Check out the new USENIX Web site.
USENIX Security '10 Banner


Accepted Presentations

The following were presented during a happy hour on Thursday, August 12, 2010, 6:00 p.m.–7:30 p.m., in Thurgood Marshall South West.

A Methodology for Analyzing Permission-Based Security Models
David Barrera, Carleton University

Revisiting the Computational Practicality of Private Information Retrieval
Femi Olumofin, University of Waterloo

Somnolescent Cryptanalysis
Aniket Kate, University of Waterloo

Security on Memory Deduplication (of IaaS Cloud Computing)
Kuniyasu Suzaki, National Institute of Advanced Industrial Science and Technology (AIST)

RFID-Based Electronic Voting: What Could Possibly Go Wrong?
Avishai Wool, Tel Aviv University

Dispatch Loops as Execution Signatures
Nathan Taylor, University of British Columbia

What Is the Name of My Cat?
Bart Preneel, Katholieke Universiteit Leuven

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Srdjan Capkun, ETH Zurich

Columbia University Privacy Study: Got Privacy?
Maritza Johnson, Columbia University

The Domestication of Software: The Case for Open Source
Jose Fernandez, Polytechnique Montréal

NoTamper: Automatic Blackbox Detection of Parameter Tampering Opportunities in Web Applications
Prithvi Bisht, University of Illinois at Chicago

Simple IPSec
Steve Bellovin, Columbia University

The Human-Centered Authentication Attack
David Harmon, Columbia University

Job Opportunities at RIM
Ian Goldberg, University of Waterloo

Secure Systems Cannot be Engineered
Anil Somayaji, Carleton University

Pac-Man on the Sequoia AVC Edge Voting Machine
J. Alex Halderman, University of Michigan

The Wrd
Dan Wallach, Rice University

Video View the video of this presentation recorded during EVT/WOTE '10.

?Need help? Use our Contacts page.

Last changed: 1 Sept. 2010 ch