Birds-of-a-Feather Sessions

Scheduling a BoF

Registered attendees may schedule BoFs in advance by contacting bofs@usenix.org with "SaTCPI '15 BoF" in the subject line and the following information in the body of the email:

  • BoF title
  • Organizer name and affiliation
  • Date, time, and location preference
  • Brief description of BoF (optional)

BoF Schedule

Projectors provided in all rooms.

Tuesday, January 6, 2015
ROOM #
of seats
5:30 pm–
6:30 pm
6:30 pm–
7:30 pm
Potomac 1 48 Ask a Program Officer
Jeremy Epstein, NSF
DMCA Impacts
Vern Paxson, UC Berkeley
Potomac 2 48

CDC teaching tool

Doug Jacobson, Iowa State University

&

Cybersecurity Competitions

Portia Pusey

 

Potomac 3 48

 Security and Human Behavior

L Jean Camp, Indiana University

&

Research Methods for Experimental Computer Science

Roy Maxion, Carnegie Mellon University

Hardware-Oriented Security and Trust

Jim Plusquellic, University of New Mexico

Potomac 4 48

Medical Systems & Security

Jerzy Rozenglit, University of Arizona 

 

Potomac 5 48

Let's Write Our Smalls

Rachel Greenstadt

 
Potomac 6 48

Programers Are People Too!

- How to Improve Development Practices

Sam Weber 

 

BoF Descriptions

Using Cyber Defense Competitions (CDC) as a teaching tool
Doug Jacobson, Iowa State University
Tuesday, January 6, 5:30 pm- 6:30 pm, Potomac 2

Cyber defense competitions are typically used to determine the best student team. At Iowa State we use them (5 a year) as a teaching tool. The session will explore using CDCs as a teaching tool at high schools, community colleges, universities and what is needed to support them

Security and Human Behavior
L Jean Camp, Indiana University
Tuesday, January 6, 6:30 pm- 7:30 pm, Potomac 2

Psychology, economics, sociology, anthropology as well as risk assessment and perception are increasingly informing computer security. How do we design and evaluate assessments using these tools? How does this change the standard threat/ solution technical model for security? And how can social science findings be translated into the construction of security technologies?