Check out the new USENIX Web site.
Security '08 Banner


Tech Sessions: Wednesday, July 30 | Thursday, July 31 | Friday, August 1 | Invited Talk Speakers

Debra Bowen, Dr. Strangevote or: How I Learned to Stop Worrying and Love the Paper Ballot
A pioneer in open government reform, election integrity, and personal privacy rights, Debra Bowen became only the sixth woman in California history elected to a statewide constitutional office when she was elected as Secretary of State in November 2006.

As the chief elections officer for the largest state in the nation, Secretary Bowen is responsible for overseeing state and federal elections, a role that also requires her to test and certify the voting equipment used in California. Her goal is to ensure that voting machines certified for use in Californians elections are secure, accurate, reliable, and accessible, and every voter's ballot is counted exactly as it was cast. In her first year in office, Secretary Bowen commissioned an independent, top-to-bottom review of voting technology, as well as a comprehensive review of the state's decades-old election auditing standards. Following the top-to-bottom review, Bowen strictly limited the use of direct recording electronic voting machines and imposed significant security and auditing requirements on systems used in California elections. Secretary Bowen was recognized for her national leadership in election integrity with the 2008 John F. Kennedy Profile in Courage Award, the nation's most prestigious honor for elected public servants who choose principles over partisanship.

Dawson Engler, 10+ Billion Lines of Code Later: Experiences Commercializing a Static Checking Tool
Dawson Engler is an Associate Professor at Stanford. He received his PhD from MIT for his work on the exokernel operating system. His current work focuses on techniques that automatically find interesting errors in real code, ranging from static analysis, through model checking, to symbolic execution. His research group has won numerous Best Paper Awards, and its static checking work formed the basis of a successful startup, Coverity, run by his former students. His only other real-world foray was as a bouncer in Arizona.

Tal Garfinkel, Enterprise Security in the Brave New (Virtual) World
Tal Garfinkel is part of the Advanced Development group at VMware. His current work focuses on developing new security technologies in the context of virtual infrastructure. He is in the process of completeing a PhD in computer science at Stanford University and holds a bachelor's degree in computer science from the University of California, Berkeley.

Darren Lacey, Managing Insecurity: Practitioner Reflections on Social Costs of Security
Darren Lacey is Chief Information Security Officer and Director of IT Compliance for Johns Hopkins University and Johns Hopkins Medicine. He has been working in the technology sector as a developer, attorney, consultant, and executive for nearly twenty years. He was the first Executive Director of the Johns Hopkins University Information Security Institute, a National Security Agency Center of Academic Excellence in Information Assurance.

John Mitchell, Security Analysis of Network Protocols
John Mitchell is the Mary and Gordon Crary Family Professor in the Department of Computer Science at Stanford University. His research interests in the field of computer security include access control, network protocols, privacy, software systems, and Web security. Mitchell has also worked on programming languages, type systems, object systems, formal methods, and other applications of mathematical logic to computer science. Prof. Mitchell is currently a member of the multi-university PORTIA research project to study privacy concerns in databases and information processing systems and a member of the NSF TRUST Science and Technology Center. He is the author of approximately 150 research articles and two books.

Jose Nazario, Political DDoS: Estonia and Beyond
Dr. Jose Nazario is a Senior Security Engineer who heads Arbor Networks' Arbor Security Engineering & Response Team (ASERT). In this capacity he is responsible for analyzing burgeoning Internet security threats, reverse-engineering malicious code, developing software, and creating security mechanisms which are then distributed to Arbor's Peakflow platforms via the Active Threat Feed (ATF) threat detection service.

Dr. Nazario's research interests include large-scale Internet trends such as reachability and topology measurement, Internet-scale events such as DDoS attacks, botnets, and worms, source code analysis tools, and data mining. He is the author of Defense and Detection Strategies Against Internet Worms and Secure Architectures with OpenBSD. He earned a PhD in biochemistry from Case Western Reserve University in 2002.

Niels Provos, The Ghost in the Browser and Other Frightening Stories About Web Malware
Niels Provos is a Senior Staff Software Engineer at Google, where he is responsible for, among other things, protecting users from phishing and malware attacks. His research interests lie in network and computer security in general; most recently he has been focusing on large-scale detection and mitigation of Web-based malware. His latest book, Virtual Honeypots: From Botnet Tracking to Intrusion Detection, was published in 2007.

Ted Schlein, Building the Successful Security Software Company
Ted Schlein is a Managing Partner at Kleiner Perkins Caufield & Byers. He joined the firm in 1996 with a focus on early stage technology companies in the enterprise software and infrastructure markets, including ventures within the network and consumer security arena. Ted was the founding CEO of Fortify Software, a pioneer and market leader in the growing software security market. Now Chairman, he has been instrumental in establishing Fortify as the provider of choice for detecting and eliminating security breaches threatening to derail Fortune 500 and government agency technical deployments. In addition to Fortify, Ted serves on the board of directors of 3VR, 41st Parameter, ArcSight (ARST), Ketera Technologies, IronPlanet, and Verdiem. He also oversees KPCB's investments in LifeLock, Bit 9, and Recycle Bank. Prior to joining KPCB, Ted served as VP of Enterprise Solutions at Symantec. Ted led Symantec's successful move into the software utilities market, as well as the launch of its commercial anti-virus solution, an offering that quickly emerged as the industry gold standard. Ted is the former Chairman of the National Venture Capital Association (NVCA) and the former President of the Western Association of Venture Capitalists (WAVC). He currently serves on the Board of Overseers of the Engineering School at the University of Pennsylvania.

Mark Seiden, From the Casebooks of . . .
Mark Seiden, a programmer since the '60s, has worked since 1983 in areas of security, network, and software engineering for companies worldwide. As a Yahoo Paranoid and as a consultant, recent projects have included design, architecture, and implementation for ebusiness systems, security for online financial transaction processing and for a distributed document processing system, testimony as an expert in computer crime cases, and testing of network, procedural, and physical security in diverse deployed systems, enterprises, and co-location facilities.

Time Digital named him one of the 50 "CyberElite" in their first annual list, and he's been involved with four National Academy of Sciences studies on some trippy subjects. Mark was the first registant of the domain He's been played by an actor in a rather bad movie. His Erdos number is 4.

Hugh Thompson, Hackernomics
Herbert (Hugh) Thompson is Chief Security Strategist at People Security, a security education firm headquartered in New York. An expert on software security, he has co-authored several books, including How to Break Software Security (Addison-Wesley, 2003) and The Software Vulnerability Guide (Charles River, 2005), and more than 80 academic and industrial publications on the topic. In 2006 he was named one of the "Top 5 Most Influential Thinkers in IT Security" by SC Magazine. Hugh has spent his career creating methodologies for building demonstrably more secure software and has trained developers, architects, security testers, and executives at some of the world's largest companies.

?Need help? Use our Contacts page.

Last changed: 21 July 2008 ch