WORKSHOP SESSIONS
Please Note: This workshop is by invitation and/or acceptance of paper submission.
Session papers are available to workshop registrants immediately and to everyone beginning July 28, 2008.
All sessions will take place in the Sacramento Room unless otherwise noted.
|
Monday, July 28, 2008
|
7:30 a.m.–9:00 a.m. Continental Breakfast, Regency Foyer
|
9:15 a.m.–9:30 a.m.
|
Welcome
|
9:30 a.m.–10:30 a.m. |
Invited Talk
Speaker: Paul Vixie
|
10:30 a.m.–10:50 a.m. Break
|
10:50 a.m.–12:20 p.m. |
Papers
Engineering Heap Overflow Exploits with JavaScript
Mark Daniel, Jake Honoroff, and Charlie Miller, Independent Security Evaluators
Paper in HTML | PDF
Experiences with Model Inference Assisted Fuzzing
Joachim Viide, Aki Helin, Marko Laakso, Pekka Pietikäinen, Mika Seppänen,
Kimmo Halunen, Rauli Puuperä, and Juha Röning, University of Oulu, Finland
Paper in HTML | PDF
Insecure Context Switching: Inoculating Regular Expressions for Survivability
Will Drewry and Tavis Ormandy, Google, Inc.
Paper in HTML | PDF
|
12:20 p.m.–1:45 p.m. Workshop Luncheon, Regency 1
|
1:45 p.m.–2:45 p.m.
|
Papers
There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits
Marco Cova, Christopher Kruegel, and Giovanni Vigna, University of California, Santa Barbara
Paper in HTML | PDF
Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods
Elizabeth Stinson and John C. Mitchell, Stanford University
Paper in HTML | PDF
|
2:45 p.m.–3:10 p.m. Break
|
3:10 p.m.–4:40 p.m.
|
Papers
Reverse Engineering Python Applications
Aaron Portnoy and Ali-Rizvi Santiago, TippingPoint DVLabs
Paper in HTML | PDF
Exploitable Redirects on the Web: Identification, Prevalence, and Defense
Craig A. Shue, Andrew J. Kalafut, and Minaxi Gupta, Indiana University
Paper in HTML | PDF
Modeling the Trust Boundaries Created by Securable Objects
Matt Miller, Leviathan Security Group
Paper in HTML | PDF
|
4:40 p.m.–5:40 p.m.
|
Rump Session
5-minute talks
|
5:40 p.m.–5:55 p.m.
|
Closing Remarks
Program Chairs: Dan Boneh, Stanford University;
Tal Garfinkel, VMware; Dug Song, Zattoo
|
|
|