Check out the new USENIX Web site.
Monday, July 31, 2006

8:45 a.m.–10:30 a.m. Monday
Session I

Introduction and Ground Rules
Matt Blaze, University of Pennsylvania

Incentive-Centered Design for Information Security
Rick Wash and Jeffrey K. MacKie-Mason, University of Michigan

Password Rescue: A New Approach to Phishing Prevention
Dinei Florêncio and Cormac Herley, Microsoft Research

Security Through Publicity
Eric Osterweil, University of California, Los Angeles; Dan Massey and Batsukh Tsendjav, Colorado State University; Beichuan Zhang, University of Arizona; Lixia Zhang, University of California, Los Angeles

10:30 a.m.–11:00 a.m.    Break
11:00 a.m.–12:30 p.m. Monday
Session II

Shame on Trust in Distributed Systems
Trent Jaeger, Patrick McDaniel, and Luke St. Clair, Pennsylvania State University; Ramón Cáceres and Reiner Sailer, IBM T. J. Watson Research Center

Sensor Network Security: More Interesting Than You Think
Madhukar Anand, Eric Cronin, Micah Sherr, Matt Blaze, Zachary Ives, and Insup Lee, University of Pennsylvania

Panel/Group Discussion

12:30 p.m.–2:00 p.m.    Lunch
2:00 p.m.–3:30 p.m. Monday
Session III

Johnny Can Obfuscate: Beyond Mother's Maiden Name
William Cheswick, Lumeta Corp.

Secure Software Updates: Disappointments and New Challenges
Anthony Bellissimo, John Burgess, and Kevin Fu, University of Massachusetts Amherst

Privacy as an Operating System Service
Sotiris Ioannidis, Stevens Institute of Technology; Stelios Sidiroglou and Angelos D. Keromytis, Columbia University

3:30 p.m.–4:00 p.m.    Break
4:00 p.m.–6:00 p.m. Monday
Session IV

Exposure Maps: Removing Reliance on Attribution During Scan Detection
David Whyte, P.C. van Oorschot, and Evangelos Kranakis, Carleton University

Toward Attack-Agnostic Defenses
David Brumley and Dawn Song, Carnegie Mellon University

Rethinking Hardware Support for Network Analysis and Intrusion Prevention
V. Paxson, International Computer Science Institute; K. Asanović, Massachusetts Institute of Technology; S. Dharmapurikar, Nuova Systems; J. Lockwood, Washington University;, R. Pang, Princeton University; R. Sommer and N. Weaver, International Computer Science Institute

?Need help? Use our Contacts page.

Last changed: 4 Aug. 2006 ch