Check out the new USENIX Web site.
Security '08 Banner


Imperial Ballroom

Accepted Posters

The following posters will be presented during a happy hour on Wednesday, July 30, 2008, 6:00 p.m.–7:30 p.m., in the Imperial Ballroom.

Improving Security Visualization with Exposure Map Filtering
David Barrera, Mansour Alsaleh, and P.C. van Oorschot, Carleton University, Ottawa, Canada

Preventing Unicode Filtering Vulnerability Exploits
Sam Block and David Evans, University of Virginia

Handling Identity Agent Compromise in User-Centric Identity Management Systems
Daisuke Mashima and Mustaque Ahamad, Georgia Institute of Technology

TLSConnector: A Proposal for Improving Performance of SSL-VPN Gateways
Nachi Ueno, Kei Karasawa, Shingo Orihara, and Kenji Takahashi, NTT Information Sharing Platform Laboratories, Tokyo, Japan

Anonymity and Privacy for Micropayments
Yao Chen and Radu Sion, Stony Brook University; Bogdan Carbunar, Motorola Labs

Using Synthesized Images for Better CAPTCHAs
Richard Hsu, Karsten Nohl, and David Evans, University of Virginia

Ensemble: Unsupervised Collaborative Anomaly Detection for Popular Applications
Feng Qian, Zhiyun Qian, and Z. Morley Mao, University of Michigan

Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security
Tamara Denning and Tadayoshi Kohno, University of Washington; Kevin Fu, University of Massachusetts Amherst

PsycoTrace: Virtual and Transparent Monitoring of a Process Self
F. Baiardi, D. Maggiari, D. Sgandurra, and F. Tamberi, Università di Pisa, Italy

Self Protecting Linux System
Ananth Chakravarthy, India

PinUP: Pinning User Files to Known Applications
William Enck, Patrick McDaniel, and Trent Jaeger, Pennsylvania State University

Security and Privacy for Implantable Medical Devices
Benjamin Ransford, University of Massachusetts Amherst

Enforcing Authorization Policies Using Transactional Memory Introspection
Arnar Birgisson and Ulfar Erlingsson, Reykjavik University; Mohan Dhawan, Vinod Ganapathy, and Liviu Iftode, Rutgers University

Retrofitting Programs for Information-Flow Security
Dave King and Trent Jaeger, Pennsylvania State University

Automatic Inference and Enforcement of Kernel Data Structure Invariants
Arati Baliga, Vinod Ganapathy and Liviu Iftode, Rutgers University

NetShield: Towards High Performance Network-based Vulnerability Signature Matching
Zhichun Li, Ying He, and Yan Chen, Northwestern University; Gao Xia, Jian Chang, Yi Tang, and Bin Liu, Tsinghua University, Beijing, China

RFIDs and Secret Handshakes: Defending Against Ghost-and-Leech Attacks and Unauthorized Reads with Context-Aware Communications
Alexei Czeskis, Karl Koscher, and Tadayoshi Kohno, University of Washington; Joshua R. Smith, Intel

A Novel Authentication Scheme for Binding Update in Mobile IPv6
Se-hwa Song and Hyoung-Kee Choi, Sungkyunkwan University, Korea

CAV: A Composite Attribute Vector for Web Robot Detection
Dongkun Lee and Junsup Lee, KAIST, Daejeon, Republic of Korea; Sungdeok Cha, Korea University, Seoul, Republic of Korea

?Need help? Use our Contacts page.

Last changed: 23 July 2008 mn