Check out the new USENIX Web site.
Registration  |  Organizers  |   Invitation  |   At a Glance  |  Training  |  Tech Sessions
WiPs  |   BoFs  |  Sponsors  |  Activities  |  Hotel/Travel  |  Help Promote!
Students  |  Questions?  |  Call for Papers  |  Past Proceedings


BIRDS-OF-A-FEATHER SESSIONS (BOFS)

Lead or attend a BoF! Meet with your peers! Present new work! Don't miss these special activities designed to maximize the value of your time at the conference. The always popular evening Birds-of-a-Feather sessions are very informal gatherings of persons interested in a particular topic. To schedule a BoF, simply write the BoF title as well as your name and affiliation on one of the BoF Boards located in the registration area.

BoF Schedule (Current as of August 4, 2005)

Tuesday, August 2
ROOM # of Seats 6:00 p.m.–
7:00 p.m.
7:00 p.m.–
8:00 p.m.
8:00 p.m.–
9:00 p.m.
9:00 p.m.–
10:00 p.m.
10:00 p.m.–
11:00 p.m.
Chesapeake III 50          
Camden I 50 Teaching Computer Security and Privacy as a Public Service and for Money
Ming Chow, Tufts University
       
Camden II 60 ROOM NOT AVAILABLE Raritan Computer, Inc. BoF/Reception      


Wednesday, August 3
ROOM # of Seats 7:00 p.m.–
8:00 p.m.
8:00 p.m.–
9:00 p.m.
9:00 p.m.–
10:00 p.m.
10:00 p.m.–
11:00 p.m.
Chesapeake III 50 Worms and Other Malcode
Nicholar Weaver, ICSI
Poker Game (Crypto Protocols Analysis in the Real World)    
Camden I 50 Network IDS (Bro, Snort, etc.)
Scott Campbell, LBL/NERSC
     
Camden II 60 Raritan BoF: Security for KVM and Console Servers—What You Need!
Naim Malik
     


Thursday, August 4
ROOM # of Seats 6:00 p.m.–
7:00 p.m.
7:00 p.m.–
8:00 p.m.
8:00 p.m.–
9:00 p.m.
9:00 p.m.–
10:00 p.m.
10:00 p.m.–
11:00 p.m.
Chesapeake III 50 ROOM NOT AVAILABLE Sun Security BoF
Glenn Brunette, Sun Microsystems, Inc.
Old Bay SAGE Presents: SIG-Beer Baltimore!
Camden I 50 ROOM NOT AVAILABLE Security Issues in a University Environment
Ruth-Anne Bevier, Caltech; George Drake, UMass, Amherst
     
Camden II 60 ROOM NOT AVAILABLE Arbor Networks BoF/Reception: Practical Enterprise Security
Dug Song, Arbor Networks
Malicious Code Analysis: Tools, Techniques, and Strategies
Cory Cohen, CERT/CC
 

BoF Descriptions

Teaching Computer Security and Privacy as a Public Service and for Money
Speaker: Ming Chow, Tufts University
Tuesday, August 2, 6:00 p.m.–7:00 p.m., Camden I

Computer security and privacy can be boring, but they are topics that the general public struggle with, especially teens and parents. Unfortunately, the problems are only getting worse. However, there is a great reward and investment (professional, personal, and monetary) for the technical community to educate the masses about the issues at hand. Topics of dicussion will include the USENIX influence, goals, training plan, where to teach, and personal observations.

Arbor Networks BoF/Reception: Practical Enterprise Security
Speaker: Dug Song, Arbor Networks
Tuesday, August 2, 7:00 p.m.–9:00 p.m., Camden II

The enterprise perimeter security model is crumbling. Simple trust models, and the static defenses that depend on them, are breaking down in the face of constantly changing business needs. Through e-mail worms, exposed VPN clients, and open wireless access points, attackers are exploiting the core vulnerability of the modern enterprise network: weak internal security. Come join us for a discussion of today's internal security challenges, and the practical solutions we have for them in Arbor's Peakflow X.

?Need help? Use our Contacts page.

Last changed: 11 Oct. 2005 ch