Check out the new USENIX Web site.
WOOT '11 Banner

WOOT '11

WORKSHOP PROGRAM

All sessions will take place in California West unless otherwise noted.

All breakfast and refreshment breaks will take place in the California East/West Foyer,† Elizabethan Foyer, and Elizabethan C.

Monday, August 8, 2011
8:00 a.m.–8:30 a.m.    Continental Breakfast
8:30 a.m.–8:45 a.m.

Welcome and Best Paper Awards
David Brumley and Michal Zalewski, WOOT '11 Program Co-Chairs

8:45 a.m.–10:45 a.m.

Attacks on Networks and Networking Equipment

Media Access Control Address Spoofing Attacks against Port Security
Andrew Buhr, Dale Lindskog, Pavol Zavarsky, and Ron Ruhl, Concordia University College of Alberta

Read the Abstract | Full paper

Video View the Video | Slides

MP3 Icon Listen to the MP3

Fragmentation Considered Vulnerable: Blindly Intercepting and Discarding Fragments
Yossi Gilad and Amir Herzberg, Bar Ilan University

Read the Abstract | Full paper

Video View the Video | Slides

MP3 Icon Listen to the MP3

Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design
Ang Cui, Jatin Kataria, and Salvatore J. Stolfo, Columbia University

Read the Abstract | Full paper

Video View the Video

MP3 Icon Listen to the MP3

SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster
Theodore Reed, Joseph Geis, and Sven Dietrich, Stevens Institute of Technology

Read the Abstract | Full paper

Video View the Video

MP3 Icon Listen to the MP3

10:45 a.m.–11:00 a.m.    Break with coffee and†tea
11:00 a.m.–12:30 p.m.

Crossing into the Real World: Beyond IP-based Attacks

Getting the Face Behind the Squares: Reconstructing Pixelized Video Streams
Ludovico Cavedon, Luca Foschini, and Giovanni Vigna, University of California, Santa Barbara

Read the Abstract | Full paper

Video View the Video

MP3 Icon Listen to the MP3

Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks
Keaton Mowery, Sarah Meiklejohn, and Stefan Savage, University of California, San Diego

Read the Abstract | Full paper

Video View the Video | Slides

MP3 Icon Listen to the MP3

Packets in Packets: Orson Welles' In-Band Signaling Attacks for Modern Radios
Travis Goodspeed, University of Pennsylvania; Sergey Bratus, Ricky Melgares, Rebecca Shapiro, and Ryan Speers, Dartmouth College

Read the Abstract | Full paper

Video View the Video

MP3 Icon Listen to the MP3

12:30 p.m.–2:00 p.m.    Workshop Luncheon served in the Colonial Room
2:00 p.m.–4:00 p.m.

Targeting the Cloud and Commodity Computing Devices

Energy Attack on Server Systems
Zhenyu Wu, Mengjun Xie, and Haining Wang, The College of William and Mary

Read the Abstract | Full paper

Video View the Video | Slides

MP3 Icon Listen to the MP3

Putting Out a HIT: Crowdsourcing Malware Installs
Chris Kanich, Stephen Checkoway, and Keaton Mowery, University of California, San Diego

Read the Abstract | Full paper

Video View the Video | Slides

MP3 Icon Listen to the MP3

All Your Droid Are Belong to Us: A Survey of Current Android Attacks
Timothy Vidas, Daniel Votipka, and Nicolas Christin, Carnegie Mellon University

Read the Abstract | Full paper

Video View the Video | Slides

MP3 Icon Listen to the MP3

Awarded Best Student Paper!
Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques with No Native Executable Code
James Oakley and Sergey Bratus, Dartmouth College

Read the Abstract | Full paper

Video View the Video | Slides

MP3 Icon Listen to the MP3

4:00 p.m.–4:15 p.m.    Break with†beverages
4:15 p.m.–5:45 p.m.

Advances in Low-Level Exploitation

DieHarder: Securing the Heap
Gene Novark and Emery D. Berger, University of Massachusetts Amherst

Read the Abstract | Full paper (updated 7/7/11)

Video View the Video | Slides

MP3 Icon Listen to the MP3

Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities Using Machine Learning
Fabian Yamaguchi and Felix "FX" Lindner, Recurity Labs GmbH; Konrad Rieck, Technische Universitšt Berlin

Read the Abstract | Full paper

Video View the Video | Slides

MP3 Icon Listen to the MP3

Awarded Best Paper!
Exposing iClass Key Diversification
Flavio D. Garcia, Gerhard de Koning Gans, and Roel Verdult, Radboud University Nijmegen

Read the Abstract | Full paper

Video View the Video | Slides

MP3 Icon Listen to the MP3

footer
? Need help? Use our Contacts page.

Last changed: 16 Sept. 2011 jp