet, relatively few technologists are engaged in informing policy outside of the major “science agencies” such as the National Science Foundation and the Department of Energy. This needs to change. In addition to technical knowledge, all that is required to participate productively in policy is a basic understanding of the law and policy, and the ability to communicate in a way policymakers can understand.

Come hear from Ed Felten, Deputy U.S. CTO at the White House Office of Technology Policy and Ashkan Soltani, Chief Technologist at the Federal Trade Commission, on how technologists can contribute to making policy that is more technically sound.

We’ll discuss opportunities across government, effective communication, and ultimately, the need for greater participation from the technical community.

Noon–2:00 pm Tuesday

Luncheon for Workshop Attendees


2:00 pm–2:45 pm Tuesday

Discussion 3

Developers Are Users Too: Designing Crypto and Security APIs That Busy Engineers and Sysadmins Can Use Securely

Matthew Green, Johns Hopkins University, and Matthew Smith, Rheinische Friedrich-Wilhelms-Universität Bonn

Over the past several years a number of new cryptographic libraries and APIs have become available to developers. These libraries promise to greatly increase the use of cryptography on the web and in the cloud, but they often do so at a cost. In this workshop we will attempt to outline a new paradigm for cryptographic API development that treats normal developers, rather than cryptographers, as the primary consumer -- and treat developer use as a critical failure mode, rather than a regrettable failure.

Over the past several years a number of new cryptographic libraries and APIs have become available to developers. These libraries promise to greatly increase the use of cryptography on the web and in the cloud, but they often do so at a cost. In this workshop we will attempt to outline a new paradigm for cryptographic API development that treats normal developers, rather than cryptographers, as the primary consumer -- and treat developer use as a critical failure mode, rather than a regrettable failure.

To begin this discussion, we will present several case studies of existing APIs that have seen widespread real world misuse, and we will attempt to characterize the key failings that created these situations. We will also discuss the contributing factors that led to these conditions, including: standards bodies, lack of formal testing requirements, and the expressiveness/safety tradeoff. We will then consider the base requirements for a "developer safe" regime of library and API development that reduce the possibility of misuse. Towards this end we will also consider a number of APIs that have been successful in this regard, and work to distill these lessons into formal recommendations. Finally, we will discuss if we as a community need to adopt techniques from the HCI community when designing cryptographic APIs and libraries.

Available Media
2:45 pm–3:30 pm Tuesday

Discussion 4

Science in/for/of Smartphone Authentication?

Janne Lindqvist, Rutgers University, and Robert Biddle, Carleton University

Smartphone authentication has received considerable attention of the research community for the past several years. Every year, in diverse set of top conferences, such as, CHI, MobiSyS, MobiCom, UbiComp, USENIX Security, CCS, NDSS, you can find some new alternative authentication mechanism proposal. This is not surprising given how important smartphones have become for people’s daily lives.

Smartphone authentication is also of particular interest because there have been also deployments by the industry beyond the usual PINs and passwords. Two prominent examples include the iOS's fingerprint authentication mechanism TouchID and Android’s 3x3 grid-based graphical password. De Luca and Lindqvist have recently summarized related literature and issues for these authentication methods [1].

Smartphone authentication has received considerable attention of the research community for the past several years. Every year, in diverse set of top conferences, such as, CHI, MobiSyS, MobiCom, UbiComp, USENIX Security, CCS, NDSS, you can find some new alternative authentication mechanism proposal. This is not surprising given how important smartphones have become for people’s daily lives.

Smartphone authentication is also of particular interest because there have been also deployments by the industry beyond the usual PINs and passwords. Two prominent examples include the iOS's fingerprint authentication mechanism TouchID and Android’s 3x3 grid-based graphical password. De Luca and Lindqvist have recently summarized related literature and issues for these authentication methods [1].

