Check out the new USENIX Web site.
Security '09 Banner
[an error occurred while processing this directive]

Register Now!  TECHNICAL SESSIONS

Conference papers are available to conference registrants immediately and to everyone beginning August 12, 2009. Everyone can view the proceedings frontmatter immediately.

Proceedings Frontmatter: Covers, with ISBN | Title Page, Conference Organizers, and External Reviewers | Table of Contents and Index of Authors | Message from the Program Chair

Tech Sessions: Wednesday, August 12 | Thursday, August 13 | Friday, August 14 | Invited Talk Speakers
Wednesday, August 12
9:00 a.m.–10:30 a.m. Wednesday

Opening Remarks, Awards, and Keynote Address

Program Chair: Fabian Monrose, University of North Carolina, Chapel Hill

Keynote Address
Android: Securing a Mobile Platform from the Ground Up

Rich Cannings, Android Security Leader, Google, and David Bort, Software Engineer, Android Open Source Project, Google

Android is an open source mobile platform designed to support easy and open development of mobile applications. Our challenge was to design a platform that balanced our goal of open development and user choice with the unique challenges of securing a consumer-focused mobile system.

Keeping both historic and modern threats in mind, we used various approaches to protect the user and the carrier: cryptography, exploit mitigation features, system updates, UI design, and reuse of UNIX security features in a novel way.

To illustrate the security features of Android, we will describe real examples of security vulnerabilities we have encountered since launch.

10:30 a.m.–11:00 a.m.   Break
11:00 a.m.–12:30 p.m. Wednesday

REFEREED PAPERS

Attacks on Privacy

Session Chair: Steven M. Bellovin, Columbia University

Proceedings of all papers in this session

Compromising Electromagnetic Emanations of Wired and Wireless Keyboards
Martin Vuagnoux and Sylvain Pasini, LASEC/EPFL

Paper in PDF

Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems
Kehuan Zhang and XiaoFeng Wang, Indiana University, Bloomington

Paper in PDF

A Practical Congestion Attack on Tor Using Long Paths
Nathan S. Evans, University of Denver; Roger Dingledine, The Tor Project; Christian Grothoff, University of Denver

Paper in PDF

INVITED TALKS

The Building Security in Maturity Model (BSIMM)
Gary McGraw, CTO, Cigital, Inc., and Brian Chess, Chief Scientist, Fortify Software

As a discipline, software security has made great progress over the last decade. There are now at least 36 large-scale software security initiatives underway in enterprises including global financial services firms, independent software vendors, defense organizations, and other verticals. In 2008 the speakers, with Sammy Migues, interviewed executives running nine initiatives, using the twelve practices of the Software Security Framework as our guide. Those companies among the nine who graciously agreed to be identified include Adobe, The Depository Trust and Clearing Corporation (DTCC), EMC, Google, Microsoft, QUALCOMM, and Wells Fargo.

The resulting data, drawn from real programs at different levels of maturity, was used to guide the construction of the Building Security in Maturity Model.

This talk will describe the maturity model, drawing examples from many real software security programs. A maturity model is appropriate because improving software security almost always means changing the way an organization works: people, process, and automation are all required. Although not all organizations need to achieve the same security goals, all successful large-scale software security initiatives share ideas and approaches.

Whether you rely on the Cigital Touchpoints, Microsoft's SDL, or OWASP CLASP, there is much to learn from practical experience. BSIMM will help you determine where you stand and what kind of software security plan will work best for you.

12:30 p.m.–2:00 p.m.   Lunch, on your own
2:00 p.m.–3:30 p.m. Wednesday

REFEREED PAPERS

Memory Safety

Session Chair: Tal Garfinkel, VMware and Stanford University

Proceedings of all papers in this session

Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors
Periklis Akritidis, Computer Laboratory, University of Cambridge; Manuel Costa and Miguel Castro, Microsoft Research, Cambridge; Steven Hand, Computer Laboratory, University of Cambridge

Paper in PDF

Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs
David Molnar, Xue Cong Li, and David A. Wagner, University of California, Berkeley

Paper in PDF

Memory Safety for Low-Level Software/Hardware Interactions
John Criswell, University of Illinois; Nicolas Geoffray, Université Pierre et Marie Curie, INRIA/Regal; Vikram Adve, University of Illinois

Paper in PDF

INVITED TALKS

Toward a New Legal Framework for Cybersecurity
Deirdre K. Mulligan, School of Information, University of California, Berkeley

What role should the law play in the creation of more secure or trustworthy networks? Fred Schneider of Cornell University and I argue that it does little to structure incentives or direct activity to drive cybersecurity. As Washington reconsiders the government's role in network security, we set forth a new legal framework for cybersecurity.

