Conference Program
Program Overview
Hotel Maps: Map1 , Map2 , Silver Level, Blue Level, Green Level, Bronze Level.
Monday, October 4, 2010, Pre-Conference Full Day Workshops and Welcome Reception | |||
7:30 - 8:30 |
Continental Breakfast -- Third level hallway | ||
8:30 - 17:00 |
Workshop on Assurable and Usable Security Configuration -- MCCORMIC | ||
Workshop on Digital Rights Management -- WRIGHT | |||
Workshop on Privacy in the Electronic Society -- FIELD | |||
Workshop on Scalable Trusted Computing -- BURNHAM | |||
18:00 - 19:30 | Happy Hour -- TRUFFLES | ||
Tuesday, October 5, 2010, Main Conference | |||
7:30 - 8:30 |
Continental Breakfast | ||
8:30 - 9:00 | Welcoming remarks -- | ||
9:00 - 10:00 | Keynote talk: Dr. Jon Millen -- Crystal A, B and C Session Chair: Vitaly Shmatikov |
||
10:00 - 10:30 | Break |
||
10:30 - 12:00 | Session 1A : Security Analysis Session Chair: XiaoFeng Wang (IU) -- Crystal A |
Session 1B : System Security Session Chair: Angelos Stavro (GMU) -- Crystal C |
|
12:00 - 13:30 | Lunch -- Crystal B |
||
13:30 - 15:30 | Session 2A: Wireless and Phone Security Session Chair: Fabian Monrose -- Crystal A |
Session 2B: Applied Cryptography I Session Chair: Nikita Borisov -- Crystal C |
|
15:30 - 16:00 | Break |
||
16:00 - 17:30 | Tutorial 1: Role Engineering (Crystal A) Ian Molloy (IBM T.J. Watson Research), Mario Frank (Swiss Federal Institute of Technology (ETH) |
Tutorial 2: Security Risk Analysis of Computer Networks:
Techniques and Challenge (Crystal C) Anoop Singhal (NIST) and Xinming Ou (Kansas State University) |
|
18:00 - 20:30 | Conference Reception & Poster Session -- Crystal B and Foyer | ||
19:30 - 22:30 | OC Meeting (TBD) | ||
Wednesday, October 6, 2010, Main Conference | |||
7:30 - 8:30 |
Continental Breakfast | ||
8:30 - 10:00 | Session 3A: Passwords and Captchas Session Chair: George Danezis -- Cyrstal A |
Session 3B: SandBoxing Session Chair: Engin Kirda -- Crystal C |
|
10:00 - 10:30 | Break |
||
10:30 - 12:00 | Session 4A: Attacks on Secure Hardware Session Chair: J. Alex Halderman -- Crystal A |
Session 4B: Information Flow Session Chair: Emery Berger -- Crystal C |
|
12:00 - 13:30 | Lunch -- Crystal B |
||
13:30 - 15:30 | Session 5A: Anonymity Networks Session Chair: Roger Dingledine -- Crystal A |
Session 5B: Formal Methods Session Chair: Ralf Kuesters -- Crystal C |
|
15:30 - 16:00 | Break |
||
16:00 - 18:00 | Session 6A: Malware Session Chair: Thomas Reps -- Crystal A |
Session 6B: Applied Cryptography II Session Chair: Jonathan Trostle -- Crystal C |
|
18:30 - 21:30 | Conference Banquet & Social Event | ||
Thursday, October 7, 2010, Main Conference | |||
7:30 - 8:30 |
Continental Breakfast | ||
8:00 - 10:00 | Session 7: Cryptographic Protocols Session Chair: Steve Myers -- Crystal A |
||
8:30 - 10:00 | Tutorial 3: Cloud Computing Security -- Dongwan Shin (New Mexico Tech), Bill Claycomb, Vincent Urias (Sandia National Lab) -- Crystal C | ||
10:00 - 10:30 | Break |
||
10:30 - 12:30 | Session 8: Memory Safety and Binary Code Session Chair: Ulfar Erlingsson -- Crystal A |
||
10:30 - 12:00 | Tutorial 3 (Continuation): Cloud Computing Security -- Dongwan Shin (New Mexico Tech), Bill Claycomb, Vincent Urias (Sandia National Lab) -- Crystal C | ||
12:00 - 13:30 | Lunch -- Crystal B |
||
13:30 - 15:30 | Session 9: Web Security Session Chair: Mihai Christodorescu (IBM) -- Crystal A |
||
13:30 - 15:00 | Tutorial 4: Formal Methods For Safe Configuration of Cyberinfrastructure -- Sanjai Narain (Telcordia Technologies) and Ehab Al Shaer (UNC Charlotte) -- Crystal C | ||
15:00 - 15:30 | Break |
||
