宝宝说话晚是什么原因造成的| nt检查是什么| 吃什么补充蛋白质| 3月12是什么星座| 肾炎是什么原因引起的| 后年是什么生肖| 白麝香是什么味道| hpv阳性意味着什么| 眼前发黑是什么原因| 嗓子疼可以吃什么水果| 糗事是什么意思| 护照拍照穿什么衣服| 乙肝表面抗原250是什么意思| 什么奶不能喝| tat是什么意思| 男性尿道疼痛小便刺痛吃什么药| 114是什么意思| 月经黑红色是什么原因| 都有什么大学| 左肺上叶钙化灶什么意思| 胳膊脱臼什么症状| 19属什么| 尿检阴性是什么意思| 山本耀司的品牌叫什么| 我的星座是什么| 甲醛闻多了有什么症状| 人巨细胞病毒是什么病| 肾虚是什么原因| 咳嗽去医院挂什么科| 悦是什么意思| k1什么意思| 混合痔是什么意思| 县宣传部长是什么级别| 暖和的什么| 白血病有什么症状| 眼睛干痒用什么眼药水| 法令纹上有痣代表什么| 梦见花开是什么预兆| 艾玛是什么意思啊| 从此萧郎是路人是什么意思| 谷氨酸钠是什么添加剂| bebe是什么意思| 舌头不舒服是什么原因引起的| 手脚热是什么原因| 尿常规阳性是什么意思| 为什么舌头老是有灼烧感| 一呼吸胸口疼是什么原因| 血小板有什么作用| 四维彩超和大排畸有什么区别| ellesse是什么牌子| 什么什么不已| 绿色属于五行属什么| 好吃懒做是什么生肖| 满人是什么民族| 貂蝉原名叫什么| 翡翠和玉的区别是什么| 阿莫西林不能和什么药一起吃| 晚上吃什么容易减肥| 超七水晶是什么| ihc是什么意思| 口苦吃什么中成药| 什么是本命年| 鬼冢虎属于什么档次| 皮肤角质化用什么药膏| slf是什么意思| 宠物医院需要什么资质| 骨赘形成是什么意思| 肾阳虚吃什么药| 6月27号是什么星座| 心慌挂什么科| 什么水果贵| 查血型挂什么科| 问是什么结构| 冰粉为什么要加石灰水| haze是什么意思| 消肿吃什么食物好| 钢琴8级什么水平| 铁为什么会生锈| 阴平阳秘是什么意思| 都有什么菜好吃| 有什么好看的三级片| 金字旁成是什么字| 什么是iga肾病| 肉桂是什么味道| 自理是什么意思| 拉肚子拉稀水吃什么药| 黑魔鬼烟为什么是禁烟| 山竹什么时候吃是应季| 诸侯国是什么意思| 阴虚体质是什么症状| 血热吃什么药可以凉血| 减肥不能吃什么水果| 儿童节吃什么| 93年属什么的生肖| 经常感冒吃什么提高免疫力| 腹胀是什么病的前兆| 多巴胺是什么意思| 夏天中暑吃什么药| 恶寒发热是什么意思| 第二次世界大战是什么时候| hpa是什么单位| 什么是前奶什么是后奶| 银镯子变黑是什么原因| 非特异性t波异常是什么意思| 血压高是什么引起的| 脾胃挂什么科| 俄罗斯乌克兰为什么打仗| 为什么会偏头痛| 中性粒细胞是什么| 耳朵疼什么原因| 兰花用什么土栽培最好| 怀孕子宫前位和后位有什么区别| 母亲节送妈妈什么礼物好| 心肾不交是什么意思| 箔是什么意思| 爱爱是什么意思| 前列腺炎什么症状| 安睡裤是什么| 神经元特异性烯醇化酶是什么意思| 胆囊结石用什么药好| 乌龟一般吃什么东西| 吃什么都吐是什么原因| 泸沽湖在什么地方| 什么是烤瓷牙| 魏丑夫和芈月什么关系| 喜欢吃酸的是什么原因| plus是什么意思| 6月17号是什么星座| 马是什么牌子的车| 备孕喝豆浆有什么好处| 5月10日什么星座| etf什么意思| 尿潜血阴性什么意思| 