警察和公安有什么区别| 射手座和什么座最配| 属羊的和什么属相不合| 争是什么生肖| 吃什么水果能长高| 睁眼睡觉是什么原因| 经常喝茶叶有什么好处| 阳春白雪是什么意思| 肚子上方中间疼是什么部位| ns是什么单位| 鼻炎看什么科| 八十岁是什么之年| 征信对个人有什么影响| 雌激素分泌过多是什么原因引起的| nbr是什么材料| 维生素d有什么作用| 油为什么会浮在水面上| 痞子是什么意思| 做果冻用什么粉| tg是什么指标| 头上长疙瘩是什么原因| 非亲非故是什么意思| 久视伤血是什么意思| 养什么宠物好| 10月5号什么星座| 儿童水杯什么材质好| 肾虚会导致什么| 乌纱帽是什么意思| 双手抽筋是什么原因| 晚上睡觉脚底发热是什么原因| 谷草谷丙比值偏高代表什么| 心绞痛吃什么药缓解最快| 肝的主要功能是什么| 胎膜早破是什么症状| 车震是什么意思啊| 蒌蒿是什么| 百白破是预防什么的| 耳根有痣代表什么| 弯刀裤适合什么人穿| 梦见怀孕是什么预兆| 北字五行属什么| 属鼠男和什么属相最配| 人到无求品自高什么意思| 尿频挂什么科| 平头哥是什么意思| 屈原是什么朝代| 怀孕前期有什么征兆| 蓝加红是什么颜色| 1.25什么星座| 噗是什么意思| 开拔是什么意思| 口水多吃什么药好得快| 皮肤黄的人适合穿什么颜色的衣服| 肿瘤前期有什么症状| 做梦梦见好多蛇是什么预兆| 湿疹是什么病的前兆| 最小的一位数是什么| 阴历六月十八是什么日子| 巅峰是什么意思| 为什么一进去就想射| 破伤风疫苗什么时候打| 什么是二氧化碳| 紫苏有什么作用与功效| 头昏是什么原因引起的| 唇系带断了有什么影响| 老公梦见蛇是什么预兆| 幽默是什么意思| 查肾功能挂什么科| 右手小指戴戒指什么意思| 血小板低有什么危险| 什么叫糖化血红蛋白| 眉毛下方有痣代表什么| 突厥是现在的什么地方| 边际贡献是什么意思| 小孩子打呼噜是什么原因| 为什么会有血管瘤| 燕窝什么时候吃最好| 煞北是什么意思| 肿物是什么意思| 儿童看小鸡挂什么科| 减肥晚上吃什么| 腹水是什么症状| 7月7号是什么节日| 拉肚子吃什么水果| jc是什么牌子| 周边什么意思| 蜂蜜和柠檬一起喝有什么作用| 灰绿色是什么颜色| e是什么单位| 缺如是什么意思| 梦见狗咬我是什么意思| darker是什么意思| 女生右眼睛老是跳是什么原因| 你会不会突然的出现是什么歌| 奥美拉唑和雷贝拉唑有什么区别| 五月十八什么星座| 红隼吃什么| 吃什么能美白| 白砂糖和冰糖有什么区别| 孕囊形态欠规则是什么意思| 蚝油是什么原料做的| 传染病八项包括什么| 香蕉和什么一起吃能减肥| 牙签肉是什么肉| 云南有什么特产| 什么可以解酒最快方法| 貌不惊人是什么意思| 什么人不适合做厨师| 指甲有横纹是什么原因| 背德是什么意思| 酒后吐吃什么可以缓解| 感冒发烧吃什么药比较好| k值是什么意思| 黑天鹅是什么意思| 菊花茶适合什么人喝| 吃什么可以降低血糖| 住院报销需要什么材料| 检查尿常规挂什么科| 一个月一个太念什么| 肝内胆管结石是什么意思| 郡肝是什么| 味素是什么| o型血的人是什么性格| 大便弱阳性是什么意思| 羊属于什么科| 泪囊炎用什么眼药水| 孕妇吃什么钙片好| 施教区是什么意思| 什么是全麦面包| 安全监察是一种带有什么的监督| 忍辱负重是什么意思| 