We argue for a theoretical reorientation, and we reject the standard siren call for the production of "secure" systems and networks, even though this still dominates policy circles and drives legal approaches. It will be better to focus on managing the inevitable insecurity that comes from the constant vulnerabilities and adversaries we face. The rich mix of legal authorities and institutions that comprise the public health infrastructure makes a useful departure point for considering the range of legal mechanisms and institutions that could aid in cybersecurity. Leveraging the law in a sophisticated and comprehensive manner to address market failures stemming from information gaps, externalities, and cognitive biases is essential to achieving and maintaining a level of security appropriate to the activities occurring on the Internet today and in the future.

We believe the law has been undertheorized and underutilized for network security and trustworthiness. Absent a concerted effort to consider the possible contributions of the law toward managing insecurity on networks, the Internet will grow increasingly less secure and there will be immense and, ultimately, regrettable pressure to build networks that provide greater security in a narrow sense (secrecy, confidentiality, integrity, and availability) at substantial cost to other shared values such as openness, transparency, and privacy.

3:30 p.m.–4:00 p.m.   Break
4:00 p.m.–5:30 p.m. Wednesday

REFEREED PAPERS

Network Security

Session Chair: Wietse Venema, IBM Research

Proceedings of all papers in this session

Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine
Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, and Alexander G. Gray, Georgia Tech; Sven Krasser, McAfee, Inc.

Paper in PDF

Improving Tor using a TCP-over-DTLS Tunnel
Joel Reardon, Google Switzerland GmbH; Ian Goldberg, University of Waterloo

Paper in PDF

Locating Prefix Hijackers using LOCK
Tongqing Qiu, Georgia Tech; Lusheng Ji, Dan Pei, and Jia Wang, AT&T Labs—Research; Jun (Jim) Xu, Georgia Tech; Hitesh Ballani, Cornell University

Paper in PDF

INVITED TALKS

Modern Exploitation and Memory Protection Bypasses
Alexander Sotirov, Independent Security Researcher

The difficulty of exploiting memory corruption vulnerabilities has increased significantly with the introduction of the exploitation mitigation features in modern operating systems. Stack cookies, non-executable memory, and address space layout randomization successfully prevent most attempts at direct control-flow modification in vulnerable applications. As a result, software exploitation is much more difficult than it has been at any point in the past.

This talk will present the challenges facing exploit developers today and the latest techniques for defeating the memory protection features in modern operating systems. It will describe the current state of the art in exploitation and outline the most promising directions for future exploitation research.

6:00 p.m.–7:30 p.m. Wednesday

Symposium Reception

Tech Sessions: Wednesday, August 12 | Thursday, August 13 | Friday, August 14 | Invited Talk Speakers
Thursday, August 13
9:00 a.m.–10:30 a.m. Thursday

REFEREED PAPERS

JavaScript Security

Session Chair: Lucas Ballard, Google Inc.

Proceedings of all papers in this session

GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code
Salvatore Guarnieri, University of Washington; Benjamin Livshits, Microsoft Research

Paper in PDF

NOZZLE: A Defense Against Heap-spraying Code Injection Attacks
Paruj Ratanaworabhan, Cornell University; Benjamin Livshits and Benjamin Zorn, Microsoft Research

Paper in PDF

Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense
Adam Barth, Joel Weinberger, and Dawn Song, University of California, Berkeley

Paper in PDF

INVITED TALKS

How the Pursuit of Truth Led Me to Selling Viagra
Vern Paxson, EECS, University of California, Berkeley, and Senior Scientist, International Computer Science Institute

For an empiricist, at the heart of the pursuit of truth lies measurement. This talk will frame perspectives I have developed in applying measurement to Internet security research for the past fifteen years. Along with lessons learned regarding how security realities can diverge from ivory-tower assumptions, I'll discuss the enormous changes in the landscape over that time and explain how those changes led to colleagues and me trying our hand at selling Viagra—all for the cause of science.