痔疮吃什么药| 梅干菜是什么菜做的| 拉条子是什么意思| 吃完榴莲后不能吃什么| 莓茶什么人不适合喝| 放疗起什么作用| 什么烧鸡好吃| 什么是甲亢| 西沙必利片治什么病| 哪吒妈妈叫什么名字| 肩膜炎的症状是什么| 梦见自己又结婚了是什么意思| 女性hpv是什么意思| 拉红尿是什么原因| 代孕是什么意思| 银耳不能和什么一起吃| 股票洗盘是什么意思| 去除扁平疣用什么药膏| amber是什么意思| 六指是什么原因导致的| 喜悦之情溢于言表什么意思| 四风是什么| 怀孕尿液是什么颜色| 谷氨酰胺是什么| 海螺不能和什么一起吃| 跳蚤长什么样| 蛇与什么属相相克相冲| 指甲长得快说明什么| 什么发型适合自己| 回族为什么不能吃猪肉| 卫生院院长是什么级别| 四周岁打什么疫苗| 520和521的区别是什么| 8月28日什么星座| 什么是变态| 阖闾和夫差是什么关系| 白癜风有什么危害| 舂米是什么意思| 生肖鼠和什么生肖相冲| 口腔医学和口腔医学技术有什么区别| 脑梗吃什么药好| 家字是什么结构| 丹参是什么样子的图片| 宰相的宰最早指什么| 紫茉莉什么时候开花| 胸腔积液是什么原因引起的| 虾黄是虾的什么部位| 少阳病是什么意思| 狗狗咬主人意味着什么| 甲沟炎用什么药膏好| 一品诰命夫人是什么意思| 虾滑可以做什么菜| 美容美体包括什么项目| 感冒为什么会全身酸痛无力| 股癣用什么药膏好得快| 乳果糖什么时候吃效果更佳| 农历六月十九是什么星座| 鼻炎不能吃什么| 新生儿白细胞高是什么原因| 足齐念什么| 肾火吃什么药| 跖疣是什么原因造成的| 阿莫西林治什么| 泌尿内科主要看什么病| 药店属于什么行业| 鳞状上皮细胞高是什么原因| 胃气上逆是什么原因造成的| 怀孕几天后有什么反应| 肉桂跟桂皮有什么区别| 什么叫假性发烧| 什么化妆品好用哪个牌子的| 什么原因导致尿酸高| 秦始皇的原名叫什么| hrd是什么职位| 最聪明的狗是什么狗| 暴饮暴食容易得什么病| 阿莫西林是什么| 抑郁症是什么| 10月28号是什么星座| 寒是什么意思| 宁静致远是什么意思| 节度使是什么意思| hitachi是什么品牌| 喝什么有助于睡眠| 苜蓿是什么| 发呆是什么意思| 黑色是什么颜色组成的| 28岁属什么的| 荼蘼是什么意思| 女人下巴有痣代表什么| 脚上长鸡眼去医院挂什么科| 灶心土是什么| 胸口闷疼是什么原因| 敲木鱼是什么意思| 角质是什么意思| lbl是什么意思| 子宫内膜回声不均匀是什么意思| 大姨夫是什么| 金丝皇菊有什么功效| 脾胃不好吃什么调理| 肌电图是检查什么的| 痔疮什么东西不能吃| ITIB跟薇娅什么关系| 一马平川什么意思| 贝壳像什么| 晕车的人是什么体质| aimer是什么意思| 土色是什么颜色| 什么食物是养肝的| 低血压挂什么科| 了是什么词性| 小孩子手脱皮是什么原因引起的| 身上出现白块什么原因| 有核红细胞是什么意思| 甲亢吃什么食物好| 肝实质回声不均匀是什么意思| 甲流吃什么药效果最好| 胸痛应该挂什么科| 起风疹了用什么快速方法能解决| 什么补肾最好| 甘露醇是什么| 怀孕有什么特征和反应| 飞是什么结构| 贻字五行属什么| 什么叫腺肌瘤| 人体成分分析是检查什么| 什么行业最赚钱投资小| 忌口不能吃什么| 尿频去药店买什么药| 经期吃什么排污血最强| 什么是包皮| 百度
TECHNICAL SESSIONS

