All sessions are in the Grand Ballroom.
Other functions are in the Italian/Colonial with overflow in the Georgian and Borgia rooms.
The poster session will have additional posters and food options in the Georgian room.
Sunday, 20 May 2012
4pm-7pm
Afternoon Registration and Welcome Reception
Registration will be open
Monday, 21 May 2012
7:30
Registration Opens; Breakfast Available
8:15-8:30
Opening Remarks: Rob Cunningham and Somesh Jha
8:30-10:10
Session 1: System Security
Chair: Adrian Perrig
A Framework to Eliminate Backdoors from Response Computable Authentication
Shuaifu Dai,
Tao Wei,
Chao Zhang,
Tielei Wang,
Yu Ding,
and Wei Zou (Institute of Computer Science and Technology, Peking University),
and Zhenkai Liang (National University of Singapore)
Safe Loading - A Foundation for Secure Execution of Untrusted Programs
Mathias Payer,
Tobias Hartmann,
and Thomas R. Gross (ETH Zurich)
slides
Flash Memory for Ubiquitous Hardware Security Functions: True Random Number Generation and Device Fingerprints
Yinglei Wang,
Wing-kei Yu,
Shuo Wu,
Greg Malysa,
G. Edward Suh,
and Edwin Kan (Cornell University)
slides
ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions
Jiyong Jang,
Abeer Agrawal,
and David Brumley (Carnegie Mellon University)
10:10-10:30
Break
10:30-11:45
Session 2: Malware
Chair: Juan Caballero
[SoK]: Prudent Practices for Designing Malware Experiments: Status Quo and Outlook
Christian Rossow
and Christian J. Dietrich (Institute for Internet Security, Gelsenkirchen),
Chris Grier,
Christian Kreibich,
and Vern Paxson (International Computer Science Institute),
Norbert Pohlmann (Institute for Internet Security, Gelsenkirchen), and Herbert Bos
and Maarten van Steen (Vrije Universiteit Amsterdam)
Abusing File Processing in Malware Detectors for Fun and Profit
Suman Jana
and Vitaly Shmatikov (University of Texas at Austin)
slides
[SoK]: Dissecting Android Malware: Characterization and Evolution
Yajin Zhou
and Xuxian Jiang (North Carolina State University)
11:45-1:00
Lunch
1:00-2:20
Session 3: Attacks 1
Chair: Guofei Gu
Distance Hijacking Attacks on Distance Bounding Protocols
Cas Cremers (ETH Zurich),
Kasper Bonne Rasmussen (University of California, Irvine),
and Benedikt Schmidt
and Srdjan Capkun (ETH Zurich)
slides
Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards
Benedikt Driessen,
Ralf Hund,
Carsten Willems,
Christof Paar,
and Thorsten Holz (Horst-Goertz Institute)
Memento: Learning Secrets from Process Footprints
Suman Jana
and Vitaly Shmatikov (University of Texas at Austin)
slides
2:20-2:45
Short Break
2:45-4:05
Session 4: Foundations
Chair: Michael Backes
Foundations of Logic-Based Trust Management
Moritz Y. Becker (Microsoft Research),
Alessandra Russo (Imperial College, London),
and Nik Sultana (University of Cambridge)
Formalizing and Enforcing Purpose Restrictions of Privacy Policies
Michael Carl Tschantz,
Anupam Datta, and
Jeannette M. Wing (Carnegie Mellon University)
Sharing Mobile Code Securely With Information Flow Control
Owen Arden,
Michael George,
Jed Liu,
K. Vikram,
Aslan Askarov,
and Andrew C. Myers (Cornell University)
4:05-4:30
Break
4:30-5:45
Session 5: Access Control and Attestation
Chair: Jonathan McCune
[SoK]: The Psychology of Security for the Home Computer User
Adele Howe,
Indrajit Ray,
Mark Roberts,
Malgorzata Urbanska,
and Zinta Byrne (Colorado State University)
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems
Franziska Roesner
and Tadayoshi Kohno (University of Washington),
Alexander Moshchuk,
Bryan Parno,
and Helen J. Wang (Microsoft Research),
and Crispin Cowan (Microsoft)
New Results for Timing-Based Attestation
Xeno Kovah,
Corey Kallenberg,
Chris Weathers,
Amy Herzog,
Matthew Albin,
and John Butterworth (MITRE)
5:45-8:00
Poster Reception
List of posters available here.
