Check out the new USENIX Web site.
HotSec '10 Banner


All sessions will take place in Thurgood Marshall East unless otherwise noted.

Session papers are available to workshop registrants immediately and to everyone beginning on the day of the workshop.

Tuesday, August 10, 2010
9:00 a.m.–9:10 a.m.

Introduction and Ground Rules
Wietse Venema, IBM Research

9:10 a.m.–10:40 a.m.

Cloud and Web

Session Chair: Lucas Ballard, Google Inc.

Visual Security Policy for the Web
Terri Oda and Anil Somayaji, Carleton Computer Security Laboratory

Read the Abstract | Full paper | Slides

Cybercasing the Joint: On the Privacy Implications of Geo-Tagging
Gerald Friedland, International Computer Science Institute; Robin Sommer, International Computer Science Institute and Lawrence Berkeley National Laboratory

Read the Abstract | Full paper | Slides

On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing
Marten van Dijk and Ari Juels, RSA Laboratories

Read the Abstract | Full paper

10:40 a.m.–11:00 a.m.    Break
11:00 a.m.–12:30 p.m.

Systems and Defenses

Session Chair: Angelos Stavrou, George Mason University

Popularity Is Everything: A New Approach to Protecting Passwords from Statistical-Guessing Attacks
Stuart Schechter and Cormac Herley, Microsoft Research; Michael Mitzenmacher, Harvard University

Read the Abstract | Full paper | Slides

Moving from Logical Sharing of Guest OS to Physical Sharing of Deduplication on Virtual Machine
Kuniyasu Suzaki, Toshiki Yagi, Kengo Iijima, Nguyen Anh Quynh, and Cyrille Artho, National Institute of Advanced Industrial Science and Technology; Yoshihito Watanebe, Alpha Systems Inc.

Read the Abstract | Full paper | Slides

Embedded Firmware Diversity for Smart Electric Meters
Stephen McLaughlin, Dmitry Podkuiko, Adam Delozier, Sergei Miadzvezhanka, and Patrick McDaniel, Penn State University

Read the Abstract | Full paper | Slides

12:30 p.m.–2:00 p.m.    Workshop Luncheon, Thurgood Marshall South West
2:00 p.m.–3:30 p.m.

Networks and Communications

Session Chair: Patrick McDaniel, Pennsylvania State University

Evading Cellular Data Monitoring with Human Movement Networks
Adam J. Aviv, Micah Sherr, Matt Blaze, and Jonathan M. Smith, University of Pennsylvania

Read the Abstract | Full paper | Slides

Challenges in Access Right Assignment for Secure Home Networks
Tiffany Hyun-Jin Kim, Lujo Bauer, James Newsome, and Adrian Perrig, Carnegie Mellon University; Jesse Walker, Intel Research

Read the Abstract | Full paper | Slides

Scalable Anonymous Communication with Provable Security
Prateek Mittal and Nikita Borisov, University of Illinois at Urbana-Champaign; Carmela Troncoso and Alfredo Rial, ESAT/COSIC, IBBT-K.U.Leuven

Read the Abstract | Full paper

3:30 p.m.–4:00 p.m.    Break
4:00 p.m.–5:00 p.m.

Catching Malware

Session Chair: Paul van Oorschot, Carleton University

Retroactive Detection of Malware with Applications to Mobile Platforms
Markus Jakobsson and Karl-Anders Johansson, FatSkunk Inc

Read the Abstract | Full paper | Slides

Scalable Web Object Inspection and Malfease Collection
Charalampos Andrianakis, Paul Seymer, and Angelos Stavrou, Center for Secure Information Systems, George Mason University

Read the Abstract | Full paper | Slides

5:00 p.m.–5:15 p.m.

Closing Session

? Need help? Use our Contacts page.

Last changed: 8 Sept. 2010 jp