子宫破裂有什么征兆| 什么精神| 1943年属什么生肖| 脸部肌肉跳动是什么原因| 花重锦官城的重是什么意思| 97年出生属什么| 心肌炎什么症状| 阴历六月十三是什么日子| 微量元素六项是什么检查| 11月份生日是什么星座| 放臭屁是什么原因| 五月四号什么星座| 腋毛脱落是什么原因| 果冻是什么做的| 5月30日是什么星座| 每天半夜两三点醒是什么原因| 什么药治拉肚子| 72年属什么生肖| hope是什么意思啊| 调和营卫是什么意思| 右肾肾盂分离什么意思| 三七粉什么时间吃最好| 甲减是什么症状| 转呼啦圈有什么好处| 2.26是什么星座| 居里夫人发明了什么| 早上起来嘴苦口臭是什么原因| hpv感染用什么药| 布洛芬缓释胶囊是什么药| 看牙齿挂什么科| 今年24岁属什么生肖| 伤口恢复吃什么好得快| 自在什么意思| 拉屎出血是什么原因| 唐老鸭叫什么名字| 肺部真菌感染用什么药最好| hpv是什么病毒| 睡不着觉去医院挂什么科| 5月20是什么星座| 什么是紫苏| 籍贯一般填什么| 毛囊炎挂什么科| 想要什么样的爱| 好朋友是什么意思| 意义是什么意思| 什么样的水花| 低血压是什么症状| 百分比是什么意思| 车厘子和樱桃有什么区别| 231是什么意思| 野合什么意思| anti什么意思| 一片冰心在玉壶是什么意思| bid是什么意思| 钙盐沉积是什么意思| 乌鸦长什么样| 喝什么解酒最快最有效| 11月13日什么星座| 蛇是什么类动物| 头晕什么原因引起的| 容易出汗是什么原因| 生气对身体有什么危害| 头上出汗是什么原因| 喝什么降血压| 风热感冒吃什么药| 尾巴骨疼是什么原因| 什么时候喝咖啡能减肥| 尿检蛋白质弱阳性是什么意思| 什么是月令| 朱砂是什么| 磨牙挂什么科| 为什么抽烟就想拉屎| 肌酐下降是什么原因| 西洋参和人参有什么区别| 藏语扎西德勒什么意思| 喝芝麻糊有什么好处| 指甲长出来是白色的什么原因| 小腹胀是什么原因女性| 宝宝咳嗽吃什么药好| 玄女是什么意思| 饭后呕吐是什么原因引起的| 什么人容易得肾结石| 非即食是什么意思| 熊掌有什么功效与作用| 透明的什么填词语| 为什么要当兵| 露出什么意思| 第一次需要注意什么| 息影是什么意思| 怀孕初期吃什么对胎儿发育好| 木字旁有什么字| 坚信的意思是什么| 桂枝是什么| 担心是什么意思| 远水解不了近渴什么意思| 吃什么利尿最快| 反绒皮是什么材质| 相恋纪念日送什么礼物| 66年属什么| 门道是什么意思| 梦见挖野菜是什么意思| 执业药师什么时候考试| 什么食物含碘| 动物园有什么动物| 九品芝麻官是什么级别| 咳嗽吐白痰吃什么药| 胆矾是什么| 倒贴是什么意思| ptp是什么意思| 肺与什么相表里| 庞统为什么要献连环计| 好整以暇什么意思| 梦见自己剪头发是什么意思| 光动能手表是什么意思| 月例是什么意思| 肝郁有什么症状| 126是什么邮箱| 幼儿园报名需要什么资料| 闹肚子吃什么药| 什么的爱心| 吐黄痰是什么原因| 为什么会得脑梗| 免疫什么意思| 1.24是什么星座| 蚊子喜欢咬什么人| 解酒喝什么| 2月18是什么星座| 西洋参吃多了有什么副作用| 妃是什么意思| 吕布的马叫什么名字| 动脉血检查是检查什么| 胃不消化吃什么药效果最好| 三月初一是什么星座| 百度
Security '11 Banner