Tuesday, 22 May 2012
7:45
Registration Opens; Breakfast Available
8:15-8:30
Best Paper Awards: Somesh Jha
8:30-10:10
Session 6: Privacy
Chair: Xiaofeng Wang
ObliviAd: Provably Secure and Practical Online Behavioral Advertising
Michael Backes (Saarland University, MPI-SWS),
Aniket Kate (MPI-SWS),
and Matteo Maffei
and Kim Pecina (Saarland University)
Quid-Pro-Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution
Yan Huang (University of Virginia),
Jonathan Katz (University of Maryland),
and David Evans (University of Virginia)
Hummingbird: Privacy at the time of Twitter
Emiliano De Cristofaro (PARC),
Claudio Soriente (Universidad Politécnica de Madrid, Spain), and Gene Tsudik
and Andrew Williams (UC Irvine)
On the Feasibility of Internet-Scale Author Identification
Arvind Narayanan
and Hristo Paskov (CS, Stanford),
Neil Zhenqiang Gong,
John Bethencourt,
Emil Stefanov,
Eui Chul Richard Shin
and Dawn Song (EECS, UC Berkeley)
10:10-10:30
Break
10:30-11:45
Session 7: Network Security
Chair: Roberto Perdisci
Scalable Fault Localization under Dynamic Traffic Patterns
Xin Zhang (Carnegie Mellon University),
Chang Lan (Tsinghua University),
and Adrian Perrig (Carnegie Mellon University)
[SoK]: Peek-a-Boo, I Still See you: Why Efficient Traffic Analysis Countermeasures Fail
Kevin P. Dyer (Portland State University),
Scott E. Coull (RedJack, LLC),
Thomas Ristenpart (University of Wisconsin-Madison),
and Thomas Shrimpton (Portland State University)
slides
Off-Path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security
Zhiyun Qian
and Z. Morley Mao (University of Michigan)
11:45-1:00
Lunch
1:00-2:20
Session 8: Attacks 2
Chair: Kevin Butler
Signing Me onto Your Accounts through Facebook and Google: a Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services
Rui Wang (Indiana University Bloomington),
Shuo Chen (Microsoft Research),
and XiaoFeng Wang (Indiana University Bloomington)
slides
Unleashing Mayhem on Binary Code
Sang Kil Cha,
Thanassis Avgerinos,
Alexandre Rebert,
and David Brumley (Carnegie Mellon University)
slides
Clash Attacks on the Verifiability of E-Voting Systems
Ralf Kuesters,
Tomasz Truderung,
and Andreas Vogt (University of Trier)
slides
2:20-2:45
Short Break
2:45-4:05
Session 9: Web Security
Chair: Venkat Venkatkrishnan
[SoK]: Third-Party Web Tracking Policy and Technology
Jonathan R. Mayer,
John C. Mitchell (Stanford University)
EvilSeed: A Guided Approach to Finding Malicious Web Pages
Luca Invernizzi (University of California, Santa Barbara),
Stefano Benvenuti (University of Genova),
Paolo Milani Comparetti (Vienna University of Technology),
Marco Cova (University of Birmingham),
Christopher Kruegel,
and Giovanni Vigna (University of California, Santa Barbara)
slides
Rozzle: De-Cloaking Internet Malware
Clemens Kolbitsch (Technical University of Vienna),
Benjamin Livshits
and Benjamin Zorn (Microsoft Research),
and Christian Seifert (Microsoft)
4:05-4:30
Break
4:30-5:30
Short Talks
Chair: Anupam Datta
List of short talks available here.
