尿酸高看什么科室最好| 脱发缺乏什么维生素| 导管是什么意思| 白介素8升高说明什么| 女人什么时候排卵| 受凉了吃什么药| 仓鼠可以吃什么水果| 手串18颗代表什么意思| 一九六七年属什么生肖| 喉咙不舒服挂什么科| 高原反应什么症状| 验尿细菌高是什么原因| 转隶是什么意思| 月经病是什么意思啊| 进击的巨人真相是什么| 摸摸唱是什么意思| 母公司是什么意思| 什么是蛇缠腰病| 晚上睡觉出汗是什么原因| 天生丽质难自弃是什么意思| 国字脸适合什么发型男| 苦海翻起爱恨是什么歌| 贵族是什么意思啊| 荷叶又什么又什么| 过期化妆品属于什么垃圾| 什么的虫子| 孕妇梦到老公出轨什么意思| 一什么枝条| 脑ct都能查出什么病| 老花眼有什么症状| 潮汐车道是什么意思| 大生化挂什么科| 夜宵吃什么好| 父母是什么意思| 处级干部是什么级别| 大心脏是什么意思| 红糖荷包蛋有什么功效| 武装部部长是什么级别| 梦见晒被子是什么意思| 喉咙肿瘤有什么症状| X-Ray什么意思| 男人都喜欢什么样的女人| 卫生纸是什么垃圾| 乙肝病毒核心抗体阳性是什么意思| 喝什么利尿效果最好| 老是打嗝什么原因| iphone的i是什么意思| 霉菌阴道炎是什么引起的| 监护是什么意思| 通勤什么意思| 寒热往来什么意思| 77属什么生肖| 手脱皮用什么药| 白介素高是什么原因| 口炎是什么字| 为什么不建议儿童做胃镜| 人为什么要喝水| 属鸡的贵人是什么属相| 虫介念什么| 脚跟痛什么原因| bld是什么意思| 头皮发麻什么原因| 送老师什么花好| 翳是什么意思| 乳腺彩超能查出什么| 哮喘不能吃什么| 男人喜欢什么罩杯| 不拘小节是什么意思| 宝宝在肚子里打嗝是什么原因| 肺脓肿是什么病严重吗| 系带断了有什么影响| 甲类传染病指什么| 吃一个海参相当于吃了什么| 长期干咳无痰是什么原因引起的| oil什么意思| 腿膝盖疼是什么原因| 11月12号是什么星座| 干爹是什么意思| 为什么会肚子痛| 淋巴细胞偏高说明什么问题| 骨髓增生活跃是什么意思| 韶字五行属什么| 前胸疼是什么原因| 宫颈癌什么症状| 抽烟头晕是什么原因| 桑叶有什么作用和功效| 张国立的老婆叫什么名字| 外强中干是什么意思| 男性性功能障碍吃什么药| 爱放屁什么原因| 苦瓜有什么功效和作用| bp是什么意思医学上面| 为什么叫985大学| 木属于五行属什么| robam是什么牌子| 累了喝什么缓解疲劳| 指背煞是什么意思| 早泄吃什么药| 开字五行属什么| 为什么突然流鼻血| 诸事皆宜是什么意思| 什么病不能吃茄子| 处是什么结构| 骨密度挂什么科| 失眠有什么办法解决| 7月6号什么星座| 马眼棒是什么| 痛风喝酒会有什么后果| 6月28日什么星座| 幽冥是什么意思| 法令纹深是什么原因| 低血糖吃什么好的最快| 两面派是什么意思| 萧字五行属什么| 丈青色是什么颜色| 吃什么通便效果最好最快| 支气管炎咳嗽吃什么药| 胃动力不足是什么原因造成的| 发小是什么意思| 二级教授是什么意思| 布谷鸟什么时候叫| 12.16是什么星座| 意志是什么意思| 腺样体肥大是什么意思| 梦见买黄金是什么兆头| 心悸是什么感觉| 轻断食是什么意思| 什么是比例| 达芬奇发明了什么| 血小板压积偏高是什么意思| 