Technical Sessions: Wednesday, August 2 | Thursday, August 3 | Friday, August 4

Wednesday, August 2
9:00 a.m.–10:30 a.m. Wednesday
Opening Remarks, Awards, and Keynote
British

MP3 IconListen to the opening remarks in MP3 format

Keynote Address
The Current State of the War on Terrorism and What It Means for Homeland Security and Technology
Richard A. Clarke, Chairman, Good Harbor Consulting LLC

MP3 IconListen in MP3 format: Keynote | Q & A

Richard A. Clarke is an internationally recognized expert on security, including homeland security, national security, cyber security, and counterterrorism. He is currently Chairman of Good Harbor Consulting and an on-air consultant for ABC News. Clarke served the last three Presidents as a senior White House Advisor. Over the course of an unprecedented 11 consecutive years of White House service, he held the titles of Special Assistant to the President for Global Affairs, National Coordinator for Security and Counterterrorism, and Special Advisor to the President for Cyber Security. His published works include the New York Times #1 bestseller Against All Enemies and Scorpion's Gate, a novel.

10:30 a.m.–11:00 a.m.   Break
11:00 a.m.–12:30 p.m. Wednesday
REFEREED PAPERS
British

Authentication
Session Chair: Tara Whalen, Dalhousie University

A Usability Study and Critique of Two Password Managers
Sonia Chiasson, P.C. van Oorschot, and Robert Biddle, Carleton University

On the Release of CRLs in Public Key Infrastructure
Chengyu Ma, Beijing University; Nan Hu and Yingjiu Li, Singapore Management University

Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing
Lucas Ballard and Fabian Monrose, Johns Hopkins University; Daniel Lopresti, Lehigh University

INVITED TALKS
Vancouver Island

Selling Security to Software Developers: Lessons Learned While Building a Commercial Static Analysis Tool
Brian Chess, Fortify Software

MP3 IconListen in MP3 format

Over the past ten years, static analysis has undergone a rebirth in both the academic and the commercial world. At the same time, security has become a critical topic for software makers. At the confluence of these trends is a new crop of static analysis tools that identify software security bugs in source code.

This talk covers what I have learned during the process of creating and selling a commercial static analysis product. Some of the lessons about static analysis are intuitive (better analysis results lead to better sales), while some are not (when a customer says "false positive" what they mean is "result I do not like"). In addition to relating my experience with static analysis, I will take a look at the differences between software security as addressed in the academic community and as practiced by software developers in the "real world."

Brian Chess is Chief Scientist at Fortify Software. His work focuses on practical methods for creating secure systems. Brian draws on his previous research in integrated circuit test and verification to find new ways to uncover security issues before they become security disasters.

Brian received his Ph.D. in computer engineering from the University of California at Santa Cruz, where he studied the application of static analysis to the problem of finding security-relevant defects in source code. Prior to joining Fortify, Brian spent a decade in Silicon Valley working at both big and small companies and thinking about both software and hardware problems. Small companies and software problems came out on top.

12:30 p.m.–2:00 p.m.   Lunch (on your own)
2:00 p.m.-3:30 p.m. Wednesday
INVITED TALKS
Vancouver Island

Security Vulnerabilities, Exploits, and Attack Patterns: 15 Years of Art, Pseudo-Science, Fun, and Profit
Ivan Arce, Core Security Technologies

MP3 IconListen in MP3 format: Part 1 | Part 2 | Q & A

View the presentation slides

The emergence and widespread adoption of home computers in the '80s helped raise a generation of young technologists that thrived on the search for security bugs, development of exploit code, and devising convoluted attack patterns. Self-perceived as a group of modern libertarians, techno-artists, half-baked scientists, information age vandals, and savvy businessmen, this generation has often led the development of technologies and techniques that give shape to the modern information security industry. Viruses, software cracks, shellcodes, exploits, mass-rooters, worms, rootkits, and their corresponding defensive counterparts are artifacts of an attacking mindset in search of punishment (x)or legitimacy.

This talk will plunge into the depths of landmark attack technologies developed during the past 15 years and analyze them in the context of current and future information security trends.

Bring extra batteries for the rant-o-meter.

Ivan Arce is co-founder and CTO of Core Security Technologies where he sets the technical direction for the company and is responsible for overseeing the research, development, quality assurance, and deployment of all Core products. At Core, Ivan performed and led teams that perform network penetration testing, source code and binary software security analysis, vulnerability research, and development of offensive and defensive security software.