TECHNICAL SESSIONS

Tech Sessions: Wednesday, August 10 | Thursday, August 11 | Friday, August 12
VideoJust Up! Videos of the presentations will be posted as soon as they become available.

Proceedings Front Matter: Cover, Copyright, ISBN | Title Page, Organizers, Reviewers | Table of Contents | Message from the Program Chair

Complete Proceedings | Proceedings Errata Slip (rev. 7/26/11)

NEW! E-Book Proceedings: Read the proceedings on the go in iPad-friendly EPUB format or Kindle-friendly Mobipocket format. (See the Proceedings Errata Slip in EPUB format or Mobipocket format.)

Wednesday, August 10
8:30 a.m.–9:00 a.m.    Continental Breakfast served in the Italian Room Foyer
9:00 a.m.–10:30 a.m. Wednesday

Opening Remarks, Awards, and Keynote Address

Grand Ballroom

Program Chair: David Wagner, University of California, Berkeley

Video View the Video

MP3 Icon Listen to the MP3

Network Security in the Medium Term: 2061–2561 AD

Charles Stross, Author of award-winning science fiction

Video View the Video

MP3 Icon Listen to the MP3

Stross A science fiction writer takes a look at the medium-term implications the information processing revolution holds for human civilization.

Charles Stross, 46, is a full-time science fiction writer and resident of Edinburgh, Scotland. The winner of two Locus Reader Awards and winner in 2005 and 2010 of the Hugo Award for best novella, Stross's works have been translated into over a dozen languages. Like many writers, Stross has had a variety of careers, occupations, and job-shaped catastrophes in the past, from pharmacist through tech sector journalist to first code monkey on the team of a successful dot-com startup. He has degrees in pharmacy and computer science.

10:30 a.m.–11:00 a.m.   Break: Coffee and tea served in the Italian Room Foyer
11:00 a.m.–12:30 p.m. Wednesday

REFEREED PAPERS

Grand Ballroom

Web Security

Session Chair: Helen Wang, Microsoft Research

Fast and Precise Sanitizer Analysis with BEK
Pieter Hooimeijer, University of Virginia; Benjamin Livshits and David Molnar, Microsoft Research; Prateek Saxena, University of California, Berkeley; Margus Veanes, Microsoft Research

Read the Full paper

Video View the Video

MP3 Icon Listen to the MP3

Toward Secure Embedded Web Interfaces
Baptiste Gourdin, LSV ENS-Cachan; Chinmay Soman, Hristo Bojinov, and Elie Bursztein, Stanford University

Read the Full paper

Video View the Video | Slides

MP3 Icon Listen to the MP3

ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection
Charlie Curtsinger, University of Massachusetts Amherst; Benjamin Livshits and Benjamin Zorn, Microsoft Research; Christian Seifert, Microsoft

Read the Full paper

Video View the Video

MP3 Icon Listen to the MP3

INVITED TALKS

Colonial Room

The Three Cyber-War Fallacies
Dave Aitel, CEO of Immunity, Inc.

Video View the Video

MP3 Icon Listen to the MP3

Many sources for cyber strategy and policy that affects it focus on three facets of the cyber domain:

  • Cyber attacks are asymmetric.
  • Cyber attacks are unattributable.
  • Cyber attacks are non-kinetic.
  • None of these is true. This talk explains why.

    12:30 p.m.–2:00 p.m.   Lunch, on your own
    2:00 p.m.–3:30 p.m. Wednesday

    REFEREED PAPERS

    Grand Ballroom

    Analysis of Deployed Systems

    Session Chair: Ian Goldberg, University of Waterloo

    Awarded Outstanding Paper!
    Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System
    Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman, Kevin Xu, and Matt Blaze, University of Pennsylvania

    Read the Full paper

    Video View the Video

    MP3 Icon Listen to the MP3

    Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space
    Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, and Edgar Weippl, SBA Research

    Read the Full paper (Updated 6/24/11)

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    Comprehensive Experimental Analyses of Automotive Attack Surfaces
    Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and Stefan Savage, University of California, San Diego; Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno, University of Washington

    Read the Full paper

    Video View the Video

    MP3 Icon Listen to the MP3

    3:30 p.m.–4:00 p.m.   Break: Beverages served in the Italian Room Foyer
    4:00 p.m.–5:30 p.m. Wednesday

