Birds-of-a-Feather Sessions
Scheduling a BoF
Registered attendees may schedule BoFs in advance by contacting bofs@usenix.org with "SaTCPI '15 BoF" in the subject line and the following information in the body of the email:
- BoF title
- Organizer name and affiliation
- Date, time, and location preference
- Brief description of BoF (optional)
BoF Schedule
Projectors provided in all rooms.
Tuesday, January 6, 2015 | |||||
ROOM | # of seats |
5:30 pm– 6:30 pm |
6:30 pm– 7:30 pm |
||
Potomac 1 | 48 | Ask a Program Officer Jeremy Epstein, NSF |
DMCA Impacts Vern Paxson, UC Berkeley |
||
Potomac 2 | 48 |
Doug Jacobson, Iowa State University & Cybersecurity Competitions Portia Pusey |
|
||
Potomac 3 | 48 |
L Jean Camp, Indiana University & Research Methods for Experimental Computer Science Roy Maxion, Carnegie Mellon University |
Hardware-Oriented Security and Trust Jim Plusquellic, University of New Mexico |
||
Potomac 4 | 48 |
Medical Systems & Security Jerzy Rozenglit, University of Arizona |
|
||
Potomac 5 | 48 |
Let's Write Our Smalls Rachel Greenstadt |
|||
Potomac 6 | 48 |
Programers Are People Too! - How to Improve Development Practices Sam Weber |
BoF Descriptions
Using Cyber Defense Competitions (CDC) as a teaching tool
Doug Jacobson, Iowa State University
Tuesday, January 6, 5:30 pm- 6:30 pm, Potomac 2
Cyber defense competitions are typically used to determine the best student team. At Iowa State we use them (5 a year) as a teaching tool. The session will explore using CDCs as a teaching tool at high schools, community colleges, universities and what is needed to support them
Security and Human Behavior
L Jean Camp, Indiana University
Tuesday, January 6, 6:30 pm- 7:30 pm, Potomac 2
Psychology, economics, sociology, anthropology as well as risk assessment and perception are increasingly informing computer security. How do we design and evaluate assessments using these tools? How does this change the standard threat/ solution technical model for security? And how can social science findings be translated into the construction of security technologies?