PANEL: Use of Diversity as a Defense Mechanism |
Carol Taylor |
|
PANEL: The Insider Problem Revisited |
Matt Bishop |
|
Flooding and Recycling Authorizations |
Konstantin Beznosov |
|
Empirical Privilege Profiling |
Carla Marceau Rob Joyce |
|
Pass-Thoughts: Authenticating With Our Minds |
Julie Thorpe Paul van Oorschot Anil Somayaji |
|
Average Case vs. Worst Case: Margins of Safety in System Design |
Andreas Gal Christian Probst Michael Franz |
|
Visual Security Protocol Modeling |
John McDermott |
|
Message Authentication by Integrity with Public Corroboration |
Paul van Oorschot |
|
Divide and Conquer: The role of trust and assurance in the design of secure socio-technical systems |
Ivan Flechais Jens Riegelsberger M. Angela Sasse |
|
Internet Instability and Disturbance: Goal or Menace? |
Richard Ford Mark Bush Alex Boulatov |
|
Principles-Driven Forensic Analysis |
Sean Peisert Matt Bishop Sid Karin Keith Marzullo |
|
Speculative Virtual Verification: Policy-Constrained Speculative Execution |
Michael Locasto Stelios Sidiroglou Angelos Keromytis |