Conference Program
Program Overview
Monday, November 9, 2009, Pre-Conference Full Day Workshops and Welcome Reception | |||
8:30 - 17:00 |
Workshop on Assurable and Usable Security Configuration -- Tornoto | ||
Workshop on Digital Rights Management -- New Orleans | |||
Workshop on Virtual Machine Security -- Atlanta | |||
Workshop on Security and Artificial Intelligence -- Wrigely | |||
Workshop on Secure Execution of Untrusted Code -- Atlanta | |||
Workshop on Privacy in the Electronic Society -- Water Tower | |||
2:00 - 17:30 | Tutorial 1: "Cyber Security For The Power Grid", Mel Gehrs (Gehrs Consulting), Himanshu Khurana (UIUC), Andrew Wright (N-Dimension Solutions) -- Regency C | ||
18:00 - 19:30 | Happy Hour & Poster Session I(Toronto & Hong Kong) -- Regency Foyer | ||
Tuesday, November 10, 2009, Main Conference | |||
8:30 - 9:00 | Welcoming remarks -- Regency CD | ||
9:00 - 10:00 | Keynote talk: Prof. DOROTHY E. DENNING -- Regency CD Session Chair: |
||
10:00 - 10:30 | Break |
||
10:30 - 12:00 | Session 1 : Attacks I Session Chair: Patrick McDaniel (Penn State) -- Regency C |
Session 2: Applied Cryptography Session Chair: Hovav Shacham -- Regency D |
|
12:00 - 13:30 | Lunch --Regency A-B |
||
13:30 - 15:00 | Session 3: RFID Session Chair: Patrick Traynor (Georgia Tech) -- Regency C |
Session 4: Anonymization Networks Session Chair: George Danezis (Microsoft) -- Regency D |
Tutorial 2: An introduction to usable security Jeff Yan (Newcastle University) -- Toronto |
15:00 - 15:30 | Break |
||
15:30 - 17:30 | Session 5: Formal Techniques Session Chair: Cedric Fournet (Microsoft) -- Regency C |
Session 6: Cloud Security Session Chair: Tadayoshi Kohno (U. of Washington) -- Regency D |
Tutorial 3: Security Risk Analysis of Computer Networks:
Techniques and Challenge Anoop Singhal (NIST) and Xinming Ou (Kansas State University) -- Toronto |
18:00 - 20:30 | Conference Reception & Poster Session II (Columbus G-L) | ||
20:00 - 22:30 | OC Meeting | ||
Wednesday, November 11, 2009, Main Conference | |||
8:30 - 10:00 | Session 7: Security of Mobile Services Session Chair: Kosta Beznosov (U. of British Columbia) -- Regency C |
Session 8: Anonymization Techniques Session Chair: Sven Dietrich (Stevens Tech) -- Regency D |
|
10:00 - 10:30 | Break |
||
10:30 - 12:00 | Session 9: Software Security using Behavior Session Chair: Jon Giffin (Georgia Tech) -- Regency C |
Session 10: Embedded and Mobile Devices Session Chair: Paul Van Ooorschot (Carleton) -- Regency D |
|
12:00 - 13:30 | Lunch -- Regency A-B |
||
13:30 - 15:00 | Session 11: Systems and Networks Session Chair: Cristina Nita-Rotaru (Purdue) -- Regency C |
Session 12: Techniques for Ensuring Software Security Session Chair: V.N. Venkatakrishnan (U. of Illinois, Chicago) -- Regency D |
Tutorial 4: Securing Wireless Systems, Panos Papadimitratos (EPFL) -- Toronto |
15:00 - 15:30 | Break |
||
15:30 - 17:30 | Session 13: Privacy Session Chair: L. Jean Camp -- Regency C |
Session 14: Designing Secure Systems Session Chair: Radu Sion (Stony Brook) -- Regency D |
|
18:00 - 21:00 | Conference Banquet & Social Event | ||
Thursday, November 12, 2009, Main Conference | |||
8:30 - 10:00 | Session 15: Attack II Session Chair: J. Alex Halderman (U. of Michigan) -- Regency C |
Session 16: Anonymization Session Chair: Apu Kapadia (Indiana University) -- Regency D |
|
10:00 - 10:30 | Break |
||
10:30 - 12:00 | Session 17: System Security Session Chair: Mihai Christodorescu (IBM) -- Regency C |
Session 18: Malware and Bots Session Chair: Weidong Cui (Microsoft) -- Regency D |
|
Friday, November 13, 2009, Post-Conference Full Day Workshops | |||
8:30 - 17:00 | Workshop Cloud Computing Security -- Tornoto |
||
Workshop on Digital Identity Management -- New Orleans |
|||
Workshop on Scalable Trusted Computing --Atlanata |
|||
Workshop on Secure Web Services --Hong Kong |
|||
9:00 - 12:00 | Tutorial 5: "WebAppSec.php: Developing Secure Web Applications", Mr. Robert Zakon (Consultant) --Regency C |
Detailed Program
Tuesday, November 10, 2009
08:00 - 08:30 | Registration |
08:30 - 09:00 | Welcoming Remarks |
09:00 - 10:00 | Keynote Talk: Prof. DOROTHY E. DENNING |
10:15 - 10:30 | Coffee-break |
10:30 - 12:00 | Session 1: Attacks I Session chair: Patrick McDaniel (Penn State) |
Attacking Cryptographic Schemes Based on "Perturbation Polynomials" Filter-resistant code injection on ARM False Data Injection Attacks against State Estimation in Electric Power Grids |