吃什么东西对心脏好| 骶髂关节炎吃什么药| 别有什么什么| 怜惜是什么意思| 起风疹了用什么快速方法能解决| 有氧运动什么意思| 白细胞低要吃什么| 脖子长小肉粒是什么原因| 手指甲软薄是缺什么| 什么是周期| 胆汁反流吃什么药| 月建是什么意思| 小个子适合什么发型| 临兵斗者皆阵列在前什么意思| 芒果是什么季节的| 心脏上有个小洞是什么病| 鼻子痒用什么药好| 什么是有意义的东西| 齁是什么意思| 一直以来是什么意思| 疏通血管吃什么药最好| 28岁属什么生肖| 喝山楂泡水有什么功效| 4月29号是什么星座| 解脲脲原体阳性是什么意思| 赟读什么| five是什么意思| 国籍填什么| 摔纹皮是什么皮| 什么是负离子| 什么叫烟雾病| 血管检查是做什么检查| wbc白细胞高是什么原因| 肝囊肿是什么病| ana谱是查什么病的| 白鸭是什么鸭| 汽球是什么生肖| 六六无穷是什么意思| 官方什么意思| esp是什么意思| 老虎的天敌是什么动物| 嘴唇发紫是什么病| 苏子是什么| pin是什么意思| 受用是什么意思| 优点是什么意思| 多囊卵巢综合征是什么意思| 脸颊两侧长痘痘什么原因| 啥是什么意思| 胎心停了是什么原因引起的| 的确什么意思| 鸳鸯是什么意思| 胡人是什么民族| 老舍为什么自杀| 红米是什么| 尔加玉读什么| 98年什么命| 吕洞宾代表什么生肖| 6月6号是什么星座| 二次元谷子是什么意思| 肠胀气是什么原因| 水准仪是测量什么的| 晚上睡觉流口水是什么病| 什么叫痛风| 乳房疼痛吃什么消炎药| 宵字五行属什么| 贞操是什么意思| 7.28是什么星座| 火头鱼是什么鱼| bmo是什么意思| 绿豆和什么相克中毒| 既往病史是什么意思| 政治信仰是什么| 杨枝甘露是什么| 真实的印度是什么样的| 祥林嫂是什么样的人| 江苏有什么烟| 孕妇尿回收是干什么用的| 痣长在什么地方不好| 1级高血压是什么意思| 五定是什么| 老人过生日送什么礼物好| 心属于五行属什么| 5月13日什么星座| dostinex是什么药| 奶油小生什么意思| 骨折吃什么消炎药| 液氨是什么| 海带和什么相克| 原发性肝ca什么意思| 鸽子怕什么怎么赶走| 尿频什么原因| 玄猫是什么猫| 五楼五行属什么| 网络cp是什么意思| 双脚踝浮肿是什么原因| 梅毒抗体阳性说明什么| 刷脂是什么意思| 一人一口是什么字| 公主病是什么意思| 酒品是什么意思| 皿是什么意思| 子痫是什么意思| 乳清粉是什么东西| 睡美人叫什么名字| 最近嗜睡是什么原因| 酮体是什么| 浣熊吃什么食物| 蛋糕粉是什么面粉| 女生下面出血但不是月经为什么| 白月光是什么意思| 尿后余沥是什么意思| 端午节什么时候吃粽子| 产厄是什么意思| 松子吃多了有什么害处| 疳积是什么| 螃蟹代表什么生肖| 什么是走读生| 乳头湿疹用什么药| 纷至沓来什么意思| 泰坦尼克号女主角叫什么| 痘痘破了涂什么药膏| 臀纹不对称有什么影响| 睡觉趴着睡什么原因| 肠炎吃什么药好| 减肥期间吃什么最好| 女人喝咖啡有什么好处| 喝什么茶可以降血糖| 雪村和赵英俊什么关系| 晚上八点半是什么时辰| 凤尾是什么菜| 鼻涕倒流吃什么药效果好| 刺五加配什么药治失眠| 风情万种的意思是什么| 百度
Security '10 Banner

