FINAL PROGRAM2007 IEEE Symposium on Security and PrivacyMay 20-23, 2007The Claremont Resort
|
16:00-19:00 | Registration and Reception |
7:30-9:00 | Continental breakfast |
9:00-9:15 | Opening Remarks (Deborah Shands, Birgit Pfitzmann) |
9:15-10:15 | Keynote Talk |
10:15-10:45 | Break |
10:45-12:15 | Session: Network Security
Accurate Real-time Identification of IP Prefix Hijacking DSSS-Based Flow Marking Technique for Invisible Traceback On the Safety and Efficiency of Firewall Policy Deployment |
12:15-13:45 | Lunch | 13:45-15:30 | Session: Authentication
The Emperor's New Security Indicators: An evaluation of website authentication and the effect of role playing on usability studies Cryptanalysis of a Cognitive Authentication Scheme A Systematic Approach to Uncover Security Flaws in GUI Logic Forward-Secure Sequential Aggregate Authentication Extended abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos |
15:30-16:00 | Break |
16:00-17:30 |
Session: 5-minute Work-in-Progress Talks
|
18:00-20:00 | Reception |
7:30-9:00 | Continental breakfast | 9:00-10:30 | Session: Privacy
Endorsed E-Cash Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems Improving the Robustness of Private Information Retrieval |
10:30-11:00 | Break |
11:00-12:15 | Session: Access Control and Audit
Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model Usable Mandatory Integrity Protection for Operating Systems Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments (Extended abstract) |
12:15-13:45 | Lunch |
13:45-15:15 | Session: Information Flow
Information Flow in the Peer-Reviewing Process (Extended Abstract) A Cryptographic Decentralized Label Model Gradual Release: Unifying Declassification, Encryption and Key Release Policies Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control |
15:15-15:45 | Break |
15:45-17:30 | Session: Host Security
Exploring Multiple Execution Paths for Malware Analysis Lurking in the Shadows: Identifying Systemic Threats to Kernel Data ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing Minimal TCB Code Execution Using Rescue Points to Navigate Software Recovery (Short Paper) |
17:30-17:45 | Break |
17:45-18:30 | Business Meeting |
7:30-9:00 | Continental breakfast | 9:00-10:30 | Session: Hardware and Replication
Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems Trojan Detection using IC Fingerprinting On the Optimal Communication Complexity of Multiphase Protocols for Perfect Communication |
10:30-11:00 | Break | 11:00-12:30 | Session: Encryption
Ciphertext-Policy Attribute-Based Encryption Attacking the IPsec Standards in Encryption-only Configurations Multi-Dimensional Range Query over Encrypted Data |
12:30-12:45 | Closing Remarks (Patrick McDaniel, Avi Rubin, and Yong Guan) |
11:00-13:00 | Boxed lunch |
Last modified: Fri May 11 11:43:00 EDT 2007 |