Conference Program

Program Overview

Hotel Maps: Map1 , Map2 .

Monday, November 9, 2009, Pre-Conference Full Day Workshops and Welcome Reception
8:30 - 17:00
Workshop on Assurable and Usable Security Configuration -- Tornoto
Workshop on Digital Rights Management -- New Orleans
Workshop on Virtual Machine Security -- Atlanta
Workshop on Security and Artificial Intelligence -- Wrigely
Workshop on Secure Execution of Untrusted Code -- Atlanta
Workshop on Privacy in the Electronic Society -- Water Tower
2:00 - 17:30 Tutorial 1: "Cyber Security For The Power Grid", Mel Gehrs (Gehrs Consulting), Himanshu Khurana (UIUC), Andrew Wright (N-Dimension Solutions) -- Regency C
18:00 - 19:30 Happy Hour & Poster Session I(Toronto & Hong Kong) -- Regency Foyer
 
Tuesday, November 10, 2009, Main Conference
8:30 - 9:00 Welcoming remarks -- Regency CD
9:00 - 10:00 Keynote talk: Prof. DOROTHY E. DENNING -- Regency CD
Session Chair:
10:00 - 10:30
Break
10:30 - 12:00 Session 1 : Attacks I
Session Chair: Patrick McDaniel (Penn State) -- Regency C
Session 2: Applied Cryptography
Session Chair: Hovav Shacham -- Regency D
12:00 - 13:30
Lunch --Regency A-B
13:30 - 15:00 Session 3: RFID
Session Chair: Patrick Traynor (Georgia Tech) -- Regency C
Session 4: Anonymization Networks
Session Chair: George Danezis (Microsoft) -- Regency D
Tutorial 2: An introduction to usable security
Jeff Yan (Newcastle University) -- Toronto
15:00 - 15:30
Break
15:30 - 17:30 Session 5: Formal Techniques
Session Chair: Cedric Fournet (Microsoft) -- Regency C
Session 6: Cloud Security
Session Chair: Tadayoshi Kohno (U. of Washington) -- Regency D
Tutorial 3: Security Risk Analysis of Computer Networks: Techniques and Challenge
Anoop Singhal (NIST) and Xinming Ou (Kansas State University) -- Toronto
18:00 - 20:30 Conference Reception & Poster Session II (Columbus G-L)
20:00 - 22:30 OC Meeting
 
Wednesday, November 11, 2009, Main Conference
8:30 - 10:00 Session 7: Security of Mobile Services
Session Chair: Kosta Beznosov (U. of British Columbia) -- Regency C
Session 8: Anonymization Techniques
Session Chair: Sven Dietrich (Stevens Tech) -- Regency D
10:00 - 10:30
Break
10:30 - 12:00 Session 9: Software Security using Behavior
Session Chair: Jon Giffin (Georgia Tech) -- Regency C
Session 10: Embedded and Mobile Devices
Session Chair: Paul Van Ooorschot (Carleton) -- Regency D
12:00 - 13:30
Lunch -- Regency A-B
13:30 - 15:00 Session 11: Systems and Networks
Session Chair: Cristina Nita-Rotaru (Purdue) -- Regency C
Session 12: Techniques for Ensuring Software Security
Session Chair: V.N. Venkatakrishnan (U. of Illinois, Chicago) -- Regency D
Tutorial 4: Securing Wireless Systems, Panos Papadimitratos (EPFL) -- Toronto
15:00 - 15:30
Break
15:30 - 17:30 Session 13: Privacy
Session Chair: L. Jean Camp -- Regency C
Session 14: Designing Secure Systems
Session Chair: Radu Sion (Stony Brook) -- Regency D
18:00 - 21:00 Conference Banquet & Social Event
 
Thursday, November 12, 2009, Main Conference
8:30 - 10:00 Session 15: Attack II
Session Chair: J. Alex Halderman (U. of Michigan) -- Regency C
Session 16: Anonymization
Session Chair: Apu Kapadia (Indiana University) -- Regency D
10:00 - 10:30
Break
10:30 - 12:00 Session 17: System Security
Session Chair: Mihai Christodorescu (IBM) -- Regency C
Session 18: Malware and Bots
Session Chair: Weidong Cui (Microsoft) -- Regency D
     
Friday, November 13, 2009, Post-Conference Full Day Workshops
8:30 - 17:00
 
9:00 - 12:00 Tutorial 5: "WebAppSec.php: Developing Secure Web Applications", Mr. Robert Zakon (Consultant) --Regency C

Detailed Program

Tuesday, November 10, 2009

08:00 - 08:30 Registration
08:30 - 09:00 Welcoming Remarks
09:00 - 10:00 Keynote Talk: Prof. DOROTHY E. DENNING
10:15 - 10:30 Coffee-break
10:30 - 12:00 Session 1: Attacks I
Session chair:
Patrick McDaniel (Penn State)

Attacking Cryptographic Schemes Based on "Perturbation Polynomials"
Martin Albrecht, Craig Gentry, Shai Halevi and Jonathan Katz

