1 / 15

Program Introduction

Program Introduction. David Evans University of Virginia. Giovanni Vigna UC Santa Barbara. Thirty years ago. (Okay, this was actually about 34 years ago...). Fraction of Audience Catching Up On Email During Chair’s Welcome Talk. 1980. 2010. 0%. 49%. 52%. 53%. 58%. 62%. 61%. 67%.

winter-cook
Download Presentation

Program Introduction

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Program Introduction David Evans University of Virginia Giovanni Vigna UC Santa Barbara

  2. Thirty years ago... (Okay, this was actually about 34 years ago...)

  3. Fraction of Audience Catching Up On Email During Chair’s Welcome Talk 1980 2010 0% 49% 52% 53% 58% 62% 61% 67% 19% 69% 72% 73% 46% 63% 44% 22% 17% 18% 19% 21% 22% 40% 23% 28% 27% 33% 35% 36% 38% 41% Advantage: 1980

  4. Venue 1980 2010 Oakland, CA Berkeley, CA Advantage: 2010

  5. Paper Acceptance Rate 1980 2010 100% 11% Advantage: 1980 Paper Rejection Rate 0% 89% Advantage: 2010

  6. Arnold Schwarzenegger’s Occupation 1980 2010 Governor Barbarian Advantage: ?

  7. Bill Gates’ Occupation 1980 2010 Improving Global Health Selling BASIC to IBM Advantage

  8. 30th Anniversary Celebrations 1980 2010 None Gala Dinner Tonight! Winner 2010!

  9. Program Overview

  10. Giuseppe Ateniese · Michael Backes · Adam Barth Nikita Borisov · David Brumley · CristianCadar Shuo Chen · AnupamDatta · Nick Feamster DebinGao · Jon Giffin · Virgil Gligor Michael Goodrich · J. Alex Halderman · SomeshJha Rob Johnson · EnginKirda · Yoshi Kohno ShriramKrishnamurthi · Christopher Kruegel Ruby Lee · Michael Locasto · Sergio Maffeis Z. Morley Mao · Jonathan McCune · David Molnar Cristina Nita-Rotaru · Vern Paxson · Mike Reiter Andrei Sabelfeld · Stuart Schechter · HovavShacham VitalyShmatikov · RaduSion · Sean Smith Adam Smith · Dawn Song · Angelos Stavrou · Ed Suh Patrick