You are here

Program

PDF version

Monday September 9

6pm - 8pm Welcome Reception

Tuesday September 10

8:30-9:00 Introductions & Psychological Contract

9:00-10:00 Forgive and Forget: Return to Obscurity
Matt Bishop, Emily Rine Butler, Kevin Butler, Carrie Gates, and Steven Greenspan
10:00-11:00 Towards the Realization of a Public Health System for Shared Secure Cyber-Space
Jeff Rowe, Karl Levitt, and Mike Hogarth

11:00-11:30 Break

11:30-12:30 Detecting Hidden Enemy Lines in IP Address Space
Suhas Mathur, Baris Coskun, and Suhrid Balakrishnan

12:30-13:30 Lunch

13:30-14:15 NSPHD1: The Polyglot Computer
Daniel M. N. de Castro
14:15-14:20 Short “reset” break
14:20-15:05 NSPHD2: Designing Forensic Analysis Techniques through Anthropology
Sathya Chandran Sundaramurthy

15:05-15:30 Break

15:30-16:30 Useful Password Hashing: How to Waste Computing Cycles with Style
Markus Dürmuth

Wednesday September 11

8:00-10:30 Social Event: Banff Gondola

10:30-11:30
Panel: Markets for Zero-Day Exploits---Ethics and Implications
Serge Egelman, Cormac Herley, and Paul Van Oorschot
11:30-12:30 Laws of Authentication: These Aren't The Passwords You're Looking For
Sean Peisert, Edward Talbot, and Tom Kroeger

12:30-13:30 Lunch

13:30-14:30 Towards Narrative Authentication
Anil Somayaji, David Mould, and Carson Brown
14:30-15:30 Go with the Flow: Toward Workflow-Oriented Security Assessment
Binbin Chen, Zbigniew Kalbarczyk, David M. Nicol, William H. Sanders, Rui Tan, William G. Temple, Nils Ole Tippenhauer, An Hoa Vu, and David Yau

15:30-16:00 Break

16:00-17:00 Explicit Authentication Response Considered Harmful
Lianying Zhao and Mohammad Mannan
17:00-18:00 Can We Sell Security Like Soap? A New Approach to Behaviour Change
Debi Ashenden and Darren Lawrence

Thursday September 12

9:00-10:00 Booby Trapping Software
Stephen Crane, Per Larsen, Stefan Brunthaler, and Michael Franz

10:00-10:30 Break

10:30-11:30 Information Behaving Badly
Julie Boxwell Ard, Matt Bishop, Carrie Gates, and Michael Xin Sun

11:30-12:00 Wrap up and Conclude