10:30 a.m.–11:00 a.m.   Break
11:00 a.m.–12:30 p.m. Thursday

REFEREED PAPERS

Radio

Session Chair: Xiaolan (Catherine) Zhang, IBM Research

Proceedings of all papers in this session

Physical-layer Identification of RFID Devices
Boris Danev, ETH Zürich, Switzerland; Thomas S. Heydt-Benjamin, IBM Zürich Research Laboratory, Switzerland; Srdjan Čapkun, ETH Zürich, Switzerland

Paper in PDF

CCCP: Secure Remote Storage for Computational RFIDs
Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, and Kevin Fu, University of Massachusetts Amherst; Ari Juels, RSA Laboratories, The Security Division of EMC

Paper in PDF

Jamming-resistant Broadcast Communication without Shared Keys
Christina Pöpper, Mario Strasser, and Srdjan Čapkun, ETH Zurich, Switzerland

Paper in PDF

INVITED TALKS

Designing Trustworthy User Agents for a Hostile Web
Eric Lawrence, Senior Program Manager, Internet Explorer Security Team, Microsoft

In a world where organized criminals and myriad misfits work tirelessly to exploit users via an alphabet soup of Web-delivered attacks, browser developers must make the right tradeoffs to deliver usable security. In this talk, I'll describe the attacks we see in the wild today, outline developing threats, and share my thoughts on future browser security investments. With examples from development of the world's most popular browser, I'll explore the challenges in bringing security innovation out of the lab and into real-world products, debunk some security myths, and describe how secure design principles are our only hope as the Web platform gets ever more powerful.

12:30 p.m.–2:00 p.m.   Lunch, on your own
2:00 p.m.–3:30 p.m. Thursday

REFEREED PAPERS

Securing Web Apps

Session Chair: David Wagner, University of California, Berkeley

Proceedings of all papers in this session

xBook: Redesigning Privacy Control in Social Networking Platforms
Kapil Singh, Georgia Institute of Technology; Sumeer Bhola, Google; Wenke Lee, Georgia Institute of Technology

Paper in PDF

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications
Michael Dalton and Christos Kozyrakis, Stanford University; Nickolai Zeldovich, CSAIL, MIT

Paper in PDF

Static Enforcement of Web Application Integrity Through Strong Typing
William Robertson and Giovanni Vigna, University of California, Santa Barbara

Paper in PDF

INVITED TALKS

Compression, Correction, Confidentiality, and Comprehension: A Modern Look at Commercial Telegraph Codes
Steven M. Bellovin, Professor of Computer Science, Columbia University

Telegraph codes are a more or less forgotten part of technological history. In their day, though, they were ubiquitous and sophisticated. They also laid the groundwork for many of today's communications technologies, including encryption, compression, and error correction. Beyond that, reading them provides a snapshot into the culture of their time. We look back, describing them in modern terms and noting some of the tradeoffs considered.

3:30 p.m.–4:00 p.m.   Break
4:00 p.m.–5:30 p.m. Thursday

REFEREED PAPERS

Applied Crypto

Session Chair: Ian Goldberg, University of Waterloo

Vanish: Increasing Data Privacy with Self-Destructing Data
Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, and Henry M. Levy, University of Washington

This paper will be made available on August 12.

Efficient Data Structures For Tamper-Evident Logging
Scott A. Crosby and Dan S. Wallach, Rice University

Paper in PDF

VPriv: Protecting Privacy in Location-Based Vehicular Services
Raluca Ada Popa and Hari Balakrishnan, Massachusetts Institute of Technology; Andrew J. Blumberg, Stanford University

Paper in PDF

INVITED TALKS

Top Ten Web Hacking Techniques of 2008: "What's possible, not probable"
Jeremiah Grossman, Founder and CTO, WhiteHat Security

The polls are closed, votes are in, and we have the winners making up the Top Ten Web Hacking Techniques of 2008! The competition was fierce, with the newest and most innovative Web hacking techniques rising to the test. This session will review the top ten hacks from 2008: what they indicate about the security of the Web, what they mean for businesses, and what might be used against us soon down the road.

