miércoles, 13 de agosto de 2008

Presentaciones: HotSec 2008 - 3rd USENIX Workshop on Hot Topics in Security

Los siguientes documentos corresponden con algunas de las actividades realizadas en el tercer USENIX Workshop realizado en San Jose, CA el pasado 29 de Julio de 2008:

Securing Systems:

  • Towards Application Security on Untrusted Operating Systems - Dan R.K. Ports, MIT CSAIL and VMware, Inc.; Tal Garfinkel, VMware, Inc. Paper in HTML PDF
  • Digital Objects as Passwords - Mohammad Mannan and P.C. van Oorschot, Carleton University. Paper in HTML PDF
  • Security Benchmarking using Partial Verification - Thomas E. Hart, Marsha Chechik, and David Lie, University of Toronto. Paper in HTML PDF

Exploring New Directions:

  • Securing Provenance - Uri Braun, Avraham Shinnar, and Margo Seltzer, Harvard School of Engineering and Applied Sciences. Paper in HTML PDF
  • Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security - Tamara Denning, University of Washington; Kevin Fu, University of Massachusetts Amherst; Tadayoshi Kohno, University of Washington. Paper in HTML PDF
  • Research Challenges for the Security of Control Systems - Alvaro A. Cárdenas, Saurabh Amin, and Shankar Sastry, University of California, Berkeley. Paper in HTML PDF

Adversarial Security:

  • Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications - Alexei Czeskis, David J. St. Hilaire, Karl Koscher, Steven D. Gribble, and Tadayoshi Kohno, University of Washington; Bruce Schneier, BT. Paper in HTML PDF
  • Panic Passwords: Authenticating under Duress - Jeremy Clark and Urs Hengartner, University of Waterloo. Paper in HTML PDF
  • Bootstrapping Trust in a "Trusted" Platform - Bryan Parno, Carnegie Mellon University. Paper in HTML PDF

Network Forensics

  • Towards Quantification of Network-Based Information Leaks via HTTP - Kevin Borders, Web Tap Security, Inc.; Atul Prakash, University of Michigan. Paper in HTML PDF
  • Principles for Developing Comprehensive Network Visibility - Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, and Nicholas Weaver, ICSI. Paper in HTML PDF
  • Challenges and Directions for Monitoring P2P File Sharing Networks—or—Why My Printer Received a DMCA Takedown Notice - Michael Piatek, Tadayoshi Kohno, and Arvind Krishnamurthy, University of Washington. Paper in HTML PDF

Link relacionado:
- 2nd USENIX Workshop on Hot Topics in Security (HotSec '07)

No hay comentarios: