ProgramRegistrationCFPHotelsTravelWorkshopsDonors
IEEE Symposium on Security and Privacy Workshops ieee-security

All sessions are in the Grand Ballroom. Other functions are in the Italian/Colonial with overflow in the Georgian and Borgia rooms. The poster session will have additional posters and food options in the Georgian room.

Sunday, 20 May 2012
4pm-7pm
Afternoon Registration and Welcome Reception
Registration will be open

Monday, 21 May 2012
7:30
Registration Opens; Breakfast Available
8:15-8:30
Opening Remarks: Rob Cunningham and Somesh Jha
8:30-10:10
Session 1: System Security
Chair: Adrian Perrig
A Framework to Eliminate Backdoors from Response Computable Authentication
Shuaifu Dai, Tao Wei, Chao Zhang, Tielei Wang, Yu Ding, and Wei Zou (Institute of Computer Science and Technology, Peking University), and Zhenkai Liang (National University of Singapore)
Safe Loading - A Foundation for Secure Execution of Untrusted Programs
Mathias Payer, Tobias Hartmann, and Thomas R. Gross (ETH Zurich)

slides

Flash Memory for Ubiquitous Hardware Security Functions: True Random Number Generation and Device Fingerprints
Yinglei Wang, Wing-kei Yu, Shuo Wu, Greg Malysa, G. Edward Suh, and Edwin Kan (Cornell University)

slides

ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions
Jiyong Jang, Abeer Agrawal, and David Brumley (Carnegie Mellon University)
10:10-10:30
Break
10:30-11:45
Session 2: Malware
Chair: Juan Caballero
[SoK]: Prudent Practices for Designing Malware Experiments: Status Quo and Outlook
Christian Rossow and Christian J. Dietrich (Institute for Internet Security, Gelsenkirchen), Chris Grier, Christian Kreibich, and Vern Paxson (International Computer Science Institute), Norbert Pohlmann (Institute for Internet Security, Gelsenkirchen), and Herbert Bos and Maarten van Steen (Vrije Universiteit Amsterdam)
Abusing File Processing in Malware Detectors for Fun and Profit
Suman Jana and Vitaly Shmatikov (University of Texas at Austin)

slides

[SoK]: Dissecting Android Malware: Characterization and Evolution
Yajin Zhou and Xuxian Jiang (North Carolina State University)
11:45-1:00
Lunch
1:00-2:20
Session 3: Attacks 1
Chair: Guofei Gu
Distance Hijacking Attacks on Distance Bounding Protocols
Cas Cremers (ETH Zurich), Kasper Bonne Rasmussen (University of California, Irvine), and Benedikt Schmidt and Srdjan Capkun (ETH Zurich)

slides

Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards
Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, and Thorsten Holz (Horst-Goertz Institute)
Memento: Learning Secrets from Process Footprints
Suman Jana and Vitaly Shmatikov (University of Texas at Austin)

slides

2:20-2:45
Short Break
2:45-4:05
Session 4: Foundations
Chair: Michael Backes
Foundations of Logic-Based Trust Management
Moritz Y. Becker (Microsoft Research), Alessandra Russo (Imperial College, London), and Nik Sultana (University of Cambridge)
Formalizing and Enforcing Purpose Restrictions of Privacy Policies
Michael Carl Tschantz, Anupam Datta, and Jeannette M. Wing (Carnegie Mellon University)
Sharing Mobile Code Securely With Information Flow Control
Owen Arden, Michael George, Jed Liu, K. Vikram, Aslan Askarov, and Andrew C. Myers (Cornell University)
4:05-4:30
Break
4:30-5:45
Session 5: Access Control and Attestation
Chair: Jonathan McCune
[SoK]: The Psychology of Security for the Home Computer User
Adele Howe, Indrajit Ray, Mark Roberts, Malgorzata Urbanska, and Zinta Byrne (Colorado State University)
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems
Franziska Roesner and Tadayoshi Kohno (University of Washington), Alexander Moshchuk, Bryan Parno, and Helen J. Wang (Microsoft Research), and Crispin Cowan (Microsoft)
New Results for Timing-Based Attestation
Xeno Kovah, Corey Kallenberg, Chris Weathers, Amy Herzog, Matthew Albin, and John Butterworth (MITRE)
5:45-8:00
Poster Reception

List of posters available here.