    REFEREED PAPERS

    Grand Ballroom

    Forensic Analysis

    Session Chair: William Enck, Pennsylvania State University

    Forensic Triage for Mobile Phones with DEC0DE
    Robert J. Walls, Erik Learned-Miller, and Brian Neil Levine, University of Massachusetts Amherst

    Read the Full paper

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    mCarve: Carving Attributed Dump Sets
    Ton van Deursen, Sjouke Mauw, and Saša Radomirović, University of Luxembourg

    Read the Full paper

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks
    Kevin Z. Snow, Srinivas Krishnan, and Fabian Monrose, University of North Carolina at Chapel Hill; Niels Provos, Google

    Read the Full paper

    Video View the Video

    MP3 Icon Listen to the MP3

    INVITED TALKS

    Colonial Room

    Crossing the Chasm: Pitching Security Research to Mainstream Browser Vendors

    Collin Jackson, Assistant Research Professor at Carnegie Mellon University

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    "Why doesn't my browser do X?" Competition among browser vendors is fierce, and it seems that everyone has an idea for how to make Web browsing faster, easier, and more secure. But only a small fraction of the published research on Web security is ever adopted by popular browsers. In this talk we'll discuss what it takes to transition a research idea into a mainstream browser feature and the pitfalls that lie in wait along the way.

    Collin Jackson is an Assistant Research Professor at Carnegie Mellon University, based on the Silicon Valley campus. His Web security proposals have been adopted by many popular browsers, including Internet Explorer, Firefox, Google Chrome, Safari, and Opera. He has also proposed plenty of ideas that have gone absolutely nowhere.

    6:00 p.m.–7:30 p.m. Wednesday

    USENIX Security '11 Reception

    California East/West

    Don't miss the USENIX Security '11 Reception, featuring dinner, drinks, and the chance to connect with other attendees, speakers, and conference organizers.

    7:30 p.m.–9:00 p.m. Wednesday

    USENIX Security '11 Rump Session

    Grand Ballroom

    Rump Session Chair: Matt Blaze, University of Pennsylvania

    Building on last's year success, we will host a rump session on the evening of Wednesday, August 10, 2011. This is intended as an informal session for short and engaging presentations on recent unpublished results, work in progress, or other topics of interest to the USENIX Security attendees. To submit a rump session talk, email sec11rump@usenix.org by Wednesday, August 10, 2011, at 11:59 a.m. PDT.

    Tech Sessions: Wednesday, August 10 | Thursday, August 11 | Friday, August 12
    Thursday, August 11, 2011
    8:30 a.m.–9:00 a.m.    Continental Breakfast served in the Italian Room Foyer
    9:00 a.m.–10:30 a.m. Thursday

    REFEREED PAPERS

    Grand Ballroom

    Static and Dynamic Analysis

    Session Chair: Sam King, University of Illinois at Urbana-Champaign

    MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery
    Chia Yuan Cho, University of California, Berkeley, and DSO National Labs; Domagoj Babić, University of California, Berkeley; Pongsin Poosankam, University of California, Berkeley, and Carnegie Mellon University; Kevin Zhijie Chen, Edward XueJun Wu, and Dawn Song, University of California, Berkeley

    Read the Full paper

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    Static Detection of Access Control Vulnerabilities in Web Applications
    Fangqi Sun, Liang Xu, and Zhendong Su, University of California, Davis

    Read the Full paper

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    ADsafety: Type-Based Verification of JavaScript Sandboxing
    Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, and Shriram Krishnamurthi, Brown University

    Read the Full paper

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    INVITED TALKS

    Colonial Room

    I'm from the Government and I'm Here to Help: Perspectives from a Privacy Tech Wonk
    Tara Whalen, Office of the Privacy Commissioner of Canada

    Video View the Video

    MP3 Icon Listen to the MP3

    Security research has often had a major impact on technology policy...and vice versa. Within the privacy space, issues such as location privacy, lawful intercept, and online tracking have been the subject of considerable debate. As a "tame technologist" within the Canadian civil service, I've been deeply engaged in these subjects at a practical level. In this talk, I will outline some of the ways in which the spheres of technology, policy, and law intersect, illustrated with recent real-world examples from the privacy domain.

