Check out the new USENIX Web site.
HealthSec '11 Banner

USENIX Security '11

WORKSHOP PROGRAM

All sessions will take place in Elizabethan D unless otherwise noted.

All breakfast and refreshment breaks will take place in the California East/West Foyer,  Elizabethan Foyer, and Elizabethan C.

Tuesday, August 9, 2011
8:30 a.m.–9:00 a.m.    Continental Breakfast
9:00 a.m.–9:05 a.m.

Welcome

Program Co-Chairs: Ben Adida, Mozilla, and Umesh Shankar, Google

9:05 a.m.–9:30 a.m.

Keynote Address

Speaker: Joy Pritts, Chief Privacy Officer, Office of the National Coordinator for Health Information Technology

Joy Pritts joined the Office of the National Coordinator for Health Information Technology, Department of Health and Human Services, in February 2010 as its first Chief Privacy Officer. Ms. Pritts provides critical advice to the Secretary and the National Coordinator in developing and implementing ONC's privacy and security programs under HITECH. She has an extensive background in confidentiality law, including the HIPAA Privacy Rule, federal alcohol and substance abuse treatment confidentiality laws, the Common Rule governing federally funded research, and state health information privacy laws.

9:30 a.m.–10:15 a.m.

Short Papers

Implantable Medical Device Communication Security: Pattern vs. Signal Encryption
Fei Hu and Qi Hao, University of Alabama; Marcin Lukowiak, Rochester Institute of Technology

Read the PDF

View the Slides

Exposing Privacy Concerns in mHealth
Aarathi Prasad, Jacob Sorber, Timothy Stablein, Denise Anthony, and David Kotz, Dartmouth College—Institute for Security, Technology, and Society

Read the PDF

View the Slides

Persistent Security, Privacy, and Governance for Healthcare Information
W. Knox Carey, Jarl Nilsson, and Steve Mitchell, Intertrust Technologies

Read the PDF

View the Slides

Who Does the Autopsy? Criminal Implications of Implantable Medical Devices
Marc Goodman, Future Crimes Institute

Read the PDF

10:15 a.m.–10:30 a.m.    Break with coffee and tea
10:30 a.m.–11:15 a.m.

Long Papers

A Research Roadmap for Healthcare IT Security Inspired by the PCAST Health Information Technology Report
Matthew D. Green and Aviel D. Rubin, Johns Hopkins University

Read the PDF

View the Slides

Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices
Steve Hanna, University of California Berkeley; Rolf Rolles, Unaffiliated; Andrés Molina-Markham, University of Massachusetts Amherst; Pongsin Poosankam, University of California Berkeley and Carnegie Mellon University; Kevin Fu, University of Massachusetts Amherst; Dawn Song, University of California Berkeley

Read the PDF

View the Slides

11:15 a.m.–12:15 p.m.

Panel: Do Medical Devices Have Significant Forensic Value?

Panelists: Kevin Fu, University of Massachusetts Amherst; Marc Goodman, Future Crimes Institute; Nate Paul, University of Tennessee/Oak Ridge National Laboratory; Mark Day, iRhythm Technologies, Inc.

12:15 p.m.–1:15 p.m.    Workshop Luncheon served in the Colonial Room
1:15 p.m.–2:00 p.m.

Short Papers

Providing an Additional Factor for Patient Identification Based on Digital Fingerprint
Guy C. Hembroff and Xinli Wang, Michigan Technological University; Sead Muftic, KTH—Royal Institute of Technology

Read the PDF

Context-Aware Anomaly Detection for Electronic Medical Record Systems
Xiaowei Li, Yuan Xue, You Chen, and Bradley Malin, Vanderbilt University

Read the PDF

View the Slides

Role Prediction Using Electronic Medical Record System Audits
Wen Zhang, Vanderbilt University; Carl A. Gunter, University of Illinois at Urbana-Champaign; David Liebovitz, Northwestern University; Jian Tian, Vanderbilt University; Bradley Malin, Vanderbilt University

Read the PDF

Audit Mechanisms for Privacy Protection in Healthcare Environments
Jeremiah Blocki, Nicolas Christin, Anupam Datta, and Arunesh Sinha, Carnegie Mellon University

Read the PDF

View the Slides

2:00 p.m.–3:00 p.m.

Panel: Can We Do Meaningful Deidentification of Medical Data?

Panelists: Arvind Narayanan, Stanford University; Lee Tien, Electronic Frontier Foundation; Kelly Edwards, University of Washington; Sean Nolan, Microsoft

3:00 p.m.–3:15 p.m.    Break with beverages
3:15 p.m.–4:15 p.m.

Long Papers

Quickshear Defacing for Neuroimages
Nakeisha Schimke and John Hale, University of Tulsa

Read the PDF

View the Slides

Adaptive Security and Privacy for mHealth Sensing
Shrirang Mare and Jacob Sorber, Institute for Security, Technology, and Society, Dartmouth College; Minho Shin, Myongji University, South Korea; Cory Cornelius and David Kotz, Institute for Security, Technology, and Society, Dartmouth College

Read the PDF

View the Slides

Controlled Dissemination of Electronic Medical Records
Guido van 't Noordende, University of Amsterdam, The Netherlands

Read the PDF

4:15 p.m.–5:00 p.m.

TBA

footer
? Need help? Use our Contacts page.

Last changed: 10 Oct. 2011 jel