TECHNICAL SESSIONS

Tech Sessions: Wednesday, August 11 | Thursday, August 12 | Friday, August 13 | Invited Talk Speakers
VideoJust Up! Videos of the presentations will be posted as soon as they become available. Access is currently restricted to USENIX members and USENIX Security '10 symposium attendees. Not a member? Join today!
Conference papers are available only to registered attendees until the opening day of the technical sessions; they then become available to everyone. Everyone can view the proceedings front matter immediately.

Proceedings Front Matter: Cover, Copyright, ISBN | Title Page, Organizers, Reviewers | Table of Contents | Message from the Program Chair

Complete Proceedings (20.8 MB) | Proceedings Errata Slip (rev. 8/11/10)

NEW! E-Book Proceedings: Read the proceedings on the go in iPad-friendly EPUB format or Kindle-friendly Mobipocket format. (See the Proceedings Errata Slip in EPUB format or Mobipocket format.)

Wednesday, August 11
9:00 a.m.–10:30 a.m. Wednesday

Thurgood Marshall North East

Opening Remarks, Awards, and Keynote Address

Program Chair: Ian Goldberg, University of Waterloo

Proving Voltaire Right: Security Blunders Dumber Than Dog Snot

Roger G. Johnston, Vulnerability Assessment Team, Argonne National Laboratory

Video View the video

Security Keynote Voltaire famously said (sort of) that the main problem with common sense is that it is not all that common. Security is certainly a case in point. As vulnerability assessors, we repeatedly encounter security devices, systems, and programs with little or no security (or security thought) built in. We witness well-designed security products used stupidly, ill-conceived security rules that make security worse, organizations with security cultures beyond pathological, and security programs heavily mired in Security Theater, groupthink, bureaucracy, and wishful thinking.

This talk gives examples of common design blunders, easy-to-exploit vulnerabilities, poor usage, and sloppy thinking associated with various electronic devices involving physical security, including locks, tags, tamper-indicating seals, GPS, RFIDs, biometrics and other access control devices, and electronic voting machines. Common blunders in how organizations think about security and how they deal with the Insider Threat, IT vulnerabilities, and vulnerability assessments will also be discussed.

I'll conclude by proposing some reasons why common sense and security are so often alien to each other and suggest possible countermeasures—some of which involve examining what cyber security and physical security could learn from each other.

10:30 a.m.–11:00 a.m.锟斤拷锟紹reak
11:00 a.m.–12:30 p.m. Wednesday

REFEREED PAPERS

Thurgood Marshall North East

Protection Mechanisms

Session Chair: Micah Sherr, University of Pennsylvania

Adapting Software Fault Isolation to Contemporary CPU Architectures
David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, and Brad Chen, Google, Inc.

Read the Abstract | Full paper

Video View the video

Making Linux Protection Mechanisms Egalitarian with UserFS
Taesoo Kim and Nickolai Zeldovich, MIT CSAIL

Read the Abstract | Full paper

Video View the video

Awarded Best Student Paper!
Capsicum: Practical Capabilities for UNIX
Robert N.M. Watson and Jonathan Anderson, University of Cambridge; Ben Laurie and Kris Kennaway, Google UK Ltd.

Read the Abstract | Full paper

Video View the video

INVITED TALKS

Thurgood Marshall West

Toward an Open and Secure Platform for Using the Web
Will Drewry, Software Security Engineer, Google

View the presentation slides

Video View the video

As users spend more of their computing time in the highly interconnected world of the Internet, their software and data are exposed to attackers at an increasing rate. Web browser developers are pursuing features to mitigate this exposure, but these mechanisms are primarily restricted to the browser itself. Google Chrome OS is an open source, lightweight operating system built for simplicity, speed, and security for Web-focused users. Its security functionality extends beyond the benefits of the browser, Google Chrome, to the core operating system environment. This talk will explore the design and implementation of that functionality and the challenges that lie ahead.

