Check out the new USENIX Web site.
2nd USENIX Workshop on Hot topics in Security
Workshop Program

Please Note: This workshop is by invitation and/or acceptance of paper submission.

Session papers are available to workshop registrants immediately, to USENIX members starting August 7, 2007, and to everyone after August 6, 2008.

All sessions will take place in the Berkeley room (3rd Floor) of the Sheraton Boston Hotel unless otherwise noted.

Tuesday, August 7, 2007

7:30 a.m.–5:00 p.m.    On-site Registration, Constitution Foyer
9:00 a.m.–9:30 a.m.  

9:30 a.m.–10:30 a.m.  
Securing Host Data

Transaction Generators: Root Kits for Web
Collin Jackson, Dan Boneh, and John Mitchell, Stanford University
Read the paper in PDF | HTML

Delegating Responsibility in Digital Systems: Horton's "Who Done It?"
Mark S. Miller, Google Research; James E. Donnelley, NERSC, LBNL; Alan H. Karp, Hewlett-Packard Labs
Read the paper in PDF | HTML

10:30 a.m.–11:00 a.m.    Break
11:00 a.m.–12:30 p.m.  
Security in-the-Large

Quantifying the Strength of Security Systems
David Lie, University of Toronto; M. Satyanarayanan, Carnegie Mellon University
Read the paper in PDF | HTML

Towards Application-Aware Anonymous Routing
Micah Sherr, Boon Thau Loo, and Matt Blaze, University of Pennsylvania
Read the paper in PDF | HTML

Rethinking Antivirus: Executable Analysis in the Network Cloud
Jon Oberheide, Evan Cooke, and Farnam Jahanian, University of Michigan
Read the paper in PDF | HTML

12:30 p.m.–2:00 p.m.    Workshop Luncheon, Dalton (3rd Floor)
2:00 p.m.–3:30 p.m.  
How Do We Build Trust?

Turtles All the Way Down: Research Challenges in User-Based Attestation
Jonathan M. McCune, Adrian Perrig, and Arvind Seshadri, CMU/CyLaB; Leendert van Doorn, AMD
Read the paper in PDF | HTML

Securing Network Input via a Trusted Input Proxy
Kevin Borders and Atul Prakash, University of Michigan
Read the paper in PDF

Trust from Trusted Computing Hardware: Dead or Alive?

3:30 p.m.–4:00 p.m.    Break
4:00 p.m.–5:30 p.m.  
Better Identities

Self-Signed Executables: Restricting Replacement of Program Binaries by Malware
Glenn Wurster and P.C. van Oorschot, Carleton University
Read the paper in PDF | HTML

The Strengths of Weaker Identities: Opportunistic Personas
Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, and Nicholas Weaver, International Computer Science Institute
Read the paper in PDF | HTML

Do Strong Web Passwords Accomplish Anything?
Dinei Florêncio and Cormac Herley, Microsoft Research; Baris Coskun, Polytechnic University, Brooklyn
Read the paper in PDF

?Need help? Use our Contacts page.

Last changed: 6 Aug. 2007 jel