Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Home
  • Attend
    • Registration Information
    • Registration Discounts
    • Venue, Hotel, and Travel
    • Students and Grants
    • Co-located Workshops
  • Program
    • At a Glance
    • Technical Sessions
  • Activities
    • Birds-of-a-Feather Sessions
    • Poster Session
    • Work-in-Progress Reports (WiPs)
  • Sponsorship
  • Participate
    • Instructions for Authors and Speakers
    • Call for Papers
      • Important Dates
      • Symposium Organizers
      • Symposium Topics
      • Refereed Papers
      • Symposium Activities
      • Submitting Papers
  • About
    • Symposium Organizers
    • Questions
    • Services
    • Help Promote
    • Past Symposia
  • Home
  • Attend
  • Program
  • Activities
    • Birds-of-a-Feather Sessions
    • Poster Session
    • Work-in-Progress Reports (WiPs)
  • Sponsorship
  • Participate
  • About

sponsors

Platinum Sponsor
Gold Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Bronze Sponsor
Bronze Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Industry Partner
Industry Partner

help promote

USENIX Security '16 button

Get more
Help Promote graphics!

connect with usenix


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

twitter

Tweets by USENIXSecurity

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home » Activities » Birds-of-a-Feather Sessions
Tweet

connect with us

Birds-of-a-Feather Sessions

Lead or attend a BoF! Meet with your peers! Present new work! Don't miss these special activities designed to maximize the value of your time at the conference. Birds-of-a-Feather sessions are very informal gatherings of persons interested in a particular topic.

Vendor BoFs

Want to demonstrate a new product or discuss your company's latest technologies with USENIX Security '16? Host a Vendor BoF! These sponsored one-hour sessions give companies a chance to talk about products and proprietary technology—and they include promotional benefits. Email sponsorship@usenix.org if you're interested in sponsoring a Vendor BoF. More information about sponsorship opportunities is available here.

Scheduling a BoF

To schedule a BoF, simply write the BoF title as well as your name and affiliation on the BoF board located in the registration area. If you have a description of your BoF you'd like posted on this Web page, please schedule your BoF on the BoF board, then send its title, the organizer's name and affiliation, and the date, time, and location of the BoF to bofs@usenix.org with "USENIX Security '16 BoF" in the subject line.

BoF Schedule

For the most current schedule, please see the BoF board in the registration area.

Monday, August 8
ROOM CAPACITY 8:00 pm–
9:00 pm
9:00 pm–
10:00 pm
10:00 pm–
11:00 pm
Big Bend Ballroom
(No A/V)
50      
Hill Country Ballroom
(No A/V)
100      
Tuesday, August 9
ROOM CAPACITY 7:00 pm–
8:00 pm
8:00 pm–
9:00 pm
9:00 pm–
10:00 pm
10:00 pm–
11:00 pm
Big Bend Ballroom
(No A/V)
50        
Hill Country Ballroom
(No A/V)
100 Student Social and Networking Event Board Game Night
Wednesday, August 10
ROOM CAPACITY 8:00 pm–
9:00 pm
9:00 pm–
10:00 pm
10:00 pm–
11:00 pm
Zilker Ballroom 2
(A/V available)
225 USENIX Security '16 Work-in-Progress Reports  
Zilker Ballroom 3
(A/V available)
225      
Big Bend Ballroom
(No A/V)
50      
Hill Country Ballroom
(No A/V)
100    Public-key directories  
Thursday, August 11
ROOM CAPACITY 8:00 pm–
9:00 pm
9:00 pm–
10:00 pm
10:00 pm–
11:00 pm
Zilker Ballroom 2
(A/V available)
225 Doctoral Colloquium  
Zilker Ballroom 3
(A/V available)
225  Technology Transfer to Practice for Cyber Security    
Big Bend Ballroom
(No A/V)
50      
Hill Country Ballroom
(No A/V)
100      

BoF Descriptions

Public-key directories
Alin Tomescu,PhD student, MIT
Wednesday, August 10, 9:00 pm–10:00 pm, Hill Country Ballroom

Let's talk about ways to look up public keys correctly using authenticated data structures and gossip protocols. Lots of interesting work has been done on this recently, such as (Enhanced) Certificate Transparency and CONIKS. Still, interesting problems like efficient consistency proofs in lexicographically-ordered data structures, preventing equivocation and security guarantees for gossip protocols still remain.

Technology Transfer to Practice for Cyber Security
Rebecca Bace,Chief Strategist, Center for Forensics, IT, and Security, University of South Alabama
Thursday, August 11, 8:00 pm–9:00 pm, Zilker Ballroom 3

NSF has recently made it a priority to increase the near-term impact of its funded research, particularly in the area of cybersecurity. In that light, NSF funded two workshops in the past year focused on identifying challenges, barriers, and solutions that can increase Technology Transfer to Practice (TTP) for cybersecurity research. The most pressing need consistently identified by PIs who committed to transferring their research results to use is creation of an NSF ecosystem for TTP that incorporated incentives for taking research beyond the laboratory and that provides resources that are readily accessible by PIs. This ecosystem view acknowledges that a diverse set of practices and insights are critical to successful TTP and that programs instructing PIs as to how best to determine when they should access that ecosystem are needed. In this session, we will discuss elements of the proposed ecosystem, will present the case for TTP, and will describe the new approach that NSF SATC takes toward TTP perspective proposals.

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Bronze Sponsors

Media Sponsors & Industry Partners

© USENIX

  • Privacy Policy
  • Contact Us