Prior to founding Core, he served as VP of Research and Development at a computer telephony integration company in Argentina where he was responsible for the development, testing, and deployment of mission-critical computer telephony applications. Previously, Arce spent 8 years as an information security consultant and software developer for banks, government agencies, and financial and telecommunications corporations.

3:30 p.m.–4:00 p.m.   Break
4:00 p.m.–5:30 p.m. Wednesday
REFEREED PAPERS
British

Attacks
Session Chair: Niels Provos, Google

How to Build a Low-Cost, Extended-Range RFID Skimmer
Ilan Kirschenbaum and Avishai Wool, Tel Aviv University

Awarded Best Student Paper!
Keyboards and Covert Channels
Gaurav Shah, Andres Molina, and Matt Blaze, University of Pennsylvania

Lessons from the Sony CD DRM Episode
J. Alex Halderman and Edward W. Felten, Princeton University

PANEL
Vancouver Island

Usable Security: Quo Vadis?
Panelists: Dirk Balfanz, PARC; Konstantin Beznosov, University of British Columbia; Paul Van Oorschot, Carleton University; Tara Whalen, Dalhousie University; Ka-Ping Yee, University of California, Berkeley

MP3 IconListen in MP3 format

View the presentation slides

There are a growing number of researchers working in the intersection of human computer interaction and security. Their goal is to make security mechanisms easier to use, and as a result improve both the security of the systems we use, and our experience when using these systems. The panelists include researchers who have worked in this field for the past several years, who will discuss their views on where this field is headed, and what's right and wrong about current research in usable security.

Technical Sessions: Wednesday, August 2 | Thursday, August 3 | Friday, August 4
Thursday, August 3
9:00 a.m.–10:30 a.m. Thursday
REFEREED PAPERS
Vancouver Island

Software
Session Chair: Anil Somayaji, Carleton University

Milk or Wine: Does Software Security Improve with Age?
Andy Ozment and Stuart E. Schechter, MIT Lincoln Laboratory

N-Variant Systems: A Secretless Framework for Security through Diversity
Benjamin Cox, David Evans, Adrian Filipi, Jonathan Rowanhill, Wei Hu, Jack Davidson, John Knight, Anh Nguyen-Tuong, and Jason Hiser, University of Virginia

Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks
Wei Xu, Sandeep Bhatkar, and R. Sekar, Stony Brook University

INVITED TALKS
British

Signaling Vulnerabilities in Law Enforcement Wiretapping Systems
Matt Blaze, University of Pennsylvania

MP3 IconListen in MP3 format: Talk | Q & A

The politics of wiretapping is a hot topic (again) lately. But how do the police actually tap telephones, anyway? How might tapping technology fail? Telephone wiretap and dialed number recording systems are used by law enforcement and national security agencies to collect critical investigative intelligence and legal evidence. This talk will examine the technology of (legal) wiretapping and show how many of these systems are vulnerable to simple, unilateral countermeasures that allow wiretap targets to prevent their call audio from being recorded and/or cause false or inaccurate dialed digits and call activity to be logged. The countermeasures exploit the unprotected in-band signals passed between the telephone network and the collection system and are effective against many of the wiretapping technologies currently used by US law enforcement, including at least some "CALEA" systems. We'll explore possible workarounds, as well as the broader implications of the security vulnerabilities in evidence collection systems.

This talk describes joint work with Micah Sherr, Eric Cronin, and Sandy Clark. A recent paper can be found (with audio) here.

10:30 a.m.–11:00 a.m.   Break
11:00 a.m.–12:30 p.m. Thursday
REFEREED PAPERS
British

Network Security
Session Chair: Trent Jaeger, Pennsylvania State University

SANE: A Protection Architecture for Enterprise Networks
Martin Casado and Tal Garfinkel, Stanford University; Aditya Akella, Carnegie Mellon University; Michael J. Freedman, Dan Boneh, and Nick McKeown, Stanford University

PHAS: A Prefix Hijack Alert System
Mohit Lad, University of California, Los Angeles; Dan Massey, Colorado State University; Dan Pei, AT&T Labs—Research; Yiguo Wu, University of California, Los Angeles; Beichuan Zhang, University of Arizona; Lixia Zhang, University of California, Los Angeles

Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting
Jason Franklin, Carnegie Mellon University; Damon McCoy, University of Colorado, Boulder; Parisa Tabriz, University of Illinois, Urbana-Champaign; Vicentiu Neagoe, University of California, Davis; Jamie Van Randwyk, Sandia National Laboratories; Douglas Sicker, University of Colorado, Boulder; Scott Shenker, University of California, Berkeley

INVITED TALKS
Vancouver Island

Turing Around the Security Problem
Crispin Cowan, Director of Software Engineering, Novell

MP3 IconListen in MP3 format

View the presentation slides

Computers have advanced so much in the 75 years of computing history that one might wonder why we still cannot make a secure computer system. Sure, it is hard, but lots of things are hard, and other computing problems fall before the onslaught of determined research. So why can't we make computers secure? This talk will examine the theoretical underpinnings of computer security, going all the way back to the original work by Alan Turing in 1932, to discover that reliably building secure software systems is actually provably impossible. We will also explore the socio-economic factors that make even building kind-of-secure systems unlikely.

Thus we are stuck with the problem of defending a perpetually vulnerable software base. We then explore the field of intrusion prevention; the art of defending systems despite latent vulnerabilities. Intrusion prevention also has a theoretical history, this time going back to Boyd, a fighter jet pilot from the 1950s. We will explain how Boyd's theories of engagement apply to modern intrusion prevention, and use this perspective to survey the range of ways that vulnerable systems can be defended, bringing us back to the modern context as we go "Turing" around the security problem.

Crispin Cowan was the CTO and founder of Immunix, Inc., recently acquired by Novell. Dr. Cowan now works as an architect for Novell with respect to security for the Linux platform and applications that Novell offers for Linux, and with particular attention to the AppArmor product that came with the Immunix acquisition. Dr. Cowan developed several host security technologies under DARPA funding, including prominent technologies like the StackGuard compiler defense against buffer overflows, and the LSM (Linux Security Modules) interface in Linux 2.6. Dr. Cowan also co-invented the "time-to-patch" method of assessing when it is safe to apply a security patch. Prior to founding Immunix, he was a professor with the Oregon Graduate Institute, Department of Computer Science and Engineering. He holds a Ph.D. from the University of Western Ontario and a Masters of Mathematics from the University of Waterloo.

12:30 p.m.–2:00 p.m.   Lunch (on your own)
2:00 p.m.–3:30 p.m. Thursday
PANEL
British

Major Security Blunders of the Past 30 Years
Panelists include: Matt Blaze, University of Pennsylvania; Virgil Gligor, University of Maryland; Peter Neumann, SRI International Computer Science Laboratory

MP3 IconListen in MP3 format

In this panel we discuss the major security blunders of the past 30 years in various computer systems and networks, as well as in security research. We examine the impact of these blunders and the lessons learned from them. A substantial amount of time will be devoted to examples of blunders provided by the audience. The panel members will include individuals who have been active in security research and development for the past three decades.

INVITED TALKS
Vancouver Island

Aspect-Oriented Programming: Radical Research in Modularity
Gregor Kiczales, Professor, Department of Computer Science, University of British Columbia

MP3 IconListen in MP3 format

View the presentation slides

Aspect-oriented programming (AOP) is based on a radical exploration of modularity in software development. By presenting new mechanisms that enable better modularization in a number of systems, AOP is driving us to ask fundamental questions about what modularity should mean in our field.

In the past, we have tended to think of modularity in terms of hierarchies of crisply defined blocks, where each block or module defines its interface with the surrounding modules. This idea seems attractive but experience tells us that it is hard to actually get the modularity of the software we build just right. Some issues are hard to code (or design) in a single module, others just don't seem to want to stay where you put them.

Work in AOP and other areas suggests a different conception of modularity, based on crosscutting structures and a more fluid notion of module boundaries.

The talk will present existing AOP techniques and the problems they solve, as well as open practical and research problems ranging from mechanisms to applications, theoretical formulations, and conceptual foundations.

Gregor Kiczales is Professor of Computer Science at the University of British Columbia. His work is directed at enabling programmers to write programs that, as much as possible, look like their design. He has pursued this goal in a number of projects, including CLOS and its metaobject protocol, open implementations of system software and middleware, and aspect-oriented programming. He led the Xerox PARC projects that developed aspect-oriented programming and AspectJ. He is author, with Danny Bobrow and Jim des Rivieres of "The Art of the Metaobject Protocol."