    Tara Whalen joined the Office of the Privacy Commissioner of Canada (OPC) in 2009, where she works as an IT Research Analyst. Prior to joining the OPC, she conducted post-doctoral research in computer security at Carleton University. She has a PhD in Computer Science from Dalhousie University. Tara has over 15 years of experience in the information security and privacy fields, including roles in research labs, academia, federal government institutions, and the private sector. In addition to privacy, her research interests include the human factors of security and the social implications of technology.

    10:30 a.m.–11:00 a.m.   Break: Coffee and tea served in the Italian Room Foyer
    11:00 a.m.–12:30 p.m. Thursday

    REFEREED PAPERS

    Grand Ballroom

    Understanding the Underground Economy

    Session Chair: Yinglian Xie, Microsoft Research

    Awarded Outstanding Paper!
    Measuring Pay-per-Install: The Commoditization of Malware Distribution
    Juan Caballero, IMDEA Software Institute; Chris Grier, Christian Kreibich, and Vern Paxson, University of California, Berkeley, and ICSI

    Read the Full paper

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    Dirty Jobs: The Role of Freelance Labor in Web Service Abuse
    Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, University of California, San Diego

    Read the Full paper

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    Show Me the Money: Characterizing Spam-advertised Revenue
    Chris Kanich, University of California, San Diego; Nicholas Weaver, International Computer Science Institute; Damon McCoy and Tristan Halvorson, University of California, San Diego; Christian Kreibich, International Computer Science Institute; Kirill Levchenko, University of California, San Diego; Vern Paxson, International Computer Science Institute and University of California, Berkeley; Geoffrey M. Voelker and Stefan Savage, University of California, San Diego

    Read the Full paper

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    INVITED TALKS

    Colonial Room

    Privacy in the Age of Augmented Reality
    Alessandro Acquisti, Associate Professor of Information Technology and Public Policy at Heinz College, Carnegie Mellon University

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    In this talk, I will link two of my favorite research streams: (1) the behavioral economics of privacy, and (2) mining of data from online social networks for privacy and security risks associated with online disclosures. I will highlight how research in behavioral economics can help us make sense of apparent inconsistencies in privacy (and security) decision-making and will present results from a variety of experiments conducted at Carnegie Mellon University. Then I will discuss the technical feasibility and privacy implications of combining publicly available Web 2.0 images with off-the-shelf face recognition technology, for the purpose of large-scale, automated individual re-identification. Combined, the results highlight the behavioral, technological, and legal issues raised by the convergence of mining technologies and online social networks and illuminate the future of privacy in an augmented reality world.

    Alessandro Acquisti is an Associate Professor of Information Systems and Public Policy at the Heinz College, Carnegie Mellon University, and the co-director of the CMU Center for Behavioral Decision Research (CBDR). Alessandro has been the recipient of many awards, and his research on privacy has been published in leading journals across multiple disciplines and featured in media outlets such as the New York Times, the Wall Street Journal, the Washington Post, CNN, and NPR. His 2009 study on the predictability of Social Security numbers contributed to the change in the assignment scheme of SSNs that was announced in 2011 by the US Social Security Administration.

    12:30 p.m.–2:00 p.m.   Lunch, on your own
    2:00 p.m.–3:30 p.m. Thursday

    REFEREED PAPERS

    Grand Ballroom

    2:00 p.m.–3:30 p.m.

    Defenses and New Directions

    Session Chair: Tara Whalen, Office of the Privacy Commissioner of Canada

    Secure In-Band Wireless Pairing
    Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, and Dina Katabi, Massachusetts Institute of Technology

    Read the Full paper

    Video View the Video | Slides (PPTX)

    MP3 Icon Listen to the MP3

    TRESOR Runs Encryption Securely Outside RAM
    Tilo Müller and Felix C. Freiling, University of Erlangen; Andreas Dewald, University of Mannheim

    Read the Full paper

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    Bubble Trouble: Off-Line De-Anonymization of Bubble Forms
    Joseph A. Calandrino, William Clarkson, and Edward W. Felten, Princeton University

    Read the Full paper

    Video View the Video

    MP3 Icon Listen to the MP3

    REFEREED PAPERS

    Colonial Room

    2:00 p.m.–3:00 p.m.