Filter-resistant code injection on ARM
Yves Younan, Pieter Philippaerts, Frank Piessens, Sven Lachmund and Thomas Walter

False Data Injection Attacks against State Estimation in Electric Power Grids
Yao Liu, Peng Ning and Michael Reiter

Session 2: Applied Cryptography
Session chair: Hovav Shacham

Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants
Allison B. Lewko and Brent Waters

Improving Privacy and Security in Multi-Authority Attribute-Based Encryption
Melissa Chase and Sherman S.M. Chow

Oblivious Transfer with Access Control
Jan Camenisch, Maria Dubovitskaya and Gregory Neven

12:00 - 13:30 Lunch
13:30 - 15:00 Session 3: RFID
Session chair: Patrick Traynor (Georgia Tech)

EPC RFID Tag Security Weaknesses and Defenses: Passport Cards, Enhanced Drivers Licenses, and Beyond
Karl Koscher, Ari Juels, Tadayoshi Kohno and Vjekoslav Brajkovic

An Efficient Forward-Private RFID Protocol
Olivier Billet, Jonathan Etrog and Henri Gilbert

RFID Privacy: Relation Between Two Notions, Minimal Condition, and Efficient Construction
Changshe Ma, Yingjiu Li, Robert Deng and Tieyan Li

Session 4: Anonymization Networks
Session chair: George Danezis (Microsoft)

NISAN: Network Information Service for Anonymization Networks
Andriy Panchenko, Arne Rache and Stefan Richter

Certificateless Onion Routing
Dario Catalano, Dario Fiore and Rosario Gennaro

ShadowWalker: Peer-to-peer Anonymous Communication using Redundant Structured Topologies
Prateek Mittal and Nikita Borisov

Tutorial 2: An introduction to usable security
15:00 - 15:30 Coffee-break
15:30 - 17:30 Session 5: Formal Techniques
Session chair: Cedric Fournet (Microsoft)

CoSP: A general framework for computational soundness proofs -- or -- The computational soundness of the applied pi-calculus
Michael Backes, Dennis Hofheinz and Dominique Unruh

Reactive Noninterference
Aaron Bohannon, Benjamin Pierce, Vilhelm Sjöberg, Stephanie Weirich and Steve Zdancewic

Computational Soundness for Key Exchange Protocols with Symmetric Encryption
Ralf Kuesters and Max Tuengerthal

A Probabilistic Approach to Hybrid Role Mining
Mario Frank, Andreas P. Streich, David Basin and Joachim M. Buhmann

Session 6: Cloud Security
Session chair: Tadayoshi Kohno (U. of Washington)

Ripley: Automatically Securing Web 2.0 Applications Through Replicated Execution
K Vikram, Abhishek Prateek and Benjamin Livshits

HAIL: A High-Availability and Integrity Layer for Cloud Storage
Kevin Bowers, Ari Juels and Alina Oprea

Hey, You, Get Off My Cloud! Exploring Information Leakage in Third- Party Compute Clouds
Thomas Ristenpart, Eran Tromer, Hovav Shacham and Stefan Savage

Dynamic Provable Data Possession
Chris Erway, Charalampos Papamanthou, Alptekin Kupcu and Roberto Tamassia

Tutorial 3: Security Risk Analysis of Computer Networks: Techniques and Challenge

Wednesday, November 11, 2009

08:00 - 08:30 Registration
8:30 - 10:00 Session 7: Security of Mobile Services
Session chair: Kosta Beznosov (U. of British Columbia)

On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core
Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Thomas La Porta and Patrick McDaniel

On Lightweight Mobile Phone Application Certification
William Enck, Machigar Ongtang and Patrick McDaniel

SMILE: Encounter-Based Trust for Mobile Social Services
Justin Manweiler, Ryan Scudellari and Landon P. Cox

Session 8: Anonymization Techniques
Session chair: Sven Dietrich (Stevens Tech)

The Bayesian Traffic Analysis of Mix Networks
Carmela Troncoso and George Danezis

AS-awareness in Tor Path Selection
Matthew Edman and Paul Syversonk

Membership-concealing overlay networks
Eugene Vasserman, Rob Jansen, James Tyra, Nicholas Hopper and Yongdae Kim

10:30 - 12:00 Session 9: Software Security using Behavior
Session chair: Jon Giffin (Georgia Tech)

Battle of Botcraft: Fighting Bots in Online Games with Human Observational Proofs
Steven Gianvecchio, Zhenyu Wu, Mengjun Xie and Haining Wang

Fides: Remote Anomaly-Based Cheat Detection Using Client Emulation
Edward Kaiser, Wu-chang Feng and Travis Schluessler

Behavior Based Software Theft Detection
Xinran wang, Yoon-Chan Jhi, Sencun Zhu and Peng Liu

Session 10: Embedded and Mobile Devices
Session chair: Paul Van Ooorschot (Carleton)

On the Difficulty of Software-Based Attestation of Embedded Devices
Claude Castelluccia, Aurélien Francillon, Daniele Perito and Claudio Soriente