6:00 p.m.–7:30 p.m. Thursday

Poster Session & Happy Hour

Poster Session Chair: Carrie Gates, CA Labs

Don't miss the cool new ideas and the latest preliminary research on display at the Poster Session. Take part in discussions with your colleagues over complimentary drinks and snacks. Check out the list of accepted posters.

Tech Sessions: Wednesday, August 12 | Thursday, August 13 | Friday, August 14 | Invited Talk Speakers
Friday, August 14
9:00 a.m.–10:30 a.m. Friday

REFEREED PAPERS

Malware Detection and Protection

Session Chair: Niels Provos, Google Inc.

Proceedings of all papers in this session

Effective and Efficient Malware Detection at the End Host
Clemens Kolbitsch and Paolo Milani Comparetti, Secure Systems Lab, TU Vienna; Christopher Kruegel, University of California, Santa Barbara; Engin Kirda, Institute Eurecom, Sophia Antipolis; Xiaoyong Zhou and XiaoFeng Wang, Indiana University at Bloomington

Paper in PDF

Protecting Confidential Data on Personal Computers with Storage Capsules
Kevin Borders, Eric Vander Weele, Billy Lau, and Atul Prakash, University of Michigan

Paper in PDF

Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms
Ralf Hund, Thorsten Holz, and Felix C. Freiling, Laboratory for Dependable Distributed Systems, University of Mannheim, Germany

Paper in PDF

INVITED TALKS

Hash Functions and Their Many Uses in Cryptography
Shai Halevi, IBM Research

Hash functions have many uses in cryptography, from encryption through authentication and signatures to key exchange. In this talk I'll cover an assortment of aspects of hash functions.

In many applications, "what we really want" is a truly random function (a.k.a. a random oracle), but we settle for a hash function instead. I will explain the difference between the two and show some consequences of this difference.

Different applications require different security properties from the underlying hash functions. I will survey a few of these properties, make the case that applications should be designed to rely on security properties as weak as possible, and illustrate it with example applications to message authentication and digital signatures.

Most hash functions are constructed from lower-level primitives called compression functions. I will briefly describe this type of design and point out some advantages and drawbacks.

Finally, I will illustrate the design of a modern hash function using Fugue, which is a candidate for the NIST SHA3 competition. More than most hash functions, Fugue was designed to be amenable to rigorous security analysis.

10:30 a.m.–11:00 a.m.   Break
11:00 a.m.–12:30 p.m. Friday

REFEREED PAPERS

Browser Security

Session Chair: Patrick Traynor, Georgia Institute of Technology

Proceedings of all papers in this session

Crying Wolf: An Empirical Study of SSL Warning Effectiveness
Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor, Carnegie Mellon University

Paper in PDF

The Multi-Principal OS Construction of the Gazelle Web Browser
Helen J. Wang, Microsoft Research; Chris Grier, University of Illinois at Urbana-Champaign; Alex Moshchuk, University of Washington; Samuel T. King, University of Illinois at Urbana-Champaign; Piali Choudhury and Herman Venter, Microsoft Research

Paper in PDF

INVITED TALKS

DNS Security: Lessons Learned and The Road Ahead
David Dagon, Georgia Institute of Technology

12:30 p.m.–2:00 p.m.   Lunch, on your own
2:00 p.m.–3:30 p.m. Friday

Work-in-Progress Reports (WiPs)

WiPs Session Chair: Sven Dietrich, Stevens Institute of Technology

The Work-in-Progress reports (WiPs) session offers short presentations about research in progress, new results, or timely topics. Speakers should submit a one- or two-paragraph abstract to sec09wips@usenix.org by 6:00 p.m. PDT on Tuesday, August 11, 2009. Make sure to include your name, your affiliation, and the title of your talk. The schedule of presentations and accepted abstracts will be posted on the Symposium Web site. The time available will be distributed among the presenters, with each speaker allocated between 5 and 10 minutes. The time limit will be strictly enforced.

?Need help? Use our Contacts page.

Last changed: 8 July 2009 jp