Check out the new USENIX Web site.
CSET '11 Banner

USENIX Security '11

WORKSHOP PROGRAM

All sessions will take place in Elizabethan D unless otherwise noted.

All breakfast and refreshment breaks will take place in the California East/West Foyer,  Elizabethan Foyer, and Elizabethan C.

Monday, August 8, 2011
8:00 a.m.–8:30 a.m.    Continental Breakfast
8:30 a.m.–8:40 a.m.

Opening Remarks

Sean Peisert and Stephen Schwab, CSET '11 Program Co-Chairs

8:40 a.m.–10:10 a.m.

Security Experimentation and the Real World

Should Security Researchers Experiment More and Draw More Inferences?
Kevin S. Killourhy and Roy A. Maxion, Carnegie Mellon University

Read the Abstract | Full paper

View the Slides

No Plan Survives Contact: Experience with Cybercrime Measurement
Chris Kanich, Neha Chachra, and Damon McCoy, University of California, San Diego; Chris Grier, University of California, Berkeley; David Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, University of California, San Diego

Read the Abstract | Full paper

View the Slides

10:10 a.m.–10:30 a.m.    Break with coffee and tea
10:30 a.m.–noon

Experimental Methodology

Salting Public Traces with Attack Traffic to Test Flow Classifiers
Z. Berkay Celik, Jayaram Raghuram, George Kesidis, and David J. Miller, Pennsylvania State University

Read the Abstract | Full paper

Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols
Nathan S. Evans and Christian Grothoff, Technische Universität München

Read the Abstract | Full paper

View the Slides

Automating Network Monitoring on Experimental Testbeds
Michael Golightly, Princeton University; Jack Brassil, HP Laboratories

Read the Abstract | Full paper

View the Slides

Noon–1:00 p.m.    Workshop Luncheon served in the Colonial Room
1:00 p.m.–2:30 p.m.

Bots and Overlays

Challenges in Experimenting with Botnet Detection Systems
Adam J. Aviv and Andreas Haeberlen, University of Pennsylvania

Read the Abstract | Full paper

View the Slides

ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation
Kevin Bauer, University of Waterloo; Micah Sherr, Georgetown University; Damon McCoy, University of California, San Diego; Dirk Grunwald, University of Colorado

Read the Abstract | Full paper

View the Slides

2:30 p.m.–2:45 p.m.    Break with beverages
2:45 p.m.–4:00 p.m.

Methodology and Getting Real Data

On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned
Malek Ben Salem and Salvatore J. Stolfo, Columbia University

Read the Abstract | Full paper

View the Slides

Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware
Tudor Dumitras, Symantec Research Labs; Iulian Neamtiu, University of California, Riverside

Read the Abstract | Full paper

View the Slides

4:00 p.m.–4:10 p.m.    Short Break
4:10 p.m.–5:30 p.m.

Education

Active Learning with the CyberCIEGE Video Game
Michael Thompson and Dr. Cynthia Irvine, Naval Postgraduate School

Read the Abstract | Full paper

View the Slides

Investigating Energy and Security Trade-offs in the Classroom with the Atom LEAP Testbed
Peter A.H. Peterson, Digvijay Singh, William J. Kaiser, and Peter L. Reiher, University of California, Los Angeles

Read the Abstract | Full paper

View the Slides

Experiences in Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise
Joseph Werther, Michael Zhivich, and Tim Leek, MIT Lincoln Laboratory; Nickolai Zeldovich, MIT CSAIL

Read the Abstract | Full paper

View the Slides

footer
? Need help? Use our Contacts page.

Last changed: 26 Sept. 2011 jel