Tuesday, 22 May 2012
7:45
Registration Opens; Breakfast Available
8:15-8:30
Best Paper Awards: Somesh Jha
8:30-10:10
Session 6: Privacy
Chair: Xiaofeng Wang
ObliviAd: Provably Secure and Practical Online Behavioral Advertising
Michael Backes (Saarland University, MPI-SWS), Aniket Kate (MPI-SWS), and Matteo Maffei and Kim Pecina (Saarland University)
Quid-Pro-Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution
Yan Huang (University of Virginia), Jonathan Katz (University of Maryland), and David Evans (University of Virginia)
Hummingbird: Privacy at the time of Twitter
Emiliano De Cristofaro (PARC), Claudio Soriente (Universidad Politécnica de Madrid, Spain), and Gene Tsudik and Andrew Williams (UC Irvine)
On the Feasibility of Internet-Scale Author Identification
Arvind Narayanan and Hristo Paskov (CS, Stanford), Neil Zhenqiang Gong, John Bethencourt, Emil Stefanov, Eui Chul Richard Shin and Dawn Song (EECS, UC Berkeley)
10:10-10:30
Break
10:30-11:45
Session 7: Network Security
Chair: Roberto Perdisci
Scalable Fault Localization under Dynamic Traffic Patterns
Xin Zhang (Carnegie Mellon University), Chang Lan (Tsinghua University), and Adrian Perrig (Carnegie Mellon University)
[SoK]: Peek-a-Boo, I Still See you: Why Efficient Traffic Analysis Countermeasures Fail
Kevin P. Dyer (Portland State University), Scott E. Coull (RedJack, LLC), Thomas Ristenpart (University of Wisconsin-Madison), and Thomas Shrimpton (Portland State University)

slides

Off-Path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security
Zhiyun Qian and Z. Morley Mao (University of Michigan)
11:45-1:00
Lunch
1:00-2:20
Session 8: Attacks 2
Chair: Kevin Butler
Signing Me onto Your Accounts through Facebook and Google: a Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services
Rui Wang (Indiana University Bloomington), Shuo Chen (Microsoft Research), and XiaoFeng Wang (Indiana University Bloomington)

slides

Unleashing Mayhem on Binary Code
Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert, and David Brumley (Carnegie Mellon University)

slides

Clash Attacks on the Verifiability of E-Voting Systems
Ralf Kuesters, Tomasz Truderung, and Andreas Vogt (University of Trier)

slides

2:20-2:45
Short Break
2:45-4:05
Session 9: Web Security
Chair: Venkat Venkatkrishnan
[SoK]: Third-Party Web Tracking Policy and Technology
Jonathan R. Mayer, John C. Mitchell (Stanford University)
EvilSeed: A Guided Approach to Finding Malicious Web Pages
Luca Invernizzi (University of California, Santa Barbara), Stefano Benvenuti (University of Genova), Paolo Milani Comparetti (Vienna University of Technology), Marco Cova (University of Birmingham), Christopher Kruegel, and Giovanni Vigna (University of California, Santa Barbara)

slides

Rozzle: De-Cloaking Internet Malware
Clemens Kolbitsch (Technical University of Vienna), Benjamin Livshits and Benjamin Zorn (Microsoft Research), and Christian Seifert (Microsoft)
4:05-4:30
Break
4:30-5:30
Short Talks
Chair: Anupam Datta

List of short talks available here.

5:30-5:45
Short Break
5:45-6:45
Business Meeting: Sven Dietrich


Wednesday, 23 May 2012
7:45
Registration Opens; Breakfast Available
8:15-8:30
Awards and Plans for 2013: Sven Dietrich, Robin Sommer and Wenke Lee
8:30-10:10
Session 10: Privacy and Anonymity
Chair: Zachary Peterson
Detecting Hoaxes, Frauds, and Deception in Writing Style Online
Sadia Afroz, Michael Brennan, and Rachel Greenstadt (Drexel University)

slides

LASTor: A Low-Latency AS-Aware Tor Client
Masoud Akhoondi, Curtis Yu, and Harsha V. Madhyastha (UC Riverside)
[SoK]: OB-PWS: Obfuscation-Based Private Web Search
Ero Balsa, Carmela Troncoso, and Claudia Diaz (KULeuven-COSIC/IBBT)

slides

LAP: Lightweight Anonymity and Privacy
Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, and Adrian Perrig (CMU), Akira Yamada (KDDI R&D), Sam Nelson and Marco Gruteser (Rutgers University), and Wei Ming (Tsinghua University)
10:10-10:30
Break
10:30-11:45
Session 11: Passwords
Chair: William Enck
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Tim Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, and Julio Lopez (Carnegie Mellon University)

slides

The science of guessing: analyzing an anonymized corpus of 70 million passwords
Joseph Bonneau (University of Cambridge)
[SoK] The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
Joseph Bonneau (University of Cambridge), Cormac Herley (Microsoft Research), Paul C. van Oorschot (Carleton U), and Frank Stajano (University of Cambridge)
11:45-1:00
Lunch
1:00-2:45
Session 12: System Security
Chair: Bryan Payne
ILR: Where'd My Gadgets Go?
Jason D. Hiser, Anh Nguyen-Tuong, Michele Co, Matthew Hall, and Jack W. Davidson (University of Virginia)
Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection
Yangchun Fu and Zhiqiang Lin (The University of Texas at Dallas)
Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization
Vasilis Pappas, Michalis Polychronakis, and Angelos D. Keromytis (Columbia University)

slides

Building Verifiable Trusted Path on Commodity X86 Computers
Zongwei Zhou, Virgil Gligor, James Newsome, and Jonathan M. McCune (Carnegie Mellon University)
2:45-3:15
Break
3:15-4:55
Panel Discussion: How can a focus on "science" advance research in cybersecurity?
Moderator: Carl Landwehr (Independent Consultant)
Panelists: Alessandro Acquisti (Carnegie Mellon), Dan Boneh (Stanford), Joshua Guttman (Worcester Polytechnic Institute), Wenke Lee (Georgia Tech), Cormac Herley (Microsoft)

