Works in Progress Session, Thursday, December 13, 2007, 15:30 - 17:00
A methodology to build secure systems using patterns. Eduardo B. Fernandez, Maria M Larrondo-Petrie, and Michael VanHilst, Dept. of Computer Science and Eng., Florida Atlantic University, USA
Towards securing inter-device communication: Applying Inter-device Authentication and Authorization Framework to Home Appliances. Manabu Hirano, Takeshi Okuda, Suguru Yamaguchi, Toyota National College of Technology, Aichi, 471-8525, Japan, Nara Institute of Science and Technology, Nara, 630-0192, Japan
EXAMIN: Tools for Malware Incubation. Steve Brueckner, Greg Durrett, and Hajime Inoue, ATC-NY, Ithaca, NY, USA
Design and Implementation of a Portable Educational Network to Teach Cyber Security Curricula and Digital Forensics at a Community College. Donna Kaputa, Erie Community College, Williamsville, NY, USA
Towards a High Assurance, Multi-level Secure, Off-the-Shelf PC. David Kleidermacher, Green Hills Software, Inc.
Reducing Vulnerabilities in Software: A European Approach. Per Håkon Meland, Jostein Jensen and Lillian Røstad, SINTEF ICT - Software Engineering, Safety and Security, Trondheim, Norway
The Secflow source code security checker: Current problems and solution alternatives. Dr. Holger Peine and Stefan Mandel, Fraunhofer Institute for Experimental Software Engineering, Kaiserslautern, Germany
Dynamic, Intelligent and Adaptable Access Control. Lillian Røstad, Gunnar René Øie, and Øystein Nytrø, Norwegian University of Science and Technology, Department of Computer and Information Science, Norway
Network Security Analysis Using Attack Graphs. Anoop Singhal, Lingyu Wang, and Sushil Jajodia, Computer Security Division, NIST, Gaithersburg, Maryland, USA, Center for Secure Information Systems, George Mason University, Fairfax, Virginia, USA
Correlating Packet Timing with Memory Content Detects IP Covert Timing Channels. Richard Stillman, Graduate School of Computer and Information Sciences, Nova Southeastern University, Fort Lauderdale, Florida, USA
fakePointer: A User Authentication Scheme That Makes Peeping Attack with a Video Camera Hard. Tetsuji Takada, National Institute of Advanced Industrial Science and Technology, Tokyo, Japan
Security Analysis of the Native Code in Sun's JDK. Jason Croft and Gang Tan, Department of Computer Science, Boston College, Boston, Massachusetts, USA
Social Engineering: Where's the Research? Carol Taylor and Nolan Garrett, Computer Science Department, Eastern Washington University, Cheney, Washington, USA, 2Intrinium Networks, Spokane Valley, Washington, USA