|
Session 2: Applied Cryptography Session chair: Hovav Shacham |
|
Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants Improving Privacy and Security in Multi-Authority Attribute-Based Encryption Oblivious Transfer with Access Control |
|
12:00 - 13:30 | Lunch |
13:30 - 15:00 | Session 3: RFID Session chair: Patrick Traynor (Georgia Tech) |
EPC RFID Tag Security Weaknesses and Defenses: Passport Cards, Enhanced Drivers Licenses, and Beyond An Efficient Forward-Private RFID Protocol RFID Privacy: Relation Between Two Notions, Minimal Condition, and Efficient Construction |
|
Session 4: Anonymization Networks Session chair: George Danezis (Microsoft) |
|
NISAN: Network Information Service for Anonymization Networks Certificateless Onion Routing ShadowWalker: Peer-to-peer Anonymous Communication using Redundant Structured Topologies |
|
Tutorial 2: An introduction to usable security |
|
15:00 - 15:30 | Coffee-break |
15:30 - 17:30 | Session 5: Formal Techniques Session chair: Cedric Fournet (Microsoft) |
CoSP: A general framework for computational soundness proofs -- or -- The computational soundness of the applied pi-calculus Reactive Noninterference Computational Soundness for Key Exchange Protocols with Symmetric Encryption A Probabilistic Approach to Hybrid Role Mining |
|
Session 6: Cloud Security Session chair: Tadayoshi Kohno (U. of Washington) |
|
Ripley: Automatically Securing Web 2.0 Applications Through Replicated Execution HAIL: A High-Availability and Integrity Layer for Cloud Storage Hey, You, Get Off My Cloud! Exploring Information Leakage in Third- Party Compute Clouds Dynamic Provable Data Possession |
|
Tutorial 3: Security Risk Analysis of Computer Networks: Techniques and Challenge |
Wednesday, November 11, 2009
08:00 - 08:30 | Registration |
8:30 - 10:00 | Session 7: Security of Mobile Services Session chair: Kosta Beznosov (U. of British Columbia) |
On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core On Lightweight Mobile Phone Application Certification SMILE: Encounter-Based Trust for Mobile Social Services |
|
Session 8: Anonymization Techniques Session chair: Sven Dietrich (Stevens Tech) |
|
The Bayesian Traffic Analysis of Mix Networks AS-awareness in Tor Path Selection Membership-concealing overlay networks |
|
10:30 - 12:00 | Session 9: Software Security using Behavior Session chair: Jon Giffin (Georgia Tech) |
Battle of Botcraft: Fighting Bots in Online Games with Human Observational Proofs Fides: Remote Anomaly-Based Cheat Detection Using Client Emulation Behavior Based Software Theft Detection |
|
Session 10: Embedded and Mobile Devices Session chair: Paul Van Ooorschot (Carleton) |
|
On the Difficulty of Software-Based Attestation of Embedded Devices Proximity-based Access Control for Implantable Medical Devices Cross Channel Scripting and its Impact on Embedded Web Interfaces |
|
12:00 - 13:30 | Lunch |
13:30 - 15:00 | Session 11: Systems and Networks
Session chair: Cristina Nita-Rotaru (Purdue) |
The Fable of the Bees: Incentivizing Robust Revocation Decision Making in Ad Hoc Networks Efficient Implementation of the Cell Broadband Engine(TM) Isolation Loader On Achieving Good Operating Points on an ROC Plane using Stochastic Anomaly Score Prediction |
|
Session 12: Techniques for Ensuring Software Security
Session chair: V.N. Venkatakrishnan (U. of Illinois, Chicago) |
|
A Security-Preserving Compiler for Distributed Programs Finding bugs in exceptional situations of JNI programs Secure Open Source Collaboration: An Empirical Study of Linus' Law |
|
Tutorial 4: Securing Wireless Systems |
|
15:00 - 15:30 | Coffee-break |
15:30 - 17:30 | Session 13: Privacy Session chair: L. Jean Camp |
On Non-Cooperative Location Privacy: A Game-Theoretic Analysis Privacy-Preserving Genomic Computation Through Program Specialization Feeling-based Location Privacy Protection for Location-based Services Multi-party Off-the-Record Messaging |
|
Session 14: Designing Secure Systems
Session chair: Radu Sion (Stony Brook) |
|
On Voting Machine Design for Verification and Testability Secure In-VM Monitoring Using Hardware Virtualization A Calculus Approach to Secure Information Sharing Multiple Password Interference in Text Passwords and Click-Based Graphical Passwords |
|
18:30 - 21:30 | Gala Dinner |