What is meant by a "Science of (Cyber)Security", and why is the US Government focusing on the need for "science" in this domain? No doubt most Symposium attendees believe they are conducting research in a scientific fashion already. The panelists will attempt to address these questions and to illuminate by example some methods that can accelerate progress and develop stronger foundations for a body of knowledge in cybersecurity. Substantial interaction between the audience the panelists is sought.

Participants who wish to prepare for this discussion on Science of Security on Wednesday afternoon should take a look at the Wikipedia entry on "Strong Inference":

http://en.wikipedia.org/wiki/Strong_inference

In particular, if you have time, skim Platt's paper.

5:00
Conference Ends


Conference News
Panel Preparation
May 22, 2012
Participants who wish to prepare for the discussion on Science of Security on Wednesday afternoon should take a look at the Wikipedia entry on "Strong Inference", link. In particular, if you have time, skim Platt's paper.
Best Paper Awards!
May 22, 2012 Congratulations to the paper award winners.
Best paper award: Don't Trust Satellite Phones
Best student paper award sponsored by Google: Memento
Best practical paper award sponsored by IEEE Security and Privacy Magazine: User-Driven Access Control
Short Talks Announced
May 17, 2012
The eleven short talks for the Tuesday evening session have been announced. The list is available here.
Airport Westin Shuttle Schedule Posted
May 15, 2012
The schedule for the shuttle between the Westing San Francisco Airport and the Westin St. Francis has been posted on the travel page and the hotels page.
Poster Abstracts Added
May 14, 2012
Abstracts for (almost) all the posters in the Monday evening poster session can be viewed here.
Special Rebate Offer!
April 22, 2012
$100 off of the symposium price, for anyone paying full price in his/her category and staying at the Airport Westin and registering with our room block. See the hotels page for more details.
Call for Short Talks posted
April 20, 2012
The Call for Short Talks has been posted on the Call for Papers page. The deadline for submission of abstracts is May 11, 2012.
List of accepted posters available
April 15, 2012
The list of accepted posters can now be viewed posters. The poster session will be Monday, May 21 from 5:45-8:00pm.
Panel of experts formed
April 6, 2012
The panel discussion on Wednesday afternoon will be titled: "How can a focus on "science" advance research in cybersecurity?". Discussion will be moderated by Carl Landwehr. See the program for a detailed description and list of distinguished panelists.
Student Travel Grants Awarded
April 5, 2012
The IEEE S&P 2012 Organizing Committee has awarded 24 student travel grants. More information is available in the "News Bulletin" section of the press page.
Registration Open
March 1, 2012
Registration for the 2012 symposium is now open.
Program Posted
February 22, 2012
The conference program has been posted.
Hotel Booking Available
February 13, 2012
Hotel details have been posted. There are room blocks available at two San Francisco area hotels. Conference registration information will follow shortly.
Call For Posters
February 13, 2012
Adam Chlipala has been named as this years Poster Session Chair. Poster submission details have been posted. The deadline for abstracts is April 6, 2012.
Tentative Skeleton Program Posted
January 28, 2012
Program details are still being finalized. Attendees from past years should be aware that the conference is likely to continue later into Wednesday afternoon than in prior years.
Student Travel Grants
January 10, 2012
Information for students who wish to apply for travel grants is now posted here.
2012 Donors Rolling In
December 16, 2011
Many have already generously donated to the 2012 symposium. Information about donating and the benefits therein can be found here.
2011 Proceedings Available Online
November 1, 2011
All the papers for the 2011 symposium have been made available free of charge at ieee-security.org.
New Venue Confirmed!
October 10, 2011
The 2012 conference will be held at the Westin St. Francis. Detailed hotel and travel information has been posted on the travel page.
Call For Donors Posted
September 12, 2011
Information about donating to the IEEE Symposium on Security and Privacy and the IEEE Security and Privacy Workshops has been posted here.
Call For Papers Posted
August 12, 2011
The 2012 IEEE Symposium on Security and Privacy Call for Papers is now posted here.
Workshop Proposal Deadlines Approaching
August 11, 2011
IEEE S&P Workshop proposals have been accepted, but room is still available, and the deadline, August 15, 2011, is approaching for the second round of proposals. More information available here.
New Website Up
June 21, 2011
The new version of the 2012 conference website is now up.

Find ieeesp2012 on Facebook Follow IEEE_SP2012 on Twitter

Found an error? E-mail ajohnson@seas.harvard.edu.