You are here


Tuesday Sept 18

7:45pm Welcome Reception

Wednesday Sept. 19

8:30 to 9:00: Psychological contract and introductions.
9:00 – 10:00: Wolter Pieters, Sanne H.G. van der Ven and Christian W. Probst. A Move in the Security Measurement Stalemate: Elo-Style Ratings to Quantify Vulnerability
10 to 10:15 coffee
10:15 to 11:15 Sean Peisert, Ed Talbot and Matt Bishop. Turtles All The Way Down: A Clean-Slate, Ground-Up, First-Principles Approach to Secure Systems
11:15 to 11:30: coffee
11:30 to 12:30: Sven Tuerpe. Point-and-Shoot Security Design: Can We Build Better Tools for Developers?
12:30 to 2:30 lunch
2:30 to 3:30: Jeff Rowe and Karl Levitt. Argumentation Logic to Assist in Security Administration
3:30 to 4: coffee
4:00 to 5:00: Benjamin Edwards, Tyler Moore, George Stelle, Steven Hofmeyr and Stephanie Forrest. Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions

Thursday Sept. 20
9:00 to 10:00: Heather Lipford and Mary Ellen Zurko. Someone To Watch Over Me
10:00 to 10:15: coffee
10:15 to 11:15: Zheng Dong, Vaibhav Garg, Apu Kapadia and Jean Camp. Pools, Clubs and Security: Designing for a Party Not a Person
11:15 to 11:30 coffee
11:30 to 12:30 Anthony Morton and Angela Sasse. Privacy is a Process, not a PET - A Theory for Effective Privacy Practice
12:30 to 2:30: lunch
2:30 to 3:30: Richard Ford and Liam Mayron. All Your Base are Belong to US
3:30 to 4:00 coffee
4:00 to 5:00 William C. Garrison Iii, Adam J. Lee and Timothy Hinrichs. The need for application-aware access control evaluation

5:45 Leave for outing (local winery)

Friday Sept 21.
9:00 to 10:00: Julie Thorpe, Amirali Salehi-Abari and Robert Burden. Video-Passwords: Advertising While Authenticating
10:00 to 10:30 coffee
10:30 to 11:30 Jedidiah R. Crandall and Daniela Oliveira. Holographic Vulnerability Studies: Vulnerabilities as Fractures in Interpretation as Information Flows Across Abstraction Boundaries
11:30-12: wrap-up
12 lunch and farewell.