12:30 p.m.–2:00 p.m.锟斤拷锟絃unch, on your own
2:00 p.m.–3:30 p.m. Wednesday

REFEREED PAPERS

Thurgood Marshall North East

Privacy

Session Chair: Tara Whalen, Office of the Privacy Commissioner of Canada

Structuring Protocol Implementations to Protect Sensitive Data
Petr Marchenko and Brad Karp, University College London

Read the Abstract | Full paper

Video View the video

PrETP: Privacy-Preserving Electronic Toll Pricing
Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, and Ingrid Verbauwhede, IBBT-K.U. Leuven, ESAT/COSIC; Christophe Geuens, K.U. Leuven, ICRI

Read the Abstract | Full paper

Video View the video

An Analysis of Private Browsing Modes in Modern Browsers
Gaurav Aggarwal and Elie Bursztein, Stanford University; Collin Jackson, CMU; Dan Boneh, Stanford University

Read the Abstract | Full paper

Video View the video

INVITED TALKS

Thurgood Marshall West

Windows 7 Security from a UNIX Perspective
Crispin Cowan, Senior Program Manager, Windows Core Security, Microsoft, Inc.

Video View the video

UNIX advocates, including me, have long mocked Windows for having a fundamentally insecure computing model. Issues have included the lack of separation of privilege between the user and the TCB, an over-eager willingness to execute code from untrusted sources, and a plethora of buffer overflow vulnerabilities. However, most of these criticisms pertain to Windows XP, a system that is now almost a decade old, or the even older Windows 9X series. Much has changed between Windows XP and Windows 7. This talk will compare and contrast the security of Windows and UNIX, at both technological and cultural levels, with results that may surprise members of both Windows and UNIX communities.

3:30 p.m.–4:00 p.m.锟斤拷锟紹reak
4:00 p.m.–5:30 p.m. Wednesday

REFEREED PAPERS

Thurgood Marshall North East

Detection of Network Attacks

Session Chair: Niels Provos, Google, Inc.

BotGrep: Finding P2P Bots with Structured Graph Analysis
Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, and Nikita Borisov, University of Illinois at Urbana-Champaign

Read the Abstract | Full paper

Video View the video

Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems
Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, and Alex X. Liu , Michigan State University

Read the Abstract | Full paper

Video View the video

Searching the Searchers with SearchAudit
John P. John, University of Washington and Microsoft Research Silicon Valley; Fang Yu and Yinglian Xie, Microsoft Research Silicon Valley; Mart锟絥 Abadi, Microsoft Research Silicon Valley and University of California, Santa Cruz; Arvind Krishnamurthy, University of Washington

Read the Abstract | Full paper

Video View the video

INVITED TALKS

Thurgood Marshall West

Docile No More: The Tussle to Redefine the Internet
James Lewis, Senior Fellow and Program Director at the Center for Strategic and International Studies

Video View the video

The Internet and its technologies were largely designed by Americans, and thus mirror the values and beliefs of these pioneers: open, non-hierarchical, non-governmental, and self-organizing. Other nations with different beliefs want to change this. They want a larger role for governments and an end to America's "technological hegemony." Their motives are commercial and political, and they reflect a general annoyance with a laissez-faire approach to governance that works against security and that foreign observers believe is just a plot to provide advantages to U.S. companies and "control" to the U.S. government. Other governments want to reshape the principles baked into the rules and technology of the Internet. This in itself is interesting, but it may be more interesting to ask—now that the age of Internet pioneers is over and change is inevitable—what values and beliefs will guide it.

6:00 p.m.–7:30 p.m. Wednesday

Thurgood Marshall South West

Symposium Reception

7:30 p.m.–9:00 p.m. Wednesday

Thurgood Marshall North East

Rump Session

Rump Session Chair: Carrie Gates, CA Labs

New this year! USENIX Security '10 will include an all-new Rump Session. Like the WiPs of previous years, the Rump Session will no doubt include important results and exciting new research directions. At the same time, we'll have more fun, with the addition of refreshments, and some less-than-serious presentations. In order to make the Rump Session exciting and fun, we need you (yes, you!) to submit a proposal.

