Check out the new USENIX Web site.
HotSec '09 Banner


USENIX Security '09

WORKSHOP SESSIONS

All sessions will take place in Salon 4/5 (Level 2) unless otherwise noted.

Session papers are available to workshop registrants immediately and to everyone beginning August 11, 2009.

Tuesday, August 11, 2009
8:30 a.m.–9:00 a.m.    Continental Breakfast, Ballroom Foyer (Level 4)
9:00 a.m.–10:30 a.m.

Social Factors and Minimizing Trust

Using Social Factors in Digital Rights Management
Bader Ali and Muthucumaru Maheswaran, McGill University

Paper in PDF

FaceTrust: Assessing the Credibility of Online Personas via Social Networks
Michael Sirivianos, Duke University; Kyungbaek Kim, University of California, Irvine; Xiaowei Yang, Duke University

Paper in PDF

How to Print a Secret
Aleks Essex, University of Ottawa; Jeremy Clark and Urs Hengartner, University of Waterloo; Carlisle Adams, University of Ottawa

Paper in PDF

10:30 a.m.–11:00 a.m.    Break
11:00 a.m.–12:30 p.m.

Networks and Software

MitiBox: Camouflage and Deception for Network Scan Mitigation
Erwan Le Malécot, Kyushu University and Institute of Systems, Information Technologies and Nanotechnologies

Paper in PDF

SPAN: A Unified Framework and Toolkit for Querying Heterogeneous Access Policies
Swati Gupta, Indian Institute of Technology, Delhi; Kristen LeFevre and Atul Prakash, University of Michigan, Ann Arbor

Paper in PDF

Pre-Patched Software
Jianing Guo, Jun Yuan, and Rob Johnson, Stony Brook University

Paper in PDF | Slides

12:30 p.m.–2:00 p.m.    Workshop Luncheon, Ballroom East (Level 4)
2:00 p.m.–3:30 p.m.

Mobile and the User

Authentication Technologies for the Blind or Visually Impaired
Nitesh Saxena, Polytechnic Institute of New York University; James H. Watt, University of Connecticut

Paper in PDF

Towards Trustworthy Participatory Sensing
Akshay Dua, Nirupama Bulusu, and Wu-chang Feng, Portland State University; Wen Hu, CSIRO ICT Centre, Australia

Paper in PDF

Implicit Authentication for Mobile Devices
Markus Jakobsson, Elaine Shi, Philippe Golle, and Richard Chow, Palo Alto Research Center

Paper in PDF | Slides

3:30 p.m.–4:00 p.m.    Break
4:00 p.m.–5:30 p.m.

Secure Systems and Applications

Garm: Cross Application Data Provenance and Policy Enforcement
Brian Demsky, University of California, Irvine

Paper in PDF

Convergence of Desktop and Web Applications on a Multi-Service OS
Helen J. Wang, Microsoft Research, Redmond; Alexander Moshchuk, University of Washington, Seattle; Alan Bush, Microsoft Corporation

Paper in PDF

System Configuration as a Privilege
Glenn Wurster and Paul C. van Oorschot, Carleton University

Paper in PDF

footer
? Need help? Use our Contacts page.

Last changed: 18 Aug. 2009 jel