Check out the new USENIX Web site.
LEET '11 Banner

TECHNICAL SESSIONS

All sessions will take place in Fairfax (3rd Floor) unless otherwise noted.
Workshop abstracts are available to everyone. Full papers are available to NSDI and workshop registrants immediately and to everyone beginning March 29, 2011.
Tuesday, March 29
8:45 a.m.–9:00 a.m. Tuesday

Opening Remarks

LEET '11 Program Chair: Christopher Kruegel, University of California, Santa Barbara

MP3 Icon Listen to the MP3

9:00 a.m.–9:45 a.m. Tuesday

Invited Talk

Tor and Circumvention: Lessons Learned
Nick Mathewson, The Tor Project

View the Slides

MP3 Icon Listen to the MP3

9:45 a.m.–10:35 a.m. Tuesday

Attacking Large-Scale, Real-World Systems

Session Chair: Stefan Savage, University of California, San Diego

Exposing the Lack of Privacy in File Hosting Services
Nick Nikiforakis, DistriNet, Katholieke Universiteit Leuven, Belgium; Marco Balduzzi, Institute Eurecom, Sophia Antipolis, France; Steven Van Acker and Wouter Joosen, DistriNet, Katholieke Universiteit Leuven, Belgium; Davide Balzarotti, Institute Eurecom, Sophia Antipolis, France

Read the Abstract | Full paper

View the Slides

MP3 Icon Listen to the MP3

One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users
Stevens Le Blond, Pere Manils, Abdelberi Chaabane, Mohamed Ali Kaafar, Claude Castelluccia, Arnaud Legout, and Walid Dabbous, I.N.R.I.A., France

Read the Abstract | Full paper

View the Slides

MP3 Icon Listen to the MP3

10:35 a.m.–11:00 a.m.  Break
11:00 a.m.–12:15 p.m. Tuesday

Studying Cyber-Criminals and Their Tools

Session Chair: Christopher Kruegel, University of California, Santa Barbara

The Nuts and Bolts of a Forum Spam Automator
Youngsang Shin, Minaxi Gupta, and Steven Myers, Indiana University, Bloomington

Read the Abstract | Full paper

View the Slides

MP3 Icon Listen to the MP3

The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns
Brett Stone-Gross, University of California, Santa Barbara and LastLine, Inc.; Thorsten Holz, Ruhr-University Bochum and LastLine, Inc.; Gianluca Stringhini, University of California, Santa Barbara; Giovanni Vigna, University of California, Santa Barbara, and LastLine, Inc.

Read the Abstract | Full paper

MP3 Icon Listen to the MP3

On the Effects of Registrar-level Intervention
He (Lonnie) Liu and Kirill Levchenko, University of California, San Diego; Márk Félegyházi, Budapest University of Technology and Economics and International Computer Science Institute; Christian Kreibich, University of California, Berkeley, and International Computer Science Institute; Gregor Maier, International Computer Science Institute; Geoffrey M. Voelker and Stefan Savage, University of California, San Diego

Read the Abstract | Full paper

View the Slides

MP3 Icon Listen to the MP3

12:15 p.m.–1:45 p.m.  Workshop Luncheon, Republic Ballroom
1:45 p.m.–2:30 p.m. Tuesday

Invited Talk

Complex Web of Search Engine Spam
Sasi Parthasarathy, Bing

View the Slides

MP3 Icon Listen to the MP3

2:30 p.m.–3:15 p.m.  Break
3:15 p.m.–4:30 p.m. Tuesday

Threat Measurement and Modeling

Session Chair: Giovanni Vigna, University of California, Santa Barbara, and LastLine, Inc.

Characterizing Internet Worm Infection Structure
Qian Wang, Florida International University; Zesheng Chen and Chao Chen, Indiana University—Purdue University Fort Wayne

Read the Abstract | Full paper

View the Slides

MP3 Icon Listen to the MP3

Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm
Nathaniel Husted and Steven Myers, Indiana University

Read the Abstract | Full paper

View the Slides

MP3 Icon Listen to the MP3

Inflight Modifications of Content: Who Are the Culprits?
Chao Zhang, Polytechnic Institute of NYU; Cheng Huang, Microsoft Research; Keith W. Ross, Polytechnic Institute of NYU; David A. Maltz and Jin Li, Microsoft Research

Read the Abstract | Full paper

View the Slides

MP3 Icon Listen to the MP3

4:30 p.m.–4:45 p.m.  Short Break
4:45 p.m.–6:00 p.m. Tuesday

New Threats and Challenges

Session Chair: Engin Kirda, Northeastern University

Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus Software
Mohammed I. Al-Saleh and Jedidiah R. Crandall, University of New Mexico

Read the Abstract | Full paper

View the Slides

MP3 Icon Listen to the MP3

Reconstructing Hash Reversal based Proof of Work Schemes
Jeff Green, Joshua Juen, Omid Fatemieh, Ravinder Shankesi, Dong Jin, and Carl A. Gunter, University of Illinois at Urbana-Champaign

Read the Abstract | Full paper

MP3 Icon Listen to the MP3

Andbot: Towards Advanced Mobile Botnets
Cui Xiang, Fang Binxing, Yin Lihua, Liu Xiaoyi, and Zang Tianning, Institute of Computing Technology, Chinese Academy of Sciences

Read the Abstract | Full paper

View the Slides

MP3 Icon Listen to the MP3

?Need help? Use our Contacts page.

Last changed: 25 April 2011 jp