8:30-8:45 | |
8:45-10:00 | |
10:00-10:30 | |
10:30-12:00 | | | | Track A. Refereed Papers [Role-based Access Control]Lillian RøstadThe Role Hierarchy Mining Problem: Discovery of Optimal Role HierarchiesQi Guo, Jaideep Vaidya, Vijayalakshmi AtluriPermission Set Mining: Discovering Practical and Useful RolesDana Zhang, Kotagiri Ramamohanarao, Tim Ebringer, Trevor YannTowards Enforcing Role-Based Access Control Policies in Web Services with UML and OCLSohr Karsten, Mustafa Tanveer, Ahn Gail-Joon, Xinyu Bao |
Track B. Refereed Papers [Intrusion Detection]Arthur R. FriedmanAddressing Low Base Rates in Intrusion Detection via Uncertainty-Bounding Multi-Step AnalysisRobert Cole, Peng LiuToward Automatic Generation of Intrusion Detection System Verification RulesFrédéric Massicotte, Yvan Labiche, Lionel BriandSTILL: Exploit Code Detection via Static Taint and InitializationXinran Wang, Yoon-Chan Jhi, Sencun Zhu, Peng Liu |
Track C. Case Studies- Security Content Automation, John Banghart, Booz Allen Hamilton
- FISMA compliance for Federal agencies and commercial entities within a single, holistic, IA management framework, Richard Wilsher, Zygma, LLC
- Cryptographic Modernization for SPACE, Joe Bull, Booz Allen Hamilton
|
|
12:00-13:15 | |
13:15-14:45 | | | | Track A. Refereed Papers [Malware and Data Protection]Anas Abou El KalamMcBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of ExecutablesRoberto Perdisci, Andrea Lanzi, Wenke LeeMalTRAK: Tracking and Eliminating Unknown MalwareAmit VasudevanPreventing information leaks through shadow executionCapizzi Roberto, Antonio Longo, V.N. Venkatakrishnan, A. Prasad Sistla |
Track B. PanelSecurity and Privacy in an Expanding Cyber World,
Dr. Frank L. Greitzer (Co-chair), Pacific Northwest National
Laboratory, and Dr. Barbara Endicott-Popovsky (Co-chair), University of
Washington (UW) Center for Information Assurance and Cybersecurity; Dr.
Deborah A. Frincke, Pacific Northwest National Laboratory; John R.
Christiansen, Christiansen IT Law; Dr. Robert M. Mason, UW iSchool;
David Aucsmith, Microsoft |
Track C. Case StudiesOverview
of Federal Government Software Assurance Initiatives, Joe Jarzombek,
Director for Software Assurance, National Cyber Security Division,
Department of Homeland Security; Major Michael Klefman, Chief Technology
Officer, Application Software Assurance, USAF 754 ELSG/DOC; Sean Barum,
Principal Consultant, Cigital; Dan Wolf, Director, Software Assurance
Consortium |
|
14:45-15:15 | |
15:15-16:45 | | | | Track A. Refereed Papers [Web-based Applications Security]Robert H'obbes' ZakonXSSDS: Server-side detection of cross-site scripting attacksMartin Johns, Engelmann Bjoern, Joachim PoseggaAnti-Phishing in Offense and DefenseChuan Yue, Haining WangDesign and Implementation of an Open Framework for Secure Communication in Mashup Saman Zarandioon, Danfeng Yao, Vinod Ganapathy |
Track B. Refereed Papers [Anomaly and Misuse Detection]Carrie GatesBehavior-Profile Clustering For False Alert Reduction in Anomaly Detection SensorsVanessa Frias-Martinez, Salvatore J. Stolfo, Angelos D. KeromytisNetwork-Based Bluetooth Misuse Detection Terrence OConnor, Douglas ReevesBridging the Gap between Data-flow and Control-flow Analysis for Anomaly DetectionPeng Li, Hyundo Park, Debin Gao, Jianming Fu |
Track C. Case Studies
- Lessons Learned in Security Measurement, Nadya Bartol, Brian Bates, Booz Allen Hamilton
- Ritz Camera Center Achieves Picture-Perfect Security, Tom Murphy, Chief Strategist, Bit9
- Malicious Control System Cyber Security Attack Case Study -- Maroochy Water Services, Australia, Marshall Abrams, MITRE
|
|
16:45-17:15 | |
17:15-18:30 | |