    Securing Search

    Session Chair: Wenyuan Xu, University of South Carolina

    Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade
    Nektarios Leontiadis, Carnegie Mellon University; Tyler Moore, Harvard University; Nicolas Christin, Carnegie Mellon University

    Read the Full paper

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    deSEO: Combating Search-Result Poisoning
    John P. John, University of Washington; Fang Yu and Yinglian Xie, MSR Silicon Valley; Arvind Krishnamurthy, University of Washington; Martín Abadi, MSR Silicon Valley

    Read the Full paper

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    3:30 p.m.–4:00 p.m.   Break: Beverages served in the Italian Room Foyer
    4:00 p.m.–5:30 p.m. Thursday

    REFEREED PAPERS

    Grand Ballroom

    Securing Smart Phones

    Session Chair: David Evans, University of Virginia

    A Study of Android Application Security
    William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri, The Pennsylvania State University

    Read the Full paper

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    Permission Re-Delegation: Attacks and Defenses
    Adrienne Porter Felt, University of California, Berkeley; Helen J. Wang and Alexander Moshchuk, Microsoft Research; Steve Hanna and Erika Chin, University of California, Berkeley

    Read the Full paper

    Video View the Video

    MP3 Icon Listen to the MP3

    QUIRE: Lightweight Provenance for Smart Phone Operating Systems
    Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, and Dan S. Wallach, Rice University

    Read the Full paper (updated 7/26/11)

    Video View the Video

    MP3 Icon Listen to the MP3

    INVITED TALKS

    Colonial Room

    Deport on Arrival: Adventures in Technology, Politics, and Power
    J. Alex Halderman, Assistant Professor, Computer Science and Engineering, The University of Michigan

    Video View the Video

    MP3 Icon Listen to the MP3

    Last year, my colleagues and I were accused by unnamed intelligence officials of being a "foreign conspiracy" to destabilize a major democracy and narrowly escaped being thrown onto an airplane and deported from that country—all for publishing a research paper (Wolchok et al., CCS 2010). In this talk I will share this story and other research adventures from my work in DRM, electronic voting, and Internet censorship—areas that lie at the intersection of technology and political power. These topics touch on computer security issues that affect the relationship between individuals and government, and scientists working to understand these issues have an obligation not only to speak truth to power but also to explain technical realities directly to the people. We will travel from Manhattan alleyways to Mumbai jail cells, meeting powerful foes and making lasting friendships along the way.

    J. Alex Halderman is an assistant professor of computer science and engineering at the University of Michigan. His research spans applied computer security and tech-centric public policy, including topics such as software security, data privacy, electronic voting, censorship resistance, digital rights management, and cybercrime, as well as technological aspects of intellectual property law and government regulation.

    6:00 p.m.–7:30 p.m. Thursday

    Poster Session & Pizza Party

    California East/West

    Poster Session Chair: Patrick Traynor, Georgia Institute of Technology

    Don't miss the cool new ideas and the latest preliminary research on display at the Poster Session. Take part in discussions with your colleagues over complimentary drinks, pizza, and salad. Check out the list of accepted posters.

    Tech Sessions: Wednesday, August 10 | Thursday, August 11 | Friday, August 12
    Friday, August 12
    8:30 a.m.–9:00 a.m.    Continental Breakfast served in the Italian Room Foyer
    9:00 a.m.–10:30 a.m. Friday

    REFEREED PAPERS

    Grand Ballroom

    Understanding Attacks

    Session Chair: Hovav Shacham, University of California, San Diego

    SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale
    Collin Mulliner, Nico Golde, and Jean-Pierre Seifert, Technische Universität Berlin and Deutsche Telekom Laboratories

    Read the Full paper

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    Q: Exploit Hardening Made Easy
    Edward J. Schwartz, Thanassis Avgerinos, and David Brumley, Carnegie Mellon University

    Read the Full paper

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    Cloaking Malware with the Trusted Platform Module
    Alan M. Dunn, Owen S. Hofmann, Brent Waters, and Emmett Witchel, The University of Texas at Austin

    Read the Full paper

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    INVITED TALKS

    Colonial Room

    The (Decentralized) SSL Observatory
    Peter Eckersley, Senior Staff Technologist for the Electronic Frontier Foundation, and Jesse Burns, Founding Partner, iSEC Partners

    View the Slides

    The EFF SSL Observatory project collects and publishes comprehensive datasets of the TLS/SSL certificates used by servers on the public Internet. These datasets provide numerous insights into the ways cryptography is used on the Web and the collective role of Certificate Authorities (CAs) in authenticating Web servers. This talk will review previous findings from the project's scans of port 443 in IPv4 address space and will present several new results. It will also describe the design and initial findings from the new, decentralized version of the Observatory.

