| 11:15 AM |
Deception and Consistency (Matt Bishop)
[Abstract]
[Slides]
|
| 11:40 AM |
Information Visualization (Kwan-Liu Ma)
[Abstract]
|
| 12:05 PM |
Davis Social Links:
P2P, Online Social Network, and Autonomous
Community (S. Felix Wu)
[Abstract] |
| 12:30 PM |
Mobile Web Phishing Defense (Francis Hsu)
[Abstract]
[Slides]
|
| 12:55 PM |
Modeling Vulnerabilities: from Buffer Overflows
to Insider Threat (Sophie Engle)
[Abstract]
[Slides]
|
| 1:20 PM |
Systematic and Practical Methods for Computer
Forensics and Attack Analysis (Sean Peisert)
[Abstract]
[Slides] |
| 1:45 PM |
Mithridates: Peering into the Future with
Idle Cores (Earl Barr)
[Abstract]
[Slides] |
| 2:10 PM |
Detecting Sensitive Data Exfiltration by
an Insider Attack (Dipak Ghosal)
[Abstract]
[Slides] |
| 2:10 PM |
Secure
Programming Education (Matt Bishop)
[Abstract]
[Slides] |