Los siguientes documentos corresponden con algunas de las actividades realizadas en el tercer USENIX Workshop realizado en San Jose, CA el pasado 29 de Julio de 2008:
Securing Systems:
Towards Application Security on Untrusted Operating Systems - Dan R.K. Ports, MIT CSAIL and VMware, Inc.; Tal Garfinkel, VMware, Inc. Paper in
HTML PDF Digital Objects as Passwords - Mohammad Mannan and P.C. van Oorschot, Carleton University. Paper in
HTML PDF Security Benchmarking using Partial Verification - Thomas E. Hart, Marsha Chechik, and David Lie, University of Toronto. Paper in
HTML PDF
Exploring New Directions:
Securing Provenance - Uri Braun, Avraham Shinnar, and Margo Seltzer, Harvard School of Engineering and Applied Sciences. Paper in
HTML PDF Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security - Tamara Denning, University of Washington; Kevin Fu, University of Massachusetts Amherst; Tadayoshi Kohno, University of Washington. Paper in
HTML PDF Research Challenges for the Security of Control Systems - Alvaro A. Cárdenas, Saurabh Amin, and Shankar Sastry, University of California, Berkeley. Paper in
HTML PDF
Adversarial Security:
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications - Alexei Czeskis, David J. St. Hilaire, Karl Koscher, Steven D. Gribble, and Tadayoshi Kohno, University of Washington; Bruce Schneier, BT. Paper in
HTML PDF Panic Passwords: Authenticating under Duress - Jeremy Clark and Urs Hengartner, University of Waterloo. Paper in
HTML PDF Bootstrapping Trust in a "Trusted" Platform - Bryan Parno, Carnegie Mellon University. Paper in
HTML PDF
Network Forensics
Towards Quantification of Network-Based Information Leaks via HTTP - Kevin Borders, Web Tap Security, Inc.; Atul Prakash, University of Michigan. Paper in
HTML PDF Principles for Developing Comprehensive Network Visibility - Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, and Nicholas Weaver, ICSI. Paper in
HTML PDF Challenges and Directions for Monitoring P2P File Sharing Networks—or—Why My Printer Received a DMCA Takedown Notice - Michael Piatek, Tadayoshi Kohno, and Arvind Krishnamurthy, University of Washington. Paper in
HTML PDF
Link relacionado:
- 2nd USENIX Workshop on Hot Topics in Security (HotSec '07)
No hay comentarios:
Publicar un comentario