Monday, Sept 26 |
|
|
|
|
3:00p |
Check-in |
|
|
|
6:00p |
Reception |
|
|
|
7:00p |
Dinner |
|
|
|
|
|
|
|
|
Tuesday, Sept 27 |
|
Title |
Speaker |
Chair |
7:30a |
Breakfast |
|
|
|
9:00a |
Opening |
|
|
Carrie Gates, Rainer Böhme |
9:30a |
Paper 1 |
I'm Not Sure If We're Okay: Uncertainty for Attackers and Defenders |
Matt Bishop |
Jeremy Epstein
|
10:30a |
Break |
|
|
|
10:45a |
Paper 2 |
Harvesting the Low-hanging Fruits: Defending Against Automated Large-Scale Cyber Intrusions by Focusing on the Vulnerable Population |
Hassan Halawa |
Mary Ellen Zurko |
11:45a |
Break |
|
|
|
12:00p |
Paper 3 |
Cross-Layer Personalization as a First Class Citizen for Situation Awareness and Computer Infrastructure Security |
Aokun Chen |
Abe Singer |
1:00p |
Lunch |
|
|
|
2:30p |
Paper 4 |
Cybersecurity as a Politikum: Implications of Security Discourses for Infrastructures |
Laura Fichtner |
Carrie Gates |
3:30p |
Break |
|
|
|
3:45p |
Paper 5 |
Content-Based Security for the Web |
Daniel Zappala |
Tom Longstaff |
4:45p |
Break |
|
|
|
6:00p |
Reception |
|
|
|
6:30p |
Dinner |
|
|
|
8:00p |
Socializing |
|
|
|
8:00p |
Steering Meeting |
|
|
|
|
|
|
|
|
Wednesday, Sept 28 |
|
Title |
Speaker |
Chair |
7:30a |
Breakfast |
|
|
|
9:00a |
Invited Talk |
|
Joe Hall |
Serge Egelman |
10:00a |
Break |
|
|
|
10:15a |
Paper 6 |
Trusted Execution Environment-Based Authentication Gauge (TEEBAG) |
Ranjbar A. Balisane |
William Cheswick |
11:15a |
Break |
|
|
|
11:30a |
Paper 7: NSPhD |
Security Evolution: With a Focus on Vehicular Systems |
Dominik Lang |
Paul Van Oorschot |
12:30p |
Lunch |
|
|
|
1:30p |
Excursion: Trail Ride |
|
|
|
6:00p |
Reception |
|
|
|
6:30p |
Dinner |
|
|
|
8:00p |
Socializing |
|
|
|
|
|
|
|
|
Thursday, Sept 29 |
|
|
|
7:30a |
Breakfast |
|
|
|
8:30a |
Paper 8 |
Rethinking Operating System Design: Asymmetric Multiprocessing for Security and Performance |
Scott Brookes |
Matt Bishop |
9:30a |
Break |
|
|
|
9:45a |
Paper 9 |
Searching for Software Diversity: Attaining Artificial Diversity through Program Synthesis |
Gilmore Lundquist |
Anil Somayaji |
10:45a |
Break |
|
|
|
11:00a |
Paper 10 |
A Case for the Economics of Secure Software Development |
Chad Heitzenrater |
Christian W. Probst |
12:00p |
Wrap-up and Conclude |
|
|
Tom Longstaff, Serge Egelman |
12:30p |
Lunch |
|
|
|