    Peter Eckersley is a Senior Staff Technologist at the Electronic Frontier Foundation. His work at EFF has included privacy and security projects, such as Panopticlick, HTTPS Everywhere, Surveillance Self-Defense International, and the SSL Observatory, and running the first controlled tests to confirm that Comcast was using forged reset packets to interfere with P2P protocols. Peter's PhD at the University of Melbourne was on digital copyright and alternatives to digital copyright.

    Jesse Burns is a Principal Partner at iSec Partners, an application security consulting firm. His clients include many of the world's largest technology, telecommunications, and financial services firms.

    10:30 a.m.–11:00 a.m.   Break: Coffee and tea served in the Italian Room Foyer
    11:00 a.m.–12:30 p.m. Friday

    REFEREED PAPERS

    Grand Ballroom

    Dealing with Malware and Bots

    Session Chair: Niels Provos, Google, Inc.

    Detecting Malware Domains at the Upper DNS Hierarchy
    Manos Antonakakis, Damballa Inc. and Georgia Institute of Technology; Roberto Perdisci, University of Georgia; Wenke Lee, Georgia Institute of Technology; Nikolaos Vasiloglou II, Damballa Inc.; David Dagon, Georgia Institute of Technology

    Read the Full paper

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    BOTMAGNIFIER: Locating Spambots on the Internet
    Gianluca Stringhini, University of California, Santa Barbara; Thorsten Holz, Ruhr-University Bochum; Brett Stone-Gross, Christopher Kruegel, and Giovanni Vigna, University of California, Santa Barbara

    Read the Full paper

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    JACKSTRAWS: Picking Command and Control Connections from Bot Traffic
    Gregoire Jacob, University of California, Santa Barbara; Ralf Hund, Ruhr-University Bochum; Christopher Kruegel, University of California, Santa Barbara; Thorsten Holz, Ruhr-University Bochum

    Read the Full paper

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    PANEL

    Colonial Room

    SSL/TLS Certificates: Threat or Menace?

    Moderator: Eric Rescorla, RTFM, Inc.
    Panelists: Adam Langley, Google; Brian Smith, Mozilla; Stephen Schultze, Princeton University; Steve Kent, BBN Technologies

    Video View the Video

    MP3 Icon Listen to the MP3

    The security of SSL/TLS as used in practice depends on the security of the certificate hierarchy used to authenticate the servers. However, recent events have called the adequacy of that system into question: typical browsers trust a large number of root certificate authorities (trust anchors), and compromise of any of those anchors leads to the ability to impersonate more or less any server, as was demonstrated by the recent Comodo incident. Our panelists will talk about the state of the SSL/TLS authentication system, its future, and the various proposals for improvement and/or replacement.

    12:30 p.m.–2:00 p.m.   Lunch, on your own
    2:00 p.m.–3:30 p.m. Friday

    REFEREED PAPERS

    Grand Ballroom

    Privacy- and Freedom-Enhancing Technologies

    Session Chair: Matthew Green, Johns Hopkins University

    Telex: Anticensorship in the Network Infrastructure
    Eric Wustrow and Scott Wolchok, The University of Michigan; Ian Goldberg, University of Waterloo; J. Alex Halderman, The University of Michigan

    Read the Full paper

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval
    Prateek Mittal, University of Illinois at Urbana-Champaign; Femi Olumofin, University of Waterloo; Carmela Troncoso, K.U.Leuven/IBBT; Nikita Borisov, University of Illinois at Urbana-Champaign; Ian Goldberg, University of Waterloo

    Read the Full paper

    Video View the Video | Slides (PPTX)

    MP3 Icon Listen to the MP3

    The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion
    Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, and Hovav Shacham, University of California, San Diego