Proximity-based Access Control for Implantable Medical Devices
Kasper Bonne Rasmussen, Claude Castelluccia, Thomas S. Heydt- Benjamin and Srdjan Capkun

Cross Channel Scripting and its Impact on Embedded Web Interfaces
Hristo Bojinov and Elie Bursztein and Dan Boneh

12:00 - 13:30 Lunch
13:30 - 15:00 Session 11: Systems and Networks
Session chair: Cristina Nita-Rotaru (Purdue)

The Fable of the Bees: Incentivizing Robust Revocation Decision Making in Ad Hoc Networks
Steffen Reidt, Mudhakar Srivatsa and Shane Balfe

Efficient Implementation of the Cell Broadband Engine(TM) Isolation Loader
Masana Murase, Wilfred Plouffe, Masaharu Sakamoto and Kanna Shimizu

On Achieving Good Operating Points on an ROC Plane using Stochastic Anomaly Score Prediction
Muhammad Qasim Ali, Hassan Khan, Ali Sajjad and Syed Ali Khayam

Session 12: Techniques for Ensuring Software Security
Session chair: V.N. Venkatakrishnan (U. of Illinois, Chicago)

A Security-Preserving Compiler for Distributed Programs
Cedric Fournet, Gurvan Le Guernic and Tamara Rezk

Finding bugs in exceptional situations of JNI programs
Siliang Li and Gang Tan

Secure Open Source Collaboration: An Empirical Study of Linus' Law
Andrew Meneely and Laurie Williams

Tutorial 4: Securing Wireless Systems
15:00 - 15:30 Coffee-break
15:30 - 17:30 Session 13: Privacy
Session chair: L. Jean Camp

On Non-Cooperative Location Privacy: A Game-Theoretic Analysis
Julien Freudiger, Mohammad Hossein Manshaei, Jean-Pierre Hubaux and David Parkes

Privacy-Preserving Genomic Computation Through Program Specialization
Rui Wang, XiaoFeng Wang, Zhou Li, Haixu Tang, Michael Reiter and Zheng Dong

Feeling-based Location Privacy Protection for Location-based Services
Toby Xu and Ying Cai

Multi-party Off-the-Record Messaging
Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy and Hao Chen

Session 14: Designing Secure Systems
Session chair: Radu Sion (Stony Brook)

On Voting Machine Design for Verification and Testability
Cynthia Sturton, Susmit Jha, David Wagner and Sanjit Seshia

Secure In-VM Monitoring Using Hardware Virtualization
Monirul Sharif, Wenke Lee, Weidong Cui and Andrea Lanzi

A Calculus Approach to Secure Information Sharing
Mudhakar Srivatsa

Multiple Password Interference in Text Passwords and Click-Based Graphical Passwords
Sonia Chiasson, Alain Forget, Elizabeth Stobert, Paul van Oorschot and Robert Biddle

18:30 - 21:30 Gala Dinner

Thursday, November 12, 2009

08:00 - 08:30 Registration
08:30 - 10:00 Session 15: Attacks II
Session chair: J. Alex Halderman (U. of Michigan)

Can They Hear Me Now? A Security Analysis of Law Enforcement Wiretaps
Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark, and Matt Blaze

English Shellcode
Joshua Mason, Sam Small, Fabian Monrose and Greg MacManus

Learning Your Identity and Disease from Research Papers: Information Leaks in Genome Wide Association Study
Rui Wang, Yong Li, XiaoFeng Wang, Haixu Tang and Xiaoyong Zhou

Session 16: Anonymization
Session chair: Apu Kapadia (Indiana University)

A New Cell Counter Based Attack Against Tor
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan and Weijia Jia

Scalable Onion Routing with Torsk
Jon McLachlan, Andrew Tran, Nicholas Hopper and Yongdae Kim

Anonymous Credentials on a Standard JavaCard
Patrik Bichsel, Jan Camenisch, Thomas Gross and Victor Shoup.

10:00 - 10:30 Coffee-break
10:30 - 12:00 Session 17: System Security
Session chair: Mihai Christodorescu (IBM)

Countering Kernel Rootkits with Lightweight Hook Protection
Zhi Wang, Xuxian Jiang, Weidong Cui and Peng Ning

Mapping Kernel Objects to Enable Systematic Integrity Checking
Martim Carbone, Weidong Cui, Long Lu, Wenke Lee, Marcus Peinado and Xuxian Jiang

Robust Signatures for Kernel Data Structures
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick Traynor and Jonathon Giffin

Session 18: Malware and Bots
Session chair: Weidong Cui (Microsoft)

Large-Scale Malware Indexing Using Function-Call Graphs
Xin Hu, Tzi-cker Chiueh and Kang G. Shin

Dispatcher: Enabling Active Botnet Infiltration using Automatic Protocol Reverse-engineering
Juan Caballero, Pongsin Poosankam, Christian Kreibich and Dawn Song

Your Botnet is My Botnet: Analysis of a Botnet Takeover
Brett Stone-Gross, Marco Cova, Bob Gilbert, Lorenzo Cavallaro, Christopher Kruegel, Giovanni Vigna and Richard Kemmerer