Acceptable topics include:

  • Work in progress
  • Work that you haven't had time to start
  • Work that you will do if you ever get some free time
  • Work that should not be started at all
Each presenter will have between 4 and 7 minutes, depending on the number of submissions and an as-yet-undetermined evaluation formula.

Submissions should be directed to the Rump Session Chair, Carrie Gates, at [email protected]. Please provide a talk title, the presenter's name and affiliation, an estimate of how much time you would like, and two or three sentences on the proposed topic.

If you would like to be notified of acceptance in advance of the conference, please submit your proposal by Friday, August 6, at noon EDT. Notifications will be sent out as soon as possible. Emailed or in-person submissions or suggestions after that will be accepted on-site at the conference and added as space allows.
Tech Sessions: Wednesday, August 11 | Thursday, August 12 | Friday, August 13 | Invited Talk Speakers
Thursday, August 12
9:00 a.m.–10:30 a.m. Thursday

REFEREED PAPERS

Thurgood Marshall North East

Dissecting Bugs

Session Chair: David Lie, University of Toronto

Toward Automated Detection of Logic Vulnerabilities in Web Applications
Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, and Giovanni Vigna, University of California, Santa Barbara

Read the Abstract | Full paper

Video View the video

Baaz: A System for Detecting Access Control Misconfigurations
Tathagata Das, Ranjita Bhagwan, and Prasad Naldurg, Microsoft Research India

Read the Abstract | Full paper

Video View the video

Cling: A Memory Allocator to Mitigate Dangling Pointers
Periklis Akritidis, Niometrics, Singapore, and University of Cambridge, UK

Read the Abstract | Full paper

Video View the video

INVITED TALKS

Thurgood Marshall West

Staying Safe on the Web Yesterday, Today, and Tomorrow
Sid Stamm, Security & Privacy Nut at Mozilla

View the presentation slides

MP3 Icon Listen in MP3 format

The World Wide Web is rapidly evolving, and its corresponding security and privacy problems are changing, too. More than ever before, user agents such as Firefox are being relied upon to provide a safe browsing experience, and so we must adapt to the ever-changing state of the Web. Sid will recount some stories of security problems in Mozilla's past and will examine the current state of security and privacy in Firefox. Finally, he will describe the future of the Web browser, covering Mozilla's plans for upcoming releases and examining some questions in Web security and privacy that don't yet have answers.

10:30 a.m.–11:00 a.m.锟斤拷锟紹reak
11:00 a.m.–12:30 p.m. Thursday

REFEREED PAPERS

Thurgood Marshall North East

Cryptography

Session Chair: Hovav Shacham, University of California, San Diego

ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash
Sarah Meiklejohn, University of California, San Diego; C. Chris Erway and Alptekin K锟絧锟斤拷, Brown University; Theodora Hinkle, University of Wisconsin—Madison; Anna Lysyanskaya, Brown University

Read the Abstract | Revised full paper (6/18/10)

Video View the video

P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users
Yitao Duan, NetEase Youdao, Beijing, China; John Canny, University of California, Berkeley; Justin Zhan, National Center for the Protection of Financial Infrastructure, South Dakota, USA

Read the Abstract | Full paper

Video View the video

SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics
Martin Burkhart, Mario Strasser, Dilip Many, and Xenofontas Dimitropoulos, ETH Zurich, Switzerland

Read the Abstract | Full paper

Video View the video

INVITED TALKS

Thurgood Marshall West

The Evolution of the Flash Security Model
Peleus Uhley, Senior Security Researcher, Adobe

Video View the video

The Adobe Flash Player security model must address several complex challenges. Flash Player must meet the needs of enterprise administrators, end users, Web site owners, and content creators. The model must adapt and scale as improvements are made to Web standards. As a technology, it is deployed across multiple browsers on multiple operating systems. Those operating systems may be installed on desktop PCs, mobile devices, tablets, or digital home devices. Most important, Flash Player must provide a security model that is consistent for everyone regardless of the combination of browser, OS, and device they are using.

