7:30-8:30 | Continental Breakfast (Foyer C) |
|
8:30-8:45 | Opening Remarks (Molokai)Dr. Carrie Gates, Conference Chair |
|
8:45-9:00 | Welcome from the Mayor (Molokai)The Honorable Mufi Hannemann, Mayor of Honolulu |
|
9:00-10:00 | Invited Essayist (Molokai)The Good, The Bad, And The Ugly: Stepping on the Security Scale
Mary Ann Davidson, Oracle |
|
10:00-10:30 | |
10:30-12:00 | Honolulu | Kahuku | Oahu | Waialua | Authentication and AuditPatrick TraynorA New Approach for Anonymous Password AuthenticationYanjiang Yang, Jianying Zhou, Jian Weng, Feng BaoOn the Security of PAS (Predicate-based Authentication Service)Shujun Li, Hassan Jameel, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong WangBAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed SystemsAttila Altay Yavuz, Peng Ning |
The New Security Paradigm ExperienceChair: Anil Somayaji, Carleton University
Panelists:
Hilary Hosmer, Data Security,
"The NSPW Psychological Contract";
Maritza Johnson, Columbia University
"Laissez-faire file sharing";
Cormac Herley, Microsoft Research
"So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users"
|
Privilege Management in Operational Information SharingChair: Art Friedman, DoD
Panelists: Bob Greenberg, DNI; Cheryl Traverse, Xceedium; Ryan Fox, Booz Allen Hamilton; Jeremy Wyant, General Dynamics |
Cyber Security Controls: NIST SP 800-53 rev 3 and CNSS 1253Instructor: Ron Ross, NIST
A FISMA Training Feature |
|
12:00-13:30 | |
13:30-15:00 | Honolulu | Kahuku | Oahu | Waialua | Malware, Botnets and OS Security (Part 1)Peng NingFIRE: FInding Rogue nEtworksBrett Stone-Gross, Andy Moser, Christopher Kruegel, Engin Kirda, Kevin AlmerothActive Botnet Probing to Identify Obscure Command and Control ChannelsGuofei Gu, Vinod Yegneswaran, Phillip Porras, Jennifer Stoll, Wenke LeeTrustGraph: Trusted Graphics Subsystem for High Assurance SystemsHamed Okhravi, David M. Nicol |
DoS DefenseWesley HigakiRAD: Reflector Attack Defense Using Message Authentication CodesErik Kline, Matt Beaumont-Gay, Jelena Mirkovic, Peter ReiherA Guided Tour Puzzle for Denial of Service PreventionMehmud Abliz, Taieb ZnatiOnline Signature Generation for Windows SystemsLixin Li, James Just, R. Sekar |
Case StudiesCapt. Traci SamientoLessons Learned from the First High Assurance (EAL 6+) Common Criteria Software Certification
David Kleidermacher, CTO, INTEGRITY Global Security LLC
Lessons Learned from the development of the First Nuclear Power Plant Cyber Security Program: Moving beyond risk
Eric Lee, US NRC
Challenges in Sharing Security Information
Ian Bryant, Information Assurance Advisor, MS3i Project |
Near Real-Time Risk Management Process: NIST SP 800-37Instructor: Ron Ross, NIST
A FISMA Training Feature |
|
15:00-15:30 | |
15:30-17:00 | Honolulu | Kahuku | Oahu | Waialua | Malware, Botnets and OS Security (Part 2)Ken ShottingProtecting Commodity OS Kernels from Vulnerable Device DriversShakeel Butt, Vinod Ganapathy, Michael Swift, Chih-Cheng ChangDetecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS TracesRoberto Perdisci, Igino Corona, David Dagon, Wenke LeeIdentification of Bot Commands By Run-time Execution MonitoringYoung Hee Park, Douglas Reeves |
Security Evaluations: Who Watches the Watchers?Moderator: Jeremy Epstein, SRI International
Panelists:
Paul Karger, IBM;
Chris Salter, National Security Agency;
Helmut Kurth, atsec;
Wes Higaki, CCVF |
Mobile SecurityRobert ZakonTransparent Encryption for External Storage Media with Key Management Adapted to Mobile UseAlf Zugenmaier, Sven Lachmund, Dileesh JostinSemantically Rich Application-Centric Security in AndroidMachigar Ongtang, Stephen McLaughlin, William Enck, Patrick McDanielLeveraging Cellular Infrastructure to Improve Fraud PreventionFrank Park, Chinmay Gangakhedkar, Patrick Traynor |
Multimedia and Web SecurityUlf LindqvistAnalyzing and Detecting Malicious Flash AdvertisementsSean Ford, Marco Cova, Chris Kruegel, Giovanni VignaSymmetric Cryptography in JavascriptEmily Stark, Michael Hamburg, Dan BonehAnalyzing Information Flow in JavaScript-based Browser ExtensionsMohan Dhawan, Vinod Ganapathy |
|
17:00-17:15 | |
17:15-18:00 | Classic Paper II (Molokai)Java Security: A Ten Year Retrospective
Li Gong, Mozilla |
|
18:00-19:15 | Molokai | Foyer C | Works In Progress |
Posters/Reception |
|