NSPW Rabbit

New Security Paradigms Workshop 2005

Sept. 20-23, 2005

Lake Arrowhead
California, USA

Program

PANEL: Use of Diversity as a Defense Mechanism (Carol Taylor) PANEL: The Insider Problem Revisited (Matt Bishop) Flooding and

ACSA New Security Paradigms 2005

Programme

 

 

Tuesday, 20 September 2005

6:30 pm:Dinner

 

8:00 pm: Welcome Reception

 


 

Wednesday, 21 September 2005

 

8:00 – 9:00 am: Breakfast


9:00 – 9:30 am: Welcome and Announcements from the general chairs


SESSION 1:  NATURAL SELECTION AND THE MONOCULTURE

 

9:30 – 10:30 am: Internet Instability and Disturbance: Goal or Menace?

Richard Ford, Mark Bush, Alex Boulatov (Florida Institute of Technology)


10:30 – 11:00 am: Break


11:00 am – 12:00 pm: PANEL: Use of Diversity as a Defense Mechanism

Carol Taylor (University of Idaho)


12:00 – 1:30 pm: Lunch


SESSION 2:  DESIGN CONSIDERATIONS

1:30 – 2:30 pm: Average Case vs. Worst Case: Margins of Safety in System Design

Andreas Gal, Christian Probst, Michael Franz (University of California, Irvine)


2:30 – 3:30 pm: Divide and Conquer: The role of trust and assurance in the design of secure socio-technical systems

Ivan Flechais (Oxford University), Jens Riegelsberger, M. Angela Sasse (University College, London)


3:30 – 4:00 pm: Break


SOCIAL ACTIVITY 

4:00 – 6:00 pm: Boat Cruise on Lake Arrowhead


6:30 pm: Dinner

Thursday, 22 September 2005

 

8:00 – 9:00 am: Breakfast


9:15 – 9:30 am: Organizational announcements


SESSION 3:  AUTHENTICATION

9:30 – 10:30 am: Pass-Thoughts: Authenticating With Our Minds

Julie Thorpe, Paul van Oorschot, Anil Somayaji (Carleton University)


10:30 – 11:00 am: Break


11:00 am – 12:00 pm: Message Authentication by Integrity with Public Corroboration Paul van Oorschot (Carleton University)


12:00 – 1:30 pm: Lunch


SESSION 4: MANAGING AUTHORITY

1:30 – 2:30 pm: Flooding and Recycling Authorizations

Konstantin Beznosov (University of British Columbia)

2:30 – 3:30 pm: PANEL: The Insider Problem Revisited

Matt Bishop (University of California, Davis)


3:30 – 4:00 pm: Break


SESSION 5:  FORENSICS

 

4:00 – 5:00 pm: Principles-Driven Forensic Analysis

Sean Peisert, Sid Karin, Keith Marzullo (University of California, San Diego), Matt Bishop (University of California, Davis)


5:00 – 6:00 pm: BUSINESS MEETING


6:30 pm: Dinner

 

 

 

 

 

 

 

 

Friday, 23 September 2005

 

8:00 – 8:45 am: Breakfast


8:45 – 9:00 am: Organizational announcements


SESSION 6:  MODELLING

 

9:00 – 10:00 am: Visual Security Protocol Modeling

John McDermott (Naval Research Laboratory)

10:00 – 11:00 am: Empirical Privilege Profiling

Carla Marceau, Rob Joyce (ATC-NY)


11:00 – 11:30 am: Break


11:30 am – 12:30 pm: Speculative Virtual Verification: Policy-Constrained Speculative Execution

Michael Locasto, Stelios Sidiroglou,, Angelos Keromytis (Columbia University)


12:30 – 1:30 pm: Workshop concludes with lunch

An 
ACSA
Conference
Web Site Courtesy of

SDSC
the San Diego Supercomputer Center


Sponsored by

Online Information Security Masters Program, James Madison University