This presentation will discuss how Adobe is addressing some of these complex challenges through real-world case studies. It will begin with a few past events that resulted in significant changes to the security model. The discussion will then progress to our more recent changes and what factors are currently influencing us. The presentation will close with some thoughts on the challenges that lie ahead as the Web expands from the desktop onto mobile devices, tablets, and TVs.

12:30 p.m.–2:00 p.m.锟斤拷锟絃unch, on your own
2:00 p.m.–3:30 p.m. Thursday

REFEREED PAPERS

Thurgood Marshall North East

Internet Security

Session Chair: Steven M. Bellovin, Columbia University

Dude, Where's That IP? Circumventing Measurement-based IP Geolocation
Phillipa Gill and Yashar Ganjali, University of Toronto; Bernard Wong, Cornell University; David Lie, University of Toronto

Read the Abstract | Full paper

Video View the video

Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Roya Ensafi, Jong Chun Park, Deepak Kapur, and Jedidiah R. Crandall, University of New Mexico

Read the Abstract | Full paper

Video View the video

Building a Dynamic Reputation System for DNS
Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, and Nick Feamster, Georgia Institute of Technology

Read the Abstract | Full paper

Video View the video

INVITED TALKS

Thurgood Marshall West

Understanding Scam Victims: Seven Principles for Systems Security
Frank Stajano, Senior Lecturer at the University of Cambridge, UK

MP3 Icon Listen in MP3 format

The success of many attacks on computer systems can be traced back to the security engineers not understanding the psychology of the system users they meant to protect. Paul Wilson and I examined a variety of scams and short cons that were investigated, documented, and recreated for the BBC TV programme The Real Hustle and we extracted from them some general principles about the recurring behavioral patterns of victims that hustlers have learnt to exploit. We argue that an understanding of these inherent human vulnerabilities, and the necessity of taking them into account during design rather than naively shifting the blame onto the gullible users, is a fundamental paradigm shift for the security engineer which, if adopted, will lead to stronger and more resilient systems security.

3:30 p.m.–4:00 p.m.锟斤拷锟紹reak
4:00 p.m.–5:30 p.m. Thursday

REFEREED PAPERS

Thurgood Marshall North East

Real-World Security

Session Chair: Bill Cheswick, AT&T Labs锟絉esearch

Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy
Richard Carback, UMBC CDL; David Chaum; Jeremy Clark, University of Waterloo; John Conway, UMBC CDL; Aleksander Essex, University of Waterloo; Paul S. Herrnson, UMCP CAPC; Travis Mayberry, UMBC CDL; Stefan Popoveniuc; Ronald L. Rivest and Emily Shen, MIT CSAIL; Alan T. Sherman, UMBC CDL; Poorvi L. Vora, GW

Read the Abstract | Full paper

Video View the video

Acoustic Side-Channel Attacks on Printers
Michael Backes, Saarland University and Max Planck Institute for Software Systems (MPI-SWS); Markus D锟絩muth, Sebastian Gerling, Manfred Pinkal, and Caroline Sporleder, Saarland University

Read the Abstract | Full paper

Video View the video

Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study
Ishtiaq Rouf, University of South Carolina, Columbia; Rob Miller, Rutgers University; Hossen Mustafa and Travis Taylor, University of South Carolina, Columbia; Sangho Oh, Rutgers University; Wenyuan Xu, University of South Carolina, Columbia; Marco Gruteser, Wade Trappe, and Ivan Seskar, Rutgers University

Read the Abstract | Full paper

Video View the video

INVITED TALKS

Thurgood Marshall West

Vulnerable Compliance
Dan Geer, In-Q-Tel

View the presentation slides

Video View the video

If a basic interoperability constraint, such as a core, standardized network protocol, has a flaw, then everyone who is standards-compliant will be vulnerable. What, then, does one do? If the flaw is long-standing, then by now it is pervasive, embedded in robotics, and likely to be in silicon. If the protocol is touchy, then seamless updates may not be possible. If a repair is possible but field deployment can be expected to have a half-life measured in months if not years, what does that imply for security policy? In the particular case of embedded systems, does this mean that remote upgradability—with all the risk such a capability entails—is a wise design choice? In the case of core Internet protocols, does that mean that Jon Postel's famous Robustness Principle, viz., to be conservative in what you send and liberal in what you accept, is no longer consistent with security? Is there an analog to perfect forward secrecy when it comes to planning for protocol failure the way we already (can) plan for key loss? With luck, this talk will at least ask the right questions.