5:30-5:45
Short Break
5:45-6:45
Business Meeting: Sven Dietrich
Wednesday, 23 May 2012
7:45
Registration Opens; Breakfast Available
8:15-8:30
Awards and Plans for 2013: Sven Dietrich, Robin Sommer and Wenke Lee
8:30-10:10
Session 10: Privacy and Anonymity
Chair: Zachary Peterson
Detecting Hoaxes, Frauds, and Deception in Writing Style Online
Sadia Afroz,
Michael Brennan,
and Rachel Greenstadt (Drexel University)
slides
LASTor: A Low-Latency AS-Aware Tor Client
Masoud Akhoondi,
Curtis Yu,
and Harsha V. Madhyastha (UC Riverside)
[SoK]: OB-PWS: Obfuscation-Based Private Web Search
Ero Balsa,
Carmela Troncoso,
and Claudia Diaz (KULeuven-COSIC/IBBT)
slides
LAP: Lightweight Anonymity and Privacy
Hsu-Chun Hsiao,
Tiffany Hyun-Jin Kim,
and Adrian Perrig (CMU),
Akira Yamada (KDDI R&D),
Sam Nelson
and Marco Gruteser (Rutgers University),
and Wei Ming (Tsinghua University)
10:10-10:30
Break
10:30-11:45
Session 11: Passwords
Chair: William Enck
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
Patrick Gage Kelley,
Saranga Komanduri,
Michelle L. Mazurek,
Richard Shay,
Tim Vidas,
Lujo Bauer,
Nicolas Christin,
Lorrie Faith Cranor,
and Julio Lopez (Carnegie Mellon University)
slides
The science of guessing: analyzing an anonymized corpus of 70 million passwords
Joseph Bonneau (University of Cambridge)
[SoK] The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
Joseph Bonneau (University of Cambridge),
Cormac Herley (Microsoft Research),
Paul C. van Oorschot (Carleton U),
and Frank Stajano (University of Cambridge)
11:45-1:00
Lunch
1:00-2:45
Session 12: System Security
Chair: Bryan Payne
ILR: Where'd My Gadgets Go?
Jason D. Hiser,
Anh Nguyen-Tuong,
Michele Co,
Matthew Hall,
and Jack W. Davidson (University of Virginia)
Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection
Yangchun Fu
and Zhiqiang Lin (The University of Texas at Dallas)
Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization
Vasilis Pappas,
Michalis Polychronakis,
and Angelos D. Keromytis (Columbia University)
slides
Building Verifiable Trusted Path on Commodity X86 Computers
Zongwei Zhou,
Virgil Gligor,
James Newsome,
and Jonathan M. McCune (Carnegie Mellon University)
2:45-3:15
Break
3:15-4:55
Panel Discussion: How can a focus on "science" advance research in cybersecurity?
Moderator: Carl Landwehr (Independent Consultant)
Panelists:
Alessandro Acquisti (Carnegie Mellon),
Dan Boneh (Stanford),
Joshua Guttman (Worcester Polytechnic Institute),
Wenke Lee (Georgia Tech),
Cormac Herley (Microsoft)
What is meant by a "Science of (Cyber)Security", and why
is the US Government focusing on the need for "science" in this
domain? No doubt most Symposium attendees believe they are
conducting research in a scientific fashion already. The panelists
will attempt to address these questions and to illuminate by example
some methods that can accelerate progress and develop stronger
foundations for a body of knowledge in cybersecurity. Substantial
interaction between the audience the panelists is sought.
Participants who wish to prepare for this discussion on Science of
Security on Wednesday afternoon should take a look at the Wikipedia
entry on "Strong Inference":
http://en.wikipedia.org/wiki/Strong_inference
In particular, if you have time, skim Platt's paper.
5:00
Conference Ends