3:30 p.m.–4:00 p.m.   Break
4:00 p.m.–5:30 p.m. Thursday
REFEREED PAPERS
British

Static Analysis for Security
Session Chair: David Wagner, University of California, Berkeley

Static Detection of Security Vulnerabilities in Scripting Languages
Yichen Xie and Alex Aiken, Stanford University

Rule-Based Static Analysis of Network Protocol Implementations
Octavian Udrea, Cristian Lumezanu, and Jeffrey S. Foster, University of Maryland

Awarded Best Paper!
Evaluating SFI for a CISC Architecture
Stephen McCamant, Massachusetts Institute of Technology; Greg Morrisett, Harvard University

INVITED TALKS
Vancouver Island

Surviving Moore's Law: Security, AI, and Last Mover Advantage
Paul Kocher, Cryptography Research

MP3 IconListen in MP3 format

Most computer security research focuses on the pursuit of a "binary" ideal of security, such as proofs of correctness or cryptographic strength. Meanwhile, security for actual systems and networks increasingly relies on patches, rather than demonstrably strong designs. The cause: advances in complexity are causing greater harm to computer security than benefits.

Coping with this problem requires strategies designed specifically for the needs of complex systems. This talk will explore approaches that have worked and others that have failed spectacularly, while considering the long-term prospects for security.

Paul Kocher is President and Chief Scientist of Cryptography Research, where he leads a research team that specializes in applying results from cryptography and computer science to solve real-world security problems. His work includes co-authoring SSL v3.0, designing the DES Key Search machine Deep Crack, discovering Differential Power Analysis, and leading numerous security engineering projects.

6:00 p.m.–7:30 p.m. Thursday

Poster Session and Reception
Pacific Ballroom
Session Chair: Radu Sion, Stony Brook University

Would you like to share a provocative opinion, interesting preliminary work, or a cool idea that will spark discussion? The poster session is the perfect venue to introduce such new or ongoing work and receive valuable community feedback. We are particularly interested in presentations of student work. To submit a poster, please send a one-page proposal, in PDF or PostScript, to [email protected] by June 15, 2006. We will send back decisions by July 15, 2006.

Technical Sessions: Wednesday, August 2 | Thursday, August 3 | Friday, August 4
Friday, August 4
8:30 a.m.–10:30 a.m. 9:00 a.m.–10:30 a.m.
REFEREED PAPERS
British

Intrusion Detection
Session Chair: R. Sekar, Stony Brook University

SigFree: A Signature-free Buffer Overflow Attack Blocker
Xinran Wang, Chi-Chun Pan, Peng Liu, and Sencun Zhu, The Pennsylvania State University

Polymorphic Blending Attacks
Prahlad Fogla, Monirul Sharif, Roberto Perdisci, Oleg Kolesnikov, and Wenke Lee, Georgia Institute of Technology

Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection
Holger Dreger, Anja Feldmann, and Michael Mai, TU München; Vern Paxson, ICSI/LBNL; Robin Sommer, ICSI

Behavior-based Spyware Detection
Engin Kirda and Christopher Kruegel, Technical University Vienna; Greg Banks, Giovanni Vigna, and Richard A. Kemmerer, University of California, Santa Barbara

INVITED TALKS
Vancouver Island

DRM Wars: The Next Generation
Ed Felten, Princeton University

MP3 IconListen in MP3 format

Technologists, lawyers, and politicians have been fighting for years over digital rights/restrictions management (DRM) technology. This talk will survey the current state of the DRM wars and predict where they will go. How will the industry's techno-legal strategies evolve? What is the political climate for extension or reform of the DMCA and other laws and regulations? What will be the fallout from the Sony rootkit incident? Which advocacy groups are effective change agents and which are not? How will future DRM wars affect researchers, entrepreneurs, open source developers, and tinkerers? How can technologists affect the DRM wars? The talk will address these and other questions.

Edward W. Felten is a Professor of Computer Science and Public Affairs at Princeton University, and is the founding director of Princeton's Center for Information Technology Policy. His research interests include computer security and privacy, especially relating to media and consumer products, and technology law and policy. He writes a blog on these topics at freedom-to-tinker.com.

