WORKSHOP SESSIONS
Please Note: This workshop is by invitation and/or acceptance of paper submission.
Session papers are available to workshop registrants immediately and to everyone beginning July 29, 2008.
All sessions will take place in the Empire Room unless otherwise noted.
|
Tuesday, July 29, 2008
|
7:30 a.m.–9:00 a.m. Continental Breakfast, Regency Foyer
|
9:00 a.m.–9:10 a.m. |
Opening Remarks
Program Chair: Niels Provos, Google
|
9:10 a.m.–10:40 a.m. |
Securing Systems
Towards Application Security on Untrusted Operating Systems
Dan R.K. Ports, MIT CSAIL and VMware, Inc.; Tal Garfinkel, VMware, Inc.
Paper in HTML | PDF
Digital Objects as Passwords
Mohammad Mannan and P.C. van Oorschot, Carleton University
Paper in HTML | PDF
Security Benchmarking using Partial Verification
Thomas E. Hart, Marsha Chechik, and David Lie, University of Toronto
Paper in HTML | PDF
|
10:40 a.m.–11:00 a.m. Break |
11:00 a.m.–12:30 p.m. |
Exploring New Directions
Securing Provenance
Uri Braun, Avraham Shinnar, and Margo Seltzer, Harvard School of Engineering and Applied Sciences
Paper in HTML | PDF
Absence Makes the Heart Grow Fonder: New Directions for Implantable
Medical Device Security
Tamara Denning, University of Washington; Kevin Fu, University of Massachusetts Amherst; Tadayoshi Kohno, University of Washington
Paper in HTML | PDF
Research Challenges for the Security of Control Systems
Alvaro A. Cárdenas, Saurabh Amin, and Shankar Sastry, University of
California, Berkeley
Paper in HTML | PDF
|
12:30 p.m.–2:00 p.m. Workshop Luncheon, Regency 1 |
2:00 p.m.–3:30 p.m. |
Adversarial Security
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications
Alexei Czeskis, David J. St. Hilaire, Karl Koscher, Steven D. Gribble, and Tadayoshi Kohno, University of Washington; Bruce Schneier, BT
Paper in HTML | PDF
Panic Passwords: Authenticating under Duress
Jeremy Clark and Urs Hengartner, University of Waterloo
Paper in HTML | PDF
Bootstrapping Trust in a "Trusted" Platform
Bryan Parno, Carnegie Mellon University
Paper in HTML | PDF
|
3:30 p.m.–4:00 p.m. Break |
4:00 p.m.–5:30 p.m. |
Network Forensics
Towards Quantification of Network-Based Information Leaks via HTTP
Kevin Borders, Web Tap Security, Inc.; Atul Prakash, University of Michigan
Paper in HTML | PDF
Principles for Developing Comprehensive Network Visibility
Mark Allman, Christian Kreibich, Vern Paxson,
Robin Sommer, and Nicholas Weaver, ICSI
Paper in HTML | PDF
Challenges and Directions for Monitoring P2P File Sharing Networks—or—Why My Printer Received a DMCA Takedown Notice
Michael Piatek, Tadayoshi Kohno, and Arvind Krishnamurthy, University of Washington
Paper in HTML | PDF
|
5:30 p.m.–5:35 p.m. |
Closing Remarks
Program Chair: Niels Provos, Google
|
|