PANEL: Use of Diversity as a Defense Mechanism (Carol Taylor) PANEL:
The Insider Problem Revisited (Matt Bishop) Flooding and
ACSA New
Security Paradigms 2005
Programme
Tuesday, 20
September 2005
6:30
pm:Dinner
8:00 pm: Welcome
Reception
Wednesday, 21
September 2005
8:00 – 9:00 am:
Breakfast
9:00
– 9:30 am: Welcome and
Announcements from the general chairs
SESSION 1: NATURAL SELECTION AND THE MONOCULTURE
9:30
– 10:30 am: Internet Instability
and Disturbance: Goal or Menace?
Richard
Ford, Mark Bush, Alex Boulatov (Florida Institute of Technology)
10:30 – 11:00 am:
Break
11:00
am – 12:00 pm: PANEL: Use
of Diversity as a Defense Mechanism
Carol
Taylor (University of Idaho)
12:00 – 1:30 pm:
Lunch
SESSION 2: DESIGN CONSIDERATIONS
1:30
– 2:30 pm: Average Case vs. Worst
Case: Margins of Safety in System Design
Andreas
Gal, Christian Probst, Michael Franz (University of California, Irvine)
2:30
– 3:30 pm: Divide and Conquer:
The role of trust and assurance in the design of secure socio-technical systems
Ivan
Flechais (Oxford University), Jens Riegelsberger, M. Angela Sasse (University College,
London)
3:30 – 4:00 pm:
Break
SOCIAL ACTIVITY
4:00
– 6:00 pm:
Boat Cruise on Lake Arrowhead
6:30
pm: Dinner
Thursday, 22
September 2005
8:00 – 9:00 am:
Breakfast
9:15
– 9:30 am: Organizational
announcements
SESSION 3: AUTHENTICATION
9:30
– 10:30 am: Pass-Thoughts:
Authenticating With Our Minds
Julie
Thorpe, Paul van Oorschot, Anil Somayaji (Carleton University)
10:30 – 11:00 am:
Break
11:00
am – 12:00 pm: Message
Authentication by Integrity with Public Corroboration Paul van Oorschot
(Carleton University)
12:00 – 1:30 pm:
Lunch
SESSION 4: MANAGING AUTHORITY
1:30
– 2:30 pm: Flooding and Recycling
Authorizations
Konstantin
Beznosov (University of British Columbia)
2:30
– 3:30 pm: PANEL: The Insider
Problem Revisited
Matt
Bishop (University of California, Davis)
3:30 – 4:00 pm:
Break
SESSION 5: FORENSICS
4:00
– 5:00 pm: Principles-Driven
Forensic Analysis
Sean
Peisert, Sid Karin, Keith Marzullo (University of California, San Diego), Matt
Bishop (University of California, Davis)
5:00 – 6:00 pm: BUSINESS MEETING
6:30 pm: Dinner
Friday, 23
September 2005
8:00 – 8:45 am:
Breakfast
8:45
– 9:00 am: Organizational
announcements
SESSION 6: MODELLING
9:00
– 10:00 am: Visual Security
Protocol Modeling
John
McDermott (Naval Research Laboratory)
10:00
– 11:00 am: Empirical Privilege Profiling
Carla
Marceau, Rob Joyce (ATC-NY)
11:00 – 11:30 am:
Break
11:30
am – 12:30 pm: Speculative
Virtual Verification: Policy-Constrained Speculative Execution
Michael
Locasto, Stelios Sidiroglou,, Angelos Keromytis (Columbia University)
12:30 – 1:30 pm:
Workshop concludes with lunch
|