FINAL PROGRAM2008 IEEE Symposium on Security and PrivacyMay 18-22, 2008The Claremont Resort
|
16:00-19:00 | Registration and Reception |
7:30-8:45 | Continental breakfast |
8:45-9:15 | Opening Remarks (Patrick McDaniel, Avi Rubin, Yong Guan) |
9:15-10:15 | Session: Peering
A Near-Optimal Social Network Defense Against Sybil Attacks Anonymous Networking with Minimum Latency in Multihop Networks |
10:15-10:45 | Break |
10:45-12:15 | Session: Communications Security
Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations Preserving Caller Anonymity in Voice-over-IP Networks Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping |
12:15-13:30 | Lunch |
13:30-15:00 | Session: Data
Casting out Demons: Sanitizing Training Data for Anomaly Sensors Efficient and Robust TCP Stream Normalization Robust De-Anonymization of Large Datasets |
15:00-15:30 | Break |
15:30-17:30 | Session: Attacks
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications Compromising Reflections -or- How to Read LCD Monitors Around the Corner ClearShot: Eavesdropping Keyboard Input from Video |
18:00-20:00 | Reception |
19:30-21:30 | Student Forum
Session Chair: David Du Room: Lanai 2 |
7:30-8:45 | Continental breakfast |
8:45-10:15 | Session: Miscellaneous
XFA: Faster signature matching with extended automata Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol Practical Privacy for Genomic Computation |
10:15-10:45 | Break |
10:45-12:15 | Session: Defenses
Lares: An Architecture for Secure Active Monitoring Using Virtualization Practical Proactive Integrity Preservation: A Basis for Malware Defense Preventing memory error exploits with WIT |
12:15-13:30 | Lunch |
13:30-15:00 | Session: Attacks II
Thinking Inside the Box: System-level Failures of Tamper Proofing Cloaker: Hardware Supported Rootkit Concealment Predictable Design of Network-Based Covert Communication Systems |
15:00-15:30 | Break |
15:30-17:00 |
Session: 5-minute Work-in-Progress Talks
|
17:15-18:30 | Business Meeting |
7:30-8:30 | Continental breakfast |
8:30-10:30 | Session: Programming Language Security
Verifying the Safety of User Pointer Dereferences Expressive declassification policies and modular static enforcement Civitas: Toward a Secure Voting System Fable: A Language for Enforcing User-defined Security Policies |
10:30-11:00 | Break |
11:00-12:30 | Session: Web and File Sharing Security
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications Secure web browsing with the OP web browser Automated formal analysis of a protocol for secure file sharing on untrusted storage |
12:30-12:45 | Closing Remarks (Patrick McDaniel, Avi Rubin, and David Du) |
7:30-18:00 | Digital Forensics Workshop (SADFE 2008) | Lanai 2 |
7:30-18:00 | Web 2.0 Security and Privacy Workshop (W2SP 2008) | Horizon |
Last modified: Wednesday May 11 21:34:01 EDT 2008 |