You are here



USENIX TaPP '10 Program Available

Join us February 22, 2010, in San Jose, CA, for the 2nd USENIX Workshop on the Theory and Practice of Provenance (TaPP ‘10).

The TaPP workshop series builds upon a set of Workshops on Principles of Provenance organized in 2007–2009, which helped raise the profile of this area within diverse research communities, such as databases, security, and programming languages.

LISA '10 Call for Participation Now Available

The Call for Participation for the 24th Large Installation System Administration Conference (LISA '10) is now available.  Participation opportunities include refereed papers, invited talks, and more.

USENIX HotCloud '10 Seeking Submissions

The Call for Papers for 2nd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '10) is now available.

HotCloud '10 seeks to discuss challenges in the Cloud Computing paradigm including the design, implementation, and deployment of virtualized clouds.

Submissions are due March, 23, 2010.

More information and submission guidelines can be found here.

USENIX LEET '10 Submission Deadline Approaching

The submissions deadline for the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '10) is quickly approaching.

Please submit your work by Thursday, February 25, 2010, 11:59 p.m. PST.

Just Announced: LEET '10 will feature two invited talks:
-- "Why Don't I (Still) Trust Anything?" by Jeff Moss, founder and director of Black Hat and DEF CON

HotPar '10 Submission Deadline Extended

Due to a deadline conflict with a major conference, we've decided to change the deadline for HotPar '10:

* Paper REGISTRATION deadline is still Sunday, January 24, 11:59 p.m. PST (title, authors, abstract).

* Paper SUBMISSION deadline is now Sunday, January 31, 11:59 p.m. PST (full paper). You must register a paper before submitting a full paper.

The full paper length for the HotPar workshop is 5 pages of technical writing NOT including references, plus as many pages of references as you need.

Update on Google attack

It seems that early reports were wrong about the actual exploit used against Google and 33 other companies. The exploit code has appeared in the hands of many AV companies. It is an IE exploit and a zero-day.

Zero-day means that this was a previously unknown vulnerability, and as far as I can tell, there is no patch for it from MS as yet.

The second stage malware was a script used to insert a malicious DLL . This DLL, the third stage, is called Hydraq (by Symantec) and Roarur (by McAfee). This third stage provides remote access as well as hiding itself.

Google attacked via email

I seem to have become a prophet: the column I wrote for the December
2009 issue of ;login: focused on disabling scripting in Web browsers,
and through that, email readers as well, using NoScript. The big
news is this week is that Google has been hacked, along with 33 other
US companies (all Fortune 500) by China.

HotPar '10 Submissions Deadline: January 24

The submission deadline for the 2nd USENIX Workshop on Hot Topics in Parallelism (HotPar '10) is quickly approaching.

Please submit your work by 11:59 p.m. PST, January 24, 2010.

NSDI '10 Registration Now Open

Join us in San Jose, CA, February April 28–30, 2010, for the 7th USENIX Symposium on Network Design and Implementation.

Focusing on the design principles of large-scale networked and distributed systems, the NSDI '10 program includes 29 refereed papers representing some of the outstanding work in the area, with topics including cloud services, Web browsers and servers, datacenter and wireless networks, malware, and more.

USENIX FAST '10 Registration Now Open

Join us in San Jose, CA, February 23-26, 2010, for the 8th USENIX Conference on File and Storage Technologies (FAST '10).