PANEL: Use of Diversity as a Defense Mechanism Carol Taylor

PANEL: The Insider Problem Revisited Matt Bishop

Flooding and Recycling Authorizations Konstantin Beznosov

Empirical Privilege Profiling Carla Marceau
Rob Joyce

Pass-Thoughts: Authenticating With Our Minds Julie Thorpe
Paul van Oorschot
Anil Somayaji

Average Case vs. Worst Case: Margins of Safety in System Design Andreas Gal
Christian Probst
Michael Franz

Visual Security Protocol Modeling John McDermott

Message Authentication by Integrity with Public Corroboration Paul van Oorschot

Divide and Conquer: The role of trust and assurance in the design of secure socio-technical systems Ivan Flechais
Jens Riegelsberger
M. Angela Sasse

Internet Instability and Disturbance: Goal or Menace? Richard Ford
Mark Bush
Alex Boulatov

Principles-Driven Forensic Analysis Sean Peisert
Matt Bishop
Sid Karin
Keith Marzullo

Speculative Virtual Verification: Policy-Constrained Speculative Execution Michael Locasto
Stelios Sidiroglou
Angelos Keromytis