All sessions will be held in Grand Ballroom C unless otherwise noted.
The workshop papers are available for download below to registered attendees now and to everyone beginning Tuesday. August 15, 2017. Paper abstracts are available to everyone. Copyright to the individual works is retained by the author[s].
Downloads for Registered Attendees
(Sign in to your USENIX account to download these files.)



Tuesday, August 15
8:00 am–9:00 am
Continental Breakfast
9:00 am–10:30 am
Using Competitions and CTFs
Session Chair: Mark Gondree, Sonoma State University
CTF: State-of-the-Art and Building the Next Generation
Clark Taylor, University of Arizona and Lawrence Livermore National Laboratory; Pablo Arias, North Carolina A&T and Lawrence Livermore National Laboratory; Jim Klopchic, Celeste Matarazzo, and Evi Dube, Lawrence Livermore National Laboratory
Shell We Play A Game? CTF-as-a-service for Security Education
Erik Trickel, Arizona State University; Francesco Disperati and Eric Gustafson, University of California, Santa Barbara; Faezeh Kalantari, Michael Mabey, Naveen Tiwari, Yeganeh Safaei, and Adam Doupe, Arizona State University; Giovanni Vigna, University of California, Santa Barbara
Analysis and Exercises for Engaging Beginners in Online CTF Competitions for Security Education
Tanner J. Burns, Samuel C. Rios, Thomas K. Jordan, Qijun Gu, Texas State University; Trevor Underwood, Netspend Corporation
10:30 am–11:00 am
Break with Refreshments
11:00 am–12:30 pm
Broadening Participation
Session Chair: Ashley Podhradsky, Dakota State University
CyberPDX: A Camp for Broadening Participation in Cybersecurity
Wu-chang Feng, Robert Liebman, Lois Delcambre, Michael Lupro, Tim Sheard, Scott Britell, and Gerald Recktenwald, Portland State University
Teaching Authentication in High Schools: Challenges and Lessons Learned
Elizabeth Stobert, Elizabeta Cavar, Luka Malisa, and David Sommer, ETH Zurich
Jail, Hero or Drug Lord? Turning a Cyber Security Course Into an 11 Week Choose Your Own Adventure Story
Tom Chothia, Sam Holdcroft, Andreea-Ina Radu, and Richard J. Thomas, University of Birmingham
Live Lesson: Netsim: Network simulation and hacking for high schoolers
Erinn Atwater, Cecylia Bocovich, Urs Hengartner, and Ian Goldberg, University of Waterloo
12:30 pm–2:00 pm
Workshop Luncheon
2:00 pm–3:30 pm
Developing Classroom Exercises
Session chair: Wu-chang Feng, Portland State University
Live Lesson: The EDURange Framework and a Movie-themed Exercise in Network Reconnaissance
Richard Weiss, The Evergreen State College; Jens Mache, Lewis and Clark College; Michael Locasto, SRI
Security Scenario Generator (SecGen): A Framework for Generating Randomly Vulnerable Rich-scenario VMs for Learning Computer Security and Hosting CTF Events
Z. Cliffe Schreuders, Thomas Shaw, Mohammad Shan-A-Khuda, Gajendra Ravichandran, and Jason Keighley, Leeds Beckett University; Mihai Ordean, University of Birmingham
Live Lesson: Labtainers: A Docker-based Framework for Cybersecurity Labs
Cynthia E. Irvine, Michael F. Thompson, Michael McCarrin, and Jean Khosalim, Naval Postgraduate School
Peer Instruction for Digital Forensics
William Johnson, Irfan Ahmed, and Vassil Roussev, University of New Orleans; Cynthia B. Lee, Stanford University
3:30 pm–4:00 pm
Break with Refreshments
4:00 pm–5:00 pm
Panel
Establishing a Guide to the Cyber Security Body of Knowledge
Awais Rashid, Lancaster University, UK; George Danezis, University College London, UK; Wouter Joosen, KU Leuven, Belgium
5:00 pm–6:00 pm
Lightning Talks
Session Chair: Cynthia Irvine, Naval Postgraduate School
- Motivating learning: Teaching communications security with social movements
Glencora Borradaile, Oregon State University - Evaluating Online Security Training for Journalists Through the Lens of Learning Science
Mahdi Nasrullah Al-Ameen, Clemson University; Elizabeth Anne Watkins, Columbia University; Byron Lowens, Clemson University; Franziska Roesner, University of Washington; Kelly Caine, Clemson University; Susan E. Mcgregor, Columbia University - Experiences with CTFd in the Classroom
Zachary Peterson, Cal Poly, San Luis Obispo - Decisions & Disruptions: A tabletop game for ICS security education
Awais Rashid, Lancaster University - Risk vs Reward: the use of raw data sources within undergraduate course in forensic training
Anthony Serapiglia, Saint Vincent College