    Read the Full paper

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    INVITED TALKS

    Colonial Room

    Pico: No More Passwords!
    Frank Stajano, University of Cambridge

    Video View the Video

    MP3 Icon Listen to the MP3

    Passwords are no longer acceptable as a security mechanism. Memorable, unguessable, high entropy, regularly changed, never written down, and all different . . . a contradictory and unsatisfiable set of requests! Solutions have been offered for Web authentication; to users, though, non-Web passwords are just as annoying. I propose a portable gadget called Pico to get rid of passwords everywhere, not just online, transforming "what you know" into "what you have." Maybe your gut reaction to the controversial Pico will be "it'll never work," but I believe we have a duty to come up with something more usable than passwords.

    3:30 p.m.–4:00 p.m.   Break: Beverages served in the Italian Room Foyer
    4:00 p.m.–5:30 p.m. Friday

    REFEREED PAPERS

    Grand Ballroom

    Applied Cryptography

    Session Chair: Diana Smetters, Google, Inc.

    Differential Privacy Under Fire
    Andreas Haeberlen, Benjamin C. Pierce, and Arjun Narayan, University of Pennsylvania

    Read the Full paper

    Video View the Video | Slides (PDF) (PPTX)

    MP3 Icon Listen to the MP3

    Outsourcing the Decryption of ABE Ciphertexts
    Matthew Green and Susan Hohenberger, Johns Hopkins University; Brent Waters, University of Texas at Austin

    Read the Full paper (Updated 6/14/11)

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    Faster Secure Two-Party Computation Using Garbled Circuits
    Yan Huang and David Evans, University of Virginia; Jonathan Katz, University of Maryland; Lior Malka, Intel

    Read the Full paper

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    INVITED TALKS

    Colonial Room

    The Cloud-y Future of Security Technologies
    Adam O'Donnell, Co-founder & Director, Cloud Engineering Immunet

    Video View the Video | Slides

    MP3 Icon Listen to the MP3

    With a healthy dose of technologies and techniques borrowed from big-data companies such as Google and Facebook, engineers in the security industry have led a sea change in how security products are designed and implemented. Rather than rely upon ad hoc threat detection networks and loose partnerships with other security firms to detect new threats, security firms are moving to cloud-based product models, where threat information for malicious network traffic, malware, and various forms of attacks is centrally aggregated and processed from endpoints. Large teams of analysts-focused manual identification of threats are now being displaced by data mining and machine learning, pushing the effective time to live of an attack from weeks to hours. In this talk I will show you how it's been done.

    ?Need help? Use our Contacts page.

    Last changed: 29 May 2012 mpn
    输卵管堵塞吃什么药可以疏通 广西产什么水果 什么食物胆固醇高 糯米是什么米 铁窗泪什么意思
    早搏是什么意思 什么情况属于诈骗 李志为什么 什么学海无涯苦作舟 editor是什么意思
    月亮为什么会变成红色 瘙痒是什么意思 绿豆汤不能和什么一起吃 赤脚医生是什么意思 中国最厉害的武器是什么
    什么是肾上腺素 行政管理是做什么的 猴跟什么生肖相冲 醋加小苏打有什么作用 手足无措是什么意思
    脐带血能治疗什么病gysmod.com 阑珊是什么意思gysmod.com 唐僧姓什么hcv9jop1ns7r.cn 美是什么生肖hcv8jop9ns0r.cn 地黄长什么样gangsutong.com
    千什么一发hcv9jop3ns2r.cn 司局级是什么级别inbungee.com 属鼠的幸运色是什么颜色hcv9jop2ns3r.cn 偏头疼挂什么科室hcv8jop0ns7r.cn 七个星期五什么档次hcv7jop6ns6r.cn
    程度是什么意思hcv8jop1ns7r.cn 额头上有痣代表什么gysmod.com 邕是什么意思hcv8jop0ns0r.cn 突厥是现在的什么地方adwl56.com 20属什么生肖hcv9jop5ns9r.cn
    什么的北京城hcv8jop2ns6r.cn 尿肌酐低说明什么原因hcv9jop4ns3r.cn 1878年属什么生肖hcv7jop7ns2r.cn 颈椎疼挂什么科hcv9jop4ns7r.cn 耳朵出血是什么原因chuanglingweilai.com
    百度