15:30 - 17:30 | Tutorial 4 (Continuation): Formal Methods For Safe Configuration of Cyberinfrastructure -- Sanjai Narain (Telcordia Technologies) and Ehab Al Shaer (UNC Charlotte) -- Crystal C | ||
Friday, October 8, 2010, Post-Conference Full Day Workshops | |||
7:30 - 8:30 |
Continental Breakfast -- COMISKEY | ||
8:30 - 17:00 | Workshop Cloud Computing Security -- Acapulco |
||
Workshop on Digital Identity Management -- Soldier Field |
|||
Workshop on Insider Threats -- Buckingham |
|||
Workshop on Artificial Intelligence and Security -- Columbian |
|||
13:30 - 16:30 | Tutorial 5: "Web Application Security", Robert Zakon (Zakon Group LLC) -- PICASSO |
Detailed Program :
Tuesday, October 5, 2010
08:00 - 08:30 | Registration |
08:30 - 09:00 | Welcoming Remarks |
09:00 - 10:00 | Keynote Talk: Jon Millen Session chair: Vitaly Shmatikov |
10:00 - 10:30 | Coffee-break |
10:30 - 12:00 | Session 1A: Security Analysis Session chair: XiaoFeng Wang (IU) |
Security Analysis of India's Electronic Voting Machines Dissecting One Click Frauds @spam: The Underground on 140 Characters or Less |
|
Session 1B: System Security Session chair: Angelos Stavrou |
|
HyperSentry: Enabling Stealthy In-context Measurement of Hypervisor Integrity Trail of Bytes: Efficient Support for Forensic Analysis Survivable Key Compromise in Software Update Systems |
|
12:00 - 13:30 | Lunch |
13:30 - 15:30 | Session 2A: Wireless and Phone Security Session chair: Fabian Monrose |
A Methodology for Empirical Analysis of the Permission-Based Security Models and its Application to Android Mobile Location Tracking in Metropolitan Areas: malnets and others On Pairing Constrained Wireless Devices Based on Secrecy of Auxiliary Channels: The Case of Acoustic Eavesdropping PinDr0p: Using Single-Ended Audio Features to Determine Call Provenance |
|
Session 2B: Applied Cryptography I Session chair: Nikita Borisov |
|
Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade Practical Leakage-Resilient Pseudorandom Generators Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions |
|
15:30 - 16:00 | Coffee-break |
16:00 - 17:30 | Tutorials: |
Tutorial 1: Role Engineering |
|
Tutorial 2: Security Risk Analysis of Computer Networks: Techniques and Challenge |
Wednesday, October 6, 2010
Thursday, October 7, 2010
08:00 - 08:30 | Registration |
08:00 - 10:00 | Session 7: Cryptographic Protocols Session chair: Steve Myers |
On the (In)Security of IPsec in MAC-then-Encrypt Configurations On the Soundness of Authenticate-then-Encrypt: Formalizing the Malleability of Symmetric Encryption A New Framework for Efficient Password-Based Authenticated Key Exchange Accountability: Definition and Relationship to Verifiability |
|
08:30 - 10:00 | Tutorial 3: Cloud Computing Security -- Dongwan Shin (New Mexico Tech), Bill Claycomb, Vincent Urias (Sandia National Lab) |
10:00 - 10:30 | Coffee-break |
10:30 - 12:00 | Session 8: Memory Safety and Binary Code Session chair: Ulfar Erlingsson |
Mimimorphism: A New Approach to Binary Code Obfuscation Platform-Independent Program Return-Oriented Programming Without Returns DieHarder: Securing the Heap |
|
10:30 - 12:00 | Tutorial 3: Cloud Computing Security -- Dongwan Shin (New Mexico Tech), Bill Claycomb, Vincent Urias (Sandia National Lab) |
12:00 - 13:30 | Lunch |
13:30 - 15:30 | Session 9: Web Security Session chair: Mihai Christodorescu (IBM) |
Symbolic Security Analysis of Ruby-on-Rails Web Applications Sidebuster: Automated Detection and Quantification of Side-Channel Leaks in Web Application Development NoTamper: Automated Blackbox Detection of Parameter Tampering Opportunities in Web Applications Protecting Browsers from Cross-Origin CSS Attacks |
|
13:30 - 17:30 | Tutorial 4: Formal Methods For Safe Configuration of Cyberinfrastructure |