10:30 a.m.–11:00 a.m.   Break
11:00 a.m.–12:30 p.m. Friday
REFEREED PAPERS
British

System Assurance
Session Chair: Vassilis Prevelakis, Drexel University

An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data
Nick L. Petroni, Jr., and Timothy Fraser, University of Maryland; AAron Walters, Purdue University; William A. Arbaugh, University of Maryland

vTPM: Virtualizing the Trusted Platform Module
Stefan Berger, Ramón Cáceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, and Leendert van Doorn, IBM T.J. Watson Research Center

Designing Voting Machines for Verification
Naveen Sastry, University of California, Berkeley; Tadayoshi Kohno, University of California, San Diego; David Wagner, University of California, Berkeley

INVITED TALKS
Vancouver Island

Academic Department or Corporate Lab, Which Fits?
Bill Aiello, Professor and Chair, Department of Computer Science, University of British Columbia

MP3 IconListen in MP3 format

View the presentation slides

After 15 years in two of the Bell Labs' progeny, the last 5 as a division manager for cryptography and network security at AT&T Labs, a little over a year ago I became the head of the computer science department at the University of British Columbia. This was not exactly a controlled experiment since it involved moving from the U.S. to Canada, from the East Coast to the West Coast and switching from corporate research to academia. But I'll share my thoughts on what I've seen as the similarities and differences between life in a university versus life in a corporate research lab on issues such as incentives, funding, intellectual freedom, decision-making structures, intellectual property, performance review, and graduate student project supervision.

This will be a non-technical session for graduate students on the job market, for more senior researchers contemplating a move from corporate research to academia or vice versa—and for anyone else who wants to join in the discussion. I expect lots of folks in the audience to add, rebut, amplify, you name it. And we'll leave time to discuss changes in both corporate and government support for long-term research and the implications for life in corporate labs and universities in the future. In the end, most computer science and security researchers could be happy in either a university department or a corporate research lab but for some the fit is distinctly better in one versus the other. Hopefully, from the ensuing discussion, we can all help junior researchers come away with a better understanding of the pros and cons, the ups and downs, unique to each type of job.

12:30 p.m.–2:00 p.m.   Lunch (on your own)
2:00 p.m.–3:30 p.m. Friday

Work-in-Progress Reports (WiPs)
British
Session Chair: Doug Szajda, University of Richmond

MP3 IconListen in MP3 format

The last session of the Symposium will consist of Work-in-Progress reports (WiPs). This session offers short presentations on work in progress, new results, or timely topics. The accepted abstracts and session schedule is available here. The time available will be distributed among the presenters, with each speaker allocated between 5 and 10 minutes. The time limit will be strictly enforced.

?Need help? Use our Contacts page.

Last changed: 19 Oct. 2007 ac
哈工大全称是什么 阿斯利康是什么药 奇脉见于什么病 银杯子喝水有什么好处与坏处 录取通知书是什么生肖
细菌性感冒吃什么药效果好 天为什么会下雨 缺钾是什么原因 other是什么意思 双侧上颌窦炎是什么病
沙特用什么货币 史密斯夫妇什么意思 关门弟子是什么意思 沙弗莱是什么宝石 加仓是什么意思
来月经不能吃什么水果 肾气不足吃什么药好 肿瘤前期出现什么症状 梦见蛇蛋是什么意思啊 药店加盟需要什么条件
17楼五行属什么hcv9jop5ns4r.cn 社畜是什么意思hcv9jop4ns9r.cn 排卵的时候有什么症状hcv9jop1ns3r.cn 女性去泰国要注意什么beikeqingting.com 单核细胞百分比偏高什么原因xinjiangjialails.com
答非所问是什么意思hcv8jop5ns2r.cn 吉星高照是什么生肖hcv9jop0ns3r.cn 宜昌有什么特产hcv8jop3ns4r.cn 蚰蜒吃什么hcv8jop5ns4r.cn 心口疼是什么原因女性imcecn.com
如期而至是什么意思hcv9jop7ns5r.cn 白头发多吃什么hcv7jop5ns6r.cn 看牙挂什么科jinxinzhichuang.com 食管有烧灼感什么原因hcv9jop4ns0r.cn 什么是孤独gysmod.com
01属什么hcv9jop4ns0r.cn 红牛加什么提高性功能hcv7jop5ns4r.cn 三亚在海南的什么位置hcv8jop6ns5r.cn 小孩爱吃手指头是什么原因hcv7jop9ns8r.cn 来月经为什么会肚子痛hcv9jop1ns0r.cn
百度