Check out the new USENIX Web site.
FOCI '11 Banner

USENIX Security '11

WORKSHOP PROGRAM

All sessions will take place in Elizabethan B unless otherwise noted.

All breakfast and refreshment breaks will take place in the California East/West Foyer,  Elizabethan Foyer, and Elizabethan C.

Monday, August 8, 2011
8:30 a.m.–9:00 a.m.    Continental Breakfast
9:00 a.m.–9:05 a.m.

Opening Remarks

Nick Feamster and Wenke Lee, FOCI '11 Program Co-Chairs

9:05 a.m.–10:05 a.m.

Keynote Address

Internet in a Suitcase

Josh King, Open Technology Initiative of New America Foundation

10:05 a.m.–10:30 a.m.    Break with coffee and tea
10:30 a.m.–12:30 p.m.

Measuring Censorship

Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance
Jeffrey Knockel, Jedidiah R. Crandall, and Jared Saia, University of New Mexico

Read the Abstract | Full paper

View the Slides

Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics
Joss Wright, Oxford Internet Institute; Tulio de Souza, Oxford University Computing Laboratory; Ian Brown, Oxford Internet Institute

Read the Abstract | Full paper

View the Slides

CensMon: A Web Censorship Monitor
Andreas Sfakianakis, Elias Athanasopoulos, and Sotiris Ioannidis, Foundation for Research and Technology, Hellas

Read the Abstract | Full paper

Work-in-Progress: Automated Named Entity Extraction for Tracking Censorship of Current Events
Antonio M. Espinoza and Jedidiah R. Crandall, University of New Mexico

Read the Abstract | Full paper

View the Slides

12:30 p.m.–1:30 p.m.    Workshop Luncheon served in the Colonial Room
1:30 p.m.–3:00 p.m.

Policy and Power

Redirecting DNS for Ads and Profit
Nicholas Weaver and Christian Kreibich, ICSI; Vern Paxson, ICSI and the University of California, Berkeley

Read the Abstract | Full paper

User Freedom to Attach Devices
Scott Jordan and Gwen Shaffer, University of California, Irvine

Read the Abstract | Full paper

View the Slides

Infrastructures of Censorship and Lessons from Copyright Resistance
Wendy Seltzer, Princeton Center for Information Technology Policy

Read the Abstract | Full paper

3:00 p.m.–3:30 p.m.    Break with beverages
3:30 p.m.–5:00 p.m.

Circumvention

Decoy Routing: Toward Unblockable Internet Communication
Josh Karlin, Daniel Ellard, Alden W. Jackson, Christine E. Jones, Greg Lauer, David P. Mankins, and W. Timothy Strayer, Raytheon BBN Technologies

Read the Abstract | Full paper

Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing
Nicholas Jones, Matvey Arye, Jacopo Cesareo, and Michael J. Freedman, Princeton University

Read the Abstract | Full paper

Bypassing Internet Censorship for News Broadcasters
Karl Kathuria, British Broadcasting Corporation and University of Toronto

Read the Abstract | Full paper

View the Slides

5:00 p.m.–5:30 p.m.

New and Outrageous Ideas

Session Chair: Nick Feamster

View the Slides

footer
? Need help? Use our Contacts page.

Last changed: 24 August 2011 jp