Web 2.0 Security & Privacy 2015
Thursday May 21, 2015
The Fairmont Hotel, San Jose, California
The goal of this one-day workshop is to bring together researchers, practitioners, web programmers, policy makers, and others interested in the latest understanding and advances in the security and privacy of the web, browsers, cloud, mobile and their eco-system. We have had eight years of successful W2SP workshops.
More information regarding workshops co-located with the 2015 IEEE Symposium on Security and Privacy can be found on the conference website.
Previous W2SP Workshops:  2014, 2013, 2012, 2011, 2010, 2009, 2008, 2007
Read the 2015 Call For Papers
Schedule
7:30–8:30 | Breakfast |
---|---|
8:30–8:50 | Welcome + Best Paper award |
8:50–9:50 | Keynote: Making browser security usable: successes & open challenges |
Speaker: Adrienne Porter Felt - Software Engineer, Google
|
|
9:50–10:20 | Variations in Tracking in Relation to Geographic Location (Download Paper) (Slides) |
Authors: Nathaniel Fruchter, Hsin Miao, Scott Stevenson (Carnegie Mellon University), Rebecca Balebako (RAND Corporation) |
|
10:20–10:50 | Morning Break |
10:50–12:30 | Session 1: Tracking and Privacy Extensions |
Paper: Because we care: Privacy Dashboard on Firefox OS (Download Paper) (Slides)
|
|
Paper: Tracking Protection in Firefox For Privacy and Performance (Download Paper) (Slides)
|
|
Paper: The Case for a General and Interaction-based Third-party Cookie Policy (Download Paper) (Slides)
|
|
12:30–1:30 | Lunch |
1:30–3:10 | Session 2: Attacks & Defenses |
Paper: Stickler: Defending Against Malicious CDNs in an Unmodified Browser (Download Paper)
|
|
Paper: Breaking Bad: Detecting malicious domains using word segmentation (Download Paper) (Slides)
|
|
Paper: Owning Your Home Network: Router Security Revisited (Download Paper) (Slides)
|
|
3:10–3:40 | Afternoon Break |
3:40–5:10 | Session 3: Security Assessments & Solutions |
Paper: Practical Solutions For Format-Preserving Encryption (Download Paper) (Slides)
|
|
Paper: Genuine onion: Simple, Fast, Flexible, and Cheap Website Authentication (Download Paper) (Slides)
|
|
Paper: No SQL, No Injection? Examining NoSQL Security (Download Paper) (Slides)
|
Workshop Co-Chairs
Larry Koved (IBM T.J. Watson Research Center)
Tyrone Grandison (Proficiency Labs)
Program Chairs
Sean Thorpe (University of Technology, Jamaica)
Abigail Goldsteen (IBM Research Haifa)
Program Committee
Sonali Batra (Operation Asha)Rinku Dewri (University of Denver)
Kevin Snow (UNC, Chapel Hill)
Leon Stenneth (Nokia Research Labs, Chicago)
Michael Losavio (University of Louisville)
Rose Gamble (University of Tulsa)
Brajendra Panda (University of Arkansas)
Abbie Barbir (Bank of America)
Iman Saleh (University of Miami)
Peter Bodorik (Dalhouise University)
Gary Kessler (Embry Aeronautical University)
Sabrina De Capitani di Vimercati (University of Milan)
Sara Foresti (University of Milan)
Pierangela Samarati (University of Milan)
Murat Kantarcioglu (University of Texas Dallas)
Micha Moffie (IBM Research)
Alexandra Shulman-Peleg (IBM Research)
Per Håkon Meland (SINTEF)
Julia Rubin (MIT)
Arik Friedman (NICTA)
Sid Stamm (Mozilla)
Sonia Jahid (VMware)
Dieter Gollmann (SVA)
Brad Malin (Vanderbilt University)
Anand Prakash (Flipkart)
Alex Smolen (Twitter)
Michael Franz (University of California - Irvine)
James Kettle (PortSwigger)
Carrie Gates (CA Technologies)
Carmela Troncoso (Gradiant)
Saman Zonouz (Rutgers University)
Bo Zhao (SAMSUNG Research America)