Although one could argue that humanity is making some progress that new proposals are being published, the unfortunate situation is that a lot of the work is not comparable to each other. We either do not have or do not require using comparable metrics with papers. Proponents of so called "behavioral biometrics", for example, have opted for using Equivalent Error Rates (EER) as their metric, following the legacy of biometrics, despite many reviewers disliking and distrusting the approach. One of the obvious problems with EER is that people do not have access to same datasets [2], and no comparisons are nevertheless made. (We note that EER is not necessarily a bad metric even though some in the community want to push forward this mem.) Clark and Lindqvist have used Bonneau et al.'s [3] comparative framework for web authentication as one approach to analyze a particular subdomain: gesture recognizers. Sherman et al. [4] have proposed and implemented an information-theoretic metric based on mutual information to compute complexity and memorability of gestures. Given the lack of deployment for a lot of (all) proposals, we are long way from applying statistical approaches such as \alpha-guesswork [5] to smartphone authentication.

What can and should be done when a reasonable number of participants for a new authentication method is perhaps tens or hundreds of volunteers, and how should we evaluate new proposals?

  1. A. De Luca, J. Lindqvist, "Is secure and usable smartphone authentication asking too much?," Computer , vol.48, no.5, pp.64,68, May 2015 doi: 10.1109/MC.2015.134
  2. G. Clark, J. Lindqvist, "Engineering Gesture-Based Authentication Systems," Pervasive Computing, IEEE , vol.14, no.1, pp.18,25, Jan.-Mar. 2015 doi: 10.1109/MPRV.2015.6
  3. J. Bonneau, C. Herley, P. C. van Oorschot and F. Stajano. "The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes," IEEE Security & Privacy (Oakland) 2012
  4. M. Sherman, G. Clark, Y. Yang, S. Sugrim, A. Modig, J. Lindqvist, A. Oulasvirta and T. Roos, "User-Generated Free-Form Gestures for Authentication: Security and Memorability," in Proceedings of MobiSys'14, 2014
  5. J. Bonneau. The science of guessing: analyzing an anonymized corpus of 70 million passwords. IEEE Security & Privacy (Oakland) 2012.
3:30 pm–4:00 pm Tuesday

Break with Refreshments

4:00 pm–4:45 pm Tuesday

Discussion 5

Don't Show Me Yours, I Won't Show You Mine: Security Research with Non-Public Data

Tudor Dumitras and Michelle Mazurek, University of Maryland, College Park

In recent years, papers at top security conferences increasingly rely on non-public data, such as passwords, telemetry, or other confidential data from inside universities and corporations. This model has both important risks and important benefits, including:

  • access to real-world data that could not be obtained any other way,
  • larger-scale experiments than would be otherwise possible,
  • risk of disclosure of users' private data,
  • difficulty of reproduction,
  • limitations on who has access and connections to conduct this kind of work,
  • and many others.

Despite the risks, this kind of research is not going away anytime soon.

In this session, we will discuss (as case studies) several recent examples of research on proprietary data and how the data was obtained and protected. We will discuss when this model is or is not appropriate, how proprietary data can be properly protected, and whether and how we can promote as much reproducibility as possible in this situation. We will discuss what are (or should be) best practices for researchers considering a study of non-public data. Our hope is to spark a broader discussion in the community about sharing data in a responsible manner and utilizing non-public data sets in security research.

Note: Please fill out this short survey before the session. This will allow us incorporate your responses into the discussion in advance.

In recent years, papers at top security conferences increasingly rely on non-public data, such as passwords, telemetry, or other confidential data from inside universities and corporations. This model has both important risks and important benefits, including:

  • access to real-world data that could not be obtained any other way,
  • larger-scale experiments than would be otherwise possible,
  • risk of disclosure of users' private data,
  • difficulty of reproduction,
  • limitations on who has access and connections to conduct this kind of work,
  • and many others.

Despite the risks, this kind of research is not going away anytime soon.

In this session, we will discuss (as case studies) several recent examples of research on proprietary data and how the data was obtained and protected. We will discuss when this model is or is not appropriate, how proprietary data can be properly protected, and whether and how we can promote as much reproducibility as possible in this situation. We will discuss what are (or should be) best practices for researchers considering a study of non-public data. Our hope is to spark a broader discussion in the community about sharing data in a responsible manner and utilizing non-public data sets in security research.

Note: Please fill out this short survey before the session. This will allow us incorporate your responses into the discussion in advance.


Available Media
4:45 pm–5:00 pm Tuesday

Wrap Up

Program Co-Chairs: Joseph Bonneau, Stanford University and Electronic Frontier Foundation, and Carrie Gates, Dell Research