Birds-of-a-Feather Sessions
Lead or attend a BoF! Meet with your peers! Present new work! Don't miss these special activities designed to maximize the value of your time at the conference. Birds-of-a-Feather sessions are very informal gatherings of persons interested in a particular topic.
Vendor BoFs
Want to demonstrate a new product or discuss your company's latest technologies with USENIX Security '16? Host a Vendor BoF! These sponsored one-hour sessions give companies a chance to talk about products and proprietary technology—and they include promotional benefits. Email sponsorship@usenix.org if you're interested in sponsoring a Vendor BoF. More information about sponsorship opportunities is available here.
Scheduling a BoF
To schedule a BoF, simply write the BoF title as well as your name and affiliation on the BoF board located in the registration area. If you have a description of your BoF you'd like posted on this Web page, please schedule your BoF on the BoF board, then send its title, the organizer's name and affiliation, and the date, time, and location of the BoF to bofs@usenix.org with "USENIX Security '16 BoF" in the subject line.
BoF Schedule
For the most current schedule, please see the BoF board in the registration area.
Monday, August 8 | ||||
ROOM | CAPACITY | 8:00 pm– 9:00 pm |
9:00 pm– 10:00 pm |
10:00 pm– 11:00 pm |
Big Bend Ballroom (No A/V) |
50 | |||
Hill Country Ballroom (No A/V) |
100 |
Wednesday, August 10 | ||||
ROOM | CAPACITY | 8:00 pm– 9:00 pm |
9:00 pm– 10:00 pm |
10:00 pm– 11:00 pm |
Zilker Ballroom 2 (A/V available) |
225 | USENIX Security '16 Work-in-Progress Reports | ||
Zilker Ballroom 3 (A/V available) |
225 | |||
Big Bend Ballroom (No A/V) |
50 | |||
Hill Country Ballroom (No A/V) |
100 | Public-key directories |
Thursday, August 11 | ||||
ROOM | CAPACITY | 8:00 pm– 9:00 pm |
9:00 pm– 10:00 pm |
10:00 pm– 11:00 pm |
Zilker Ballroom 2 (A/V available) |
225 | Doctoral Colloquium | ||
Zilker Ballroom 3 (A/V available) |
225 | Technology Transfer to Practice for Cyber Security | ||
Big Bend Ballroom (No A/V) |
50 | |||
Hill Country Ballroom (No A/V) |
100 |
BoF Descriptions
Public-key directories
Alin Tomescu,PhD student, MIT
Wednesday, August 10, 9:00 pm–10:00 pm, Hill Country Ballroom
Let's talk about ways to look up public keys correctly using authenticated data structures and gossip protocols. Lots of interesting work has been done on this recently, such as (Enhanced) Certificate Transparency and CONIKS. Still, interesting problems like efficient consistency proofs in lexicographically-ordered data structures, preventing equivocation and security guarantees for gossip protocols still remain.
Technology Transfer to Practice for Cyber Security
Rebecca Bace,Chief Strategist, Center for Forensics, IT, and Security, University of South Alabama
Thursday, August 11, 8:00 pm–9:00 pm, Zilker Ballroom 3
NSF has recently made it a priority to increase the near-term impact of its funded research, particularly in the area of cybersecurity. In that light, NSF funded two workshops in the past year focused on identifying challenges, barriers, and solutions that can increase Technology Transfer to Practice (TTP) for cybersecurity research. The most pressing need consistently identified by PIs who committed to transferring their research results to use is creation of an NSF ecosystem for TTP that incorporated incentives for taking research beyond the laboratory and that provides resources that are readily accessible by PIs. This ecosystem view acknowledges that a diverse set of practices and insights are critical to successful TTP and that programs instructing PIs as to how best to determine when they should access that ecosystem are needed. In this session, we will discuss elements of the proposed ecosystem, will present the case for TTP, and will describe the new approach that NSF SATC takes toward TTP perspective proposals.
connect with us