Check out the new USENIX Web site.

Accepted Posters
The following posters will be presented during a happy hour on Wednesday, August 8, 6:00 p.m.–7:30 p.m., in the Republic Ballroom.

Defacing Facebook: A Web 2.0 Case Study
Adrienne Felt, Computer Science Department, University of Virginia

Fast Packet Classification Using Condition Factorization
Alok Tongaonkar and R. C. Sekar, Computer Science Department, Stony Brook University

Towards Understanding IT Security Professionals and Their Tools
David Botta, Rodrigo Werlinger, Andre Gagne Konstantin Beznosov, Lee Iverson, Brian Fisher, and Sidney Fels, University of British Columbia, Vancouver, Canada

Lockdown: Distributed Policy Analysis and Enforcement within the Enterprise Network
Andrew Blaich, Qi Liao, Aaron Striegel, and Douglas Thain, Department of Computer Science and Engineering, University of Notre Dame

The Study of Identifying Critical Success Factors in Predicting PKI Implementation Success: A Bayesian Classifier Approach
Chaochang Chiu and Yu-Ching Tung, Dept. of Information Management, Yuan Ze University, Taiwan; Chi-I Hsu, Dept. of Information Management, Kainan University, Taiwan

Locating Zombie Nodes and Botmasters in Decentralized Peer-to-Peer Botnets
Chris Nunnery, Brent ByungHoon Kang, and Vikram Sharma, College of Computing and Informatics, University of North Carolina at Charlotte; Julian Grizzard, The Johns Hopkins University Applied Physics Laboratory

Privacy-Preserving WLAN Access Point Discovery
Janne Lindqvist, Helsinki University of Technology, Finland, and International Computer Science Institute, Berkeley, CA

A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms
George I. Davida and Jeremy A. Hansen, Center for Cryptography, Computer and Network Security, University of Wisconsin—Milwaukee

Manigandan Radhakrishnan and Jon A. Solworth, University of Illinois at Chicago

TRACKS: A Behavior Based Policy System to Detect Hidden Malware Micha Moffie and David Kaeli, Computer Architecture Research Laboratory, Northeastern University; Winnie Cheng, Computer Science and Artificial Intelligence Lab, Massachusetts Institute of Technology

NS3: Networked Secure Searchable Storage with Privacy and Correctness
Peter Williams, Radu Sion, and Erez Zadok, Stony Brook Network Security and Applied Cryptography Lab

Tracefilter: A Tool for Locating Network Source Address Validation Filters
Robert Beverly and Steven Bauer, MIT CSAIL

The Case for DDoS Resistant Membership Management in P2P Systems
Xin Sun, Ruben Torres, and Sanjay Rao, Purdue University

Dynamically Establishing Trust: Can it Be Done Reliably?
Ryan Gardner, Sujata Garera, and Aviel D. Rubin, Johns Hopkins University

Exploring the Social and Technical Aspects of Political Conflict On-Line
Thomas J. Holt, Department of Criminal Justice, The University of North Carolina at Charlotte; Lyudmila Leslie, Joshua Soles, and Brittany Spaulding, Department of Software and Information Systems, The University of North Carolina at Charlotte

Authentication Considering a Dishonest Insider
Zhiyao Liang and Rakesh M Verma, Computer Science Department, University of Houston

?Need help? Use our Contacts page.

Last changed: 27 July 2007 ch