http://www.usenix.org/events/hotsec09/tech/
WORKSHOP SESSIONS
All sessions will take place in Salon 4/5 (Level 2) unless
otherwise noted.
Session papers are available to workshop registrants immediately and to
everyone beginning August 11, 2009.
|
Tuesday, August 11, 2009
|
8:30 a.m.–9:00 a.m. Continental Breakfast,
Ballroom Foyer (Level 4) |
 |
9:00 a.m.–10:30 a.m. |
Social Factors and Minimizing Trust
Using Social Factors in Digital Rights
Management
Bader Ali and Muthucumaru Maheswaran, McGill University
Paper in PDF
FaceTrust: Assessing the Credibility of Online Personas via
Social Networks
Michael Sirivianos, Duke University; Kyungbaek Kim, University
of California, Irvine; Xiaowei Yang, Duke University
Paper in PDF
How to Print a Secret
Aleks Essex, University of Ottawa; Jeremy Clark and Urs
Hengartner, University of Waterloo; Carlisle Adams, University
of Ottawa
Paper in PDF
|
10:30 a.m.–11:00 a.m. Break |
 |
11:00 a.m.–12:30 p.m. |
Networks and Software
MitiBox: Camouflage and Deception for
Network Scan Mitigation
Erwan Le Malécot, Kyushu University and Institute of Systems,
Information Technologies and Nanotechnologies
Paper in PDF
SPAN: A Unified Framework and Toolkit for Querying
Heterogeneous Access Policies
Swati Gupta, Indian Institute of Technology, Delhi; Kristen
LeFevre and Atul Prakash, University of Michigan, Ann Arbor
Paper in PDF
Pre-Patched Software
Jianing Guo, Jun Yuan, and Rob Johnson, Stony Brook University
Paper in PDF
| Slides
|
12:30 p.m.–2:00 p.m. Workshop Luncheon,
Ballroom East (Level 4) |
 |
2:00 p.m.–3:30 p.m. |
Mobile and the User
Authentication Technologies for the Blind
or Visually Impaired
Nitesh Saxena, Polytechnic Institute of New York University;
James H. Watt, University of Connecticut
Paper in PDF
Towards Trustworthy Participatory Sensing
Akshay Dua, Nirupama Bulusu, and Wu-chang Feng, Portland State
University; Wen Hu, CSIRO ICT Centre, Australia
Paper in PDF
Implicit Authentication for Mobile Devices
Markus Jakobsson, Elaine Shi, Philippe Golle, and Richard Chow, Palo
Alto Research Center
Paper in PDF
|
3:30 p.m.–4:00 p.m. Break |
 |
4:00 p.m.–5:30 p.m. |
Secure Systems and Applications
Garm: Cross Application Data Provenance
and Policy Enforcement
Brian Demsky, University of California, Irvine
Paper in PDF
Convergence of Desktop and Web Applications on a Multi-Service
OS
Helen J. Wang, Microsoft Research, Redmond; Alexander Moshchuk,
University of Washington, Seattle; Alan Bush, Microsoft
Corporation
Paper in PDF
System Configuration as a Privilege
Glenn Wurster and Paul C. van Oorschot, Carleton University
Paper in PDF
|
|