6:00 p.m.–7:30 p.m. Thursday

Thurgood Marshall South West

Poster Session & Happy Hour

Poster Session Chair: Patrick Traynor, Georgia Institute of Technology

Don't miss the cool new ideas and the latest preliminary research on display at the Poster Session. Take part in discussions with your colleagues over complimentary drinks and snacks. Check out the list of accepted posters.

Tech Sessions: Wednesday, August 11 | Thursday, August 12 | Friday, August 13 | Invited Talk Speakers
Friday, August 13
9:00 a.m.–10:30 a.m. Friday

REFEREED PAPERS

Thurgood Marshall North East

Web Security

Session Chair: Helen Wang, Microsoft Research

Awarded Best Paper!
VEX: Vetting Browser Extensions for Security Vulnerabilities
Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, and Marianne Winslett, University of Illinois at Urbana-Champaign

Read the Abstract | Full paper

Video View the video

Securing Script-Based Extensibility in Web Browsers
Vladan Djeric and Ashvin Goel, University of Toronto

Read the Abstract | Full paper

Video View the video

AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements
Mike Ter Louw, Karthik Thotta Ganesh, and V.N. Venkatakrishnan, University of Illinois at Chicago

Read the Abstract | Full paper

Video View the video

INVITED TALKS

Thurgood Marshall West

How Cyber Attacks Will Be Used in International Conflicts
Scott Borg, Chief Economist, US Cyber Consequences Unit

View the presentation slides

Every international dispute, if it becomes intense enough, is now likely to have a cyber component. Civilian cyber militias have become a regular part of regional conflicts. The resulting cyber campaigns now have the potential to escalate dangerously, to spread across multiple countries, and to disrupt global supply chains. Meanwhile, governments have become increasingly aware of the contributions cyber attacks can make to military operations. Drawing on a detailed examination of recent cyber conflicts, this session will attempt to survey all the ways cyber attacks are likely to be used in international conflicts in the near future. It will explore the pros and cons of each option for both civilian and military efforts, all the way down to the operational level. It will present some novel analytic methods that allow many of the choices to be quantified. Finally, the session will identify some of the ways these developments are likely to change the world in which we all will be operating.

10:30 a.m.–11:00 a.m.锟斤拷锟紹reak
11:00 a.m.–12:30 p.m. Friday

REFEREED PAPERS

Thurgood Marshall North East

Securing Systems

Session Chair: Alex Halderman, University of Michigan

Realization of RF Distance Bounding
Kasper Bonne Rasmussen and Srdjan Capkun, ETH Zurich

Read the Abstract | Full paper

Video View the video

The Case for Ubiquitous Transport-Level Encryption
Andrea Bittau and Michael Hamburg, Stanford; Mark Handley, UCL; David Mazi锟絩es and Dan Boneh, Stanford

Read the Abstract | Full paper

Video View the video

Automatic Generation of Remediation Procedures for Malware Infections
Roberto Paleari, Universit锟?degli Studi di Milano; Lorenzo Martignoni, Universit锟?degli Studi di Udine; Emanuele Passerini, Universit锟?degli Studi di Milano; Drew Davidson and Matt Fredrikson, University of Wisconsin; Jon Giffin, Georgia Institute of Technology; Somesh Jha, University of Wisconsin

Read the Abstract | Full paper

Video View the video

INVITED TALKS

Thurgood Marshall West

Grid, PhD: Smart Grid, Cyber Security, and the Future of Keeping the Lights On
Kelly Ziegler, Chief Operating Officer, National Board of Information Security Examiners

View the presentation slides

Video View the video

As technology developments continue to make the electric grid "smarter," many believe security–and particularly cyber security–has become an afterthought in many respects. What does this mean to those trying to keep the lights on? What kinds of threats face the grid today? What makes the grid unique from a critical infrastructure perspective? What are the regulatory and policy drivers behind the push to make the grid smarter and more secure? This discussion will attempt to answer these questions and shed light on the current state of smart grid developments and grid cyber security throughout North America.

