Research Track Program
[Conference Program |
Industry Program |
Tutorials]
Tuesday, October 31
Keynote Talk (9:30 -- 10:30)
Session Chair: Rebecca Wright
Keynote Speaker: Peter G. Neumann
Title: System and Network Trustworthiness in Perspective
Session 1: Anonymity (11:00 -- 12:30)
Session Chair: Vijay Atluri
- Providing Witness Anonymity in Peer-to-Peer Systems.
Bo Zhu, Sanjeev Setia, and Shushil Jajodia
- Salsa: A Structured Approach to Large-Scale Anonymity.
Arjun Nambiar and Matthew Wright
- Hot or Not: Revealing Hidden Services by their Clock Skew.
Steven J. Murdoch
Session 2: Intrusion Detection (14:00 -- 15:30)
Session Chair: Eiji Okamoto
- Packet Vaccine: Black-box Exploit Detection and Signature Generation
XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, and Jong Youl Choi
- Protomatching Network Traffic for High Throughput Network Intrusion Detection.
Shai Rubin, Somesh Jha, and Barton P. Miller
- Evading Network Anomaly Detection Systems: Formal Reasoning and Practical Techniques.
Prahlad Fogla and Wenke Lee
Session 3: Data Protection (16:00 -- 18:00)
Session Chair: Ninghui Li
- Data Collection With Self-Enforcing Privacy.
Philippe Golle, Frank McSherry, and Ilya Mironov
- Searchable Symmetric Encryption: Improved Definitions and
Efficient Constructions.
Reza Curtmola, Juan Garay, Seny Kamara, and Rafail Ostrovsky
- Attribute-Based Encryption for Fine-Grained Access Control
of Encrypted Data.
Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters
- Secure Attribute-Based Systems.
Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Brent Waters
Wednesday, November 1
Session 4: Access Control (8:30 -- 10:30)
Session Chair: Reiner Sailer
- Resiliency Policies in Access Control.
Ninghui Li, Mahesh V. Tripunitara, and Qihua Wang
- Safety and Consistency in Policy-Based Authorization Systems.
Adam J. Lee and Marianne Winslett
- On the Modeling and Analysis of Obligations.
Keith Irwin, Ting Yu, and William H. Winsborough
- RoleMiner: Mining Roles using Subset Enumeration.
Jaideep Vaidya, Vijayalakshmi Atluri, and Janice Warner
Session 5: Privacy and Authentication (11:00 -- 12:30)
Session Chair: Rei Safavi-Naini
- Doppelganger: Better Browser Privacy Without the Bother.
Umesh Shankar and Chris Karlof
- Fourth-Factor Authentication: Somebody You Know.
John Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, and Moti Yung
- An Effective Defense Against Email Spam Laundering.
Mengjun Xie, Heng Yin, and Haining Wang
Session 6: Applied Cryptography 1 (14:00 -- 15:30)
Session Chair: Michael Backes
- Forward Secure Signatures with Untrusted Update.
Xavier Boyen, Hovav Shacham, Emily Shen, and Brent Waters
- How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication.
Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, and Mira Meyerovich
- A Fully Collusion Resistant Broadcast, Trace, and Revoke System.
Dan Boneh and Brent Waters
Session 7: Attacks and Cryptanalysis (16:00 -- 18:00)
Session Chair: Poovi Vora
- Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure.
V. T. Lam, S. Antonatos, P. Akritidis, and K. G. Anagnostakis
- A Natural Language Approach to Automated Cryptanalysis of Two-time Pads.
Joshua Mason, Kathryn Watkins, Jason Eisner, and Adam Stubblefield
- Dictionary Attacks Using Keyboard Acoustic Emanations.
Yigael Berger, Avishai Wool, and Arie Yeredor
- Inferring the Source of Encrypted HTTP Connections.
Marc Liberatore and Brian Neil Levine
Thursday, November 2
Session 8: Sensors and Networking (8:30 -- 10:30)
Session Chair: Brian Levine
- TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks.
Kun Sun, Peng Ning, Cliff Wang, An Liu, and Yuzheng Zhou
- Secure Hierarchical In-Network Aggregation in Sensor Networks.
Haowen Chan, Adrian Perrig, and Dawn Song
- Provably-Secure Time-Bound Hierarchical Key Assignment Schemes.
Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci
- Optimizing BGP Security by Exploiting Path Stability.
William Aiello, Kevin Butler, and Patrick McDaniel
Session 9: Software and Network Exploits (11:00 -- 12:30)
Session Chair: Sabrina De Capitani di Vimercati
- Replayer: Automatic Protocol Replay by Binary Analysis.
James Newsome, David Brumley, Jason Franklin, and Dawn Song
- EXE: A System for Automatically Generating Inputs of Death Using Symbolic Execution.
Cristian Cadar, Vijay Ganesh, Peter Pawlowski, David Dill, and Dawson Engler
- A Scalable Approach to Attack Graph Generation.
Xinming Ou, Wayne F. Boyer, and Miles A. McQueen
Session 10: Formal Methods (14:00 -- 15:30)
Session Chair: Ting Yu
- Formal Specification and Verification of Data Separation in a
Separation Kernel for an Embedded System.
Constance Heitmeyer, Myla Archer, Elizabeth Leonard, and John McLean
- Beyond Separation of Duty: An Algebra for Specifying High-level Security Policies.
Ninghui Li and Qihua Wang
- Computationally Sound Secrecy Proofs by Mechanized Flow Analysis.
Michael Backes and Peeter Laud
Session 11: Applied Cryptography 2 (16:00 -- 18:00)
Session Chair: Michael Goodrich
- Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation.
Mihir Bellare, Tadayoshi Kohno, and Victor Shoup
- Multi-Signatures in the Plain Public-Key Model and a Generalized Forking Lemma.
Mihir Bellare and Gregory Neven
- Deniable Authentication and Key Exchange.
Mario Di Raimondo, Rosario Gennaro, and Hugo Krawczyk
- Secure Function Evaluation with Ordered Binary Decision Diagrams.
Eu-Jin Goh, Louis Kruger, Somesh Jha, and Dan Boneh

