Check out the new USENIX Web site.
USENIX Security '10 Banner


Accepted Posters

The following posters will be presented during a happy hour on Thursday, August 12, 2010, 6:00 p.m.–7:30 p.m., in Thurgood Marshall South West.

Discovering Information Security Discussions among Debian Developers
Hunter Loftis, Andrew Waters, Xintao Wu, and Bei-Tseng Chu, University of North Carolina at Charlotte

Do Vulnerability Studies Make Sense?
Fabio Massacci, Stephan Neuhaus, and Viet Hung Nguyen, Universita degli Studi di Trento

tNAC: Trusted Network Access Control
Ingo Bente, Josef von Helden, and Joerg Vieweg, Trust@FHH Research Group, University of Applied Sciences and Arts, Germany; Marian Jungbauer and Norbert Pohlmann, Institute for Internet Security, University of Applied Sciences, Germany

YAZKC: Yet Another Zero-Knowledge Compiler
Endre Bangerter, Bern University of Applied Sciences, Biel-Bienne, Switzerland; Stephan Krenn, Bern University of Applied Sciences, Biel-Bienne, Switzerland, and University of Fribourg, Switzerland; Ahmad-Reza Sadeghi and Thomas Schneider, Horst Görtz Institute for IT-Security, Germany

Using Pointers for Better Key and Password Security
Roger G. Johnston, Argonne National Laboratory

Teamworking for Security with CIMD: A Collaborative Approach to Intrusion Detection
Rainer Bye, Ahmet Camtepe, and Sahin Albayrak, Technical University of Berlin

Embedded Firmware Diversity for Smart Electric Meters
Stephen McLaughlin, Dmitry Podkuiko, Adam Delozier, Sergei Miadzvezhanka, and Patrick McDaniel, Pennsylvania State University

Moving from Logical Sharing of Guest OS to Physical Sharing of Deduplication on Virtual Machine
Kuniyasu Suzaki, Toshiki Yagi, Kengo Iijima, Nguyen Anh Quynh, and Cyrille Artho, National Institute of Advanced Industrial Science and Technology; Yoshihito Watanebe, Alpha Systems, Inc.

An Architecture for High Assurance of Untrusted Applications on Wireless Handheld Devices via Lightweight Virtualization
Zhaohui Wang, Muhammad Abdulla, Angelos Stavrou, and Anup Ghosh, George Mason University

MedVault: Health Professional Access to Source-Verifiable Patient-Centric PHR Repository
Mustaque Ahamad, Douglas Blough, Ling Liu, David Bauer, Apurva Mohan, Daisuke Mashima, Bhuvan Bamba, Balaji Palanisamy, Ramkumar Krishnan, Italo Dacosta, and Ketan Kalgaonkar, Georgia Institute of Technology

Advancing the Science of Cyber Security Experimentation and Test
Jelena Mirkovic, USC Information Sciences Institute

Automated Black-box Detection of Side-Channel Vulnerabilities in Web Applications
Peter Chapman and David Evans, University of Virginia

GuardRails: A (Nearly) Painless Solution to Insecure Web Applications
Jonathan Burket, Patrick Mutchler, Michael Weaver, and Muzzammil Zaveri, University of Virginia

Secure Node Reloading in a Large-Scale Automated Testbed
Cody Cutler, Mike Hibler, Eric Eide, and Robert Ricci, University of Utah

Stopping Data Leaks by Programming in Data Leaks
Winnie Cheng, IBM T.J. Watson Research Center; Barbara Liskov and Liuba Shrira, Massachusetts Institute of Technology

Verifying Cloud Integrity: Making the Cloud Do the Dirty Work
Joshua Schiffman, Thomas Moyer, Hayawardh Vijayakumar, Trent Jaeger, and Patrick McDaniel, Pennsylvania State University

Redacting PHI in Neurological Images using XNAT  PDF
Alex Barclay, Laureate Institute for Brain Research and Institute of Bioinformatics and Computational Biology, University of Tulsa; Nakeisha Schimke and John Hale, Institute of Bioinformatics and Computational Biology, University of Tulsa

Process Firewalls: Mechanism and Utility
Hayawardh Vijayakumar, Sandra Rueda, Divya Muthukumaran, Joshua Schiffman, and Trent Jaeger, Pennsylvania State University

Tools for Tracking and Understanding Keyword-Based Internet Censorship
Antonio M. Espinoza, Ronald J. Garduño, Leif A. Guillermo, Veronika Strnadova, and Jedidiah R. Crandall, University of New Mexico

The Case for In-the-Lab Botnet Experimentation: Creating and Taking Down a 3000-node Botnet
Joan Calvet, École Polytechnique de Montréal, Canada, and Nancy University—LORIA, France; Carlton R. Davis and José M. Fernandez, École Polytechnique de Montréal, Canada; Jean-Yves Marion, Nancy University—LORIA, France; Pier-Luc St-Onge, École Polytechnique de Montréal, Canada; Wadie Guizani, Nancy University—LORIA, France; Pierre-Marc Bureau, ESET, USA; Anil Somayaji, Carleton University, Canada

Graph Cuts Can Be Used to Solve Security Problems
Divya Muthukumaran, Dave King, and Trent Jaeger, Pennsylvania State University

Policy-based Dynamic Authorization Framework for Sharing Medical Data
Apurva Mohan and Douglas M. Blough, Georgia Institute of Technology; Andrew Post, Tahsin Kurc, and Joel Saltz, Emory University

Browser Extension Frameworks: A Comparison
Nandit Tiku and Wyatt Pittman, University of Illinois at Urbana-Champaign

Physical-layer IDentification of UHF RFID Tags
Davide Zanetti, Boris Danev, and Srdjan Capkun, Swiss Federal Institute of Technology Zurich

Securing End-to-End Provenance: A Systems and Storage Perspective
Kevin Butler, University of Oregon; Patrick McDaniel, Stephen McLaughlin, and Devin Pohly, Pennsylvania State University; Radu Sion and Erez Zadok, Stony Brook University; Marianne Winslett, University of Illinois

fakePointer: A Video Capturing Attack Resilient PIN Input Scheme
Tetsuji Takada, National Institute of Advanced Industrial Science and Technology

?Need help? Use our Contacts page.

Last changed: 2 Sept. 2010 ch