12:30 p.m.–2:00 p.m.锟斤拷锟絃unch, on your own
2:00 p.m.–3:30 p.m. Friday

REFEREED PAPERS

Thurgood Marshall North East

Using Humans

Session Chair: Lucas Ballard, Google, Inc.

Re: CAPTCHAs—Understanding CAPTCHA-Solving Services in an Economic Context
Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage, University of California, San Diego

Read the Abstract | Full paper

Video View the video

Chipping Away at Censorship Firewalls with User-Generated Content
Sam Burnett, Nick Feamster, and Santosh Vempala, Georgia Tech

Read the Abstract | Full paper | Slides

Video View the video

Fighting Coercion Attacks in Key Generation using Skin Conductance
Payas Gupta and Debin Gao, Singapore Management University

Read the Abstract | Full paper

Video View the video

INVITED TALKS

Thurgood Marshall West

End-to-End Arguments: The Internet and Beyond
David P. Reed, MIT Media Laboratory

View the presentation slides

Video View the video

A key factor supporting the Internet's evolution and growth is the use of "end-to-end arguments" to decide where to place functionality in the overall architecture as it evolved. There are many today who assert that the end-to-end arguments are no longer applicable to the Internet—that the Internet in its maturity must now begin to lock in specialized functions for mobile phones, television and video conferencing, functions to enable cyberwarfare, and functions that are required to ensure adequate profits to the operators and equipment vendors who must have incentives to invest in the Internet. At the same time, we are seeing vastly more complex interoperable architectures built around the Internet emerging in the form of cloud-style computing and mobile interaction.

Dr. Reed, who is one of the three authors who articulated the end-to-end argument as a principle of design, will argue that the end-to-end argument is not dead—it is more important than ever. In passing, he will explain some of the misconceptions about the end-to-end argument that have emerged from its friends and its foes.

?Need help? Use our Contacts page.

Last changed: 1 Oct. 2010 jp
奚字五行属什么 拔牙什么时候拔最好 低血糖喝什么饮料 化验痰可以检查出什么 活检是什么
四大皆空是指什么 飞机杯什么意思 甲烷是什么 为什么会得甲减 什么叫布病
调经止带是什么意思 2月9号什么星座 促销员是做什么的 阴阳怪气什么意思 春梦是什么意思
p5是什么意思 丝瓜是什么 气郁症是什么症状 血压低压高是什么原因 碳13是检查什么的
肾气不足吃什么药hcv8jop5ns1r.cn 梦见火是什么预兆hcv8jop3ns2r.cn 孕妇肾积水是什么原因引起的hcv9jop2ns3r.cn 麝香对孕妇有什么危害性bysq.com 酸角是什么xinjiangjialails.com
为什么会长口腔溃疡hcv9jop8ns3r.cn 撕票是什么意思zsyouku.com 身份证x代表什么意思hcv9jop3ns7r.cn 什么是良心hcv8jop9ns3r.cn 后背痒是什么病的前兆helloaicloud.com
疤痕增生挂什么科hcv8jop2ns9r.cn 黄皮不能和什么一起吃96micro.com 尿胆原阳性是什么病hcv9jop5ns6r.cn 阴唇为什么一个大一个小hcv9jop0ns6r.cn 感冒虚弱吃什么食物好hcv8jop3ns9r.cn
碧生源减肥茶有什么副作用tiangongnft.com poem是什么意思huizhijixie.com 什么是更年期hcv9jop0ns6r.cn 鸡肉不能和什么一起吃0297y7.com 黄曲霉素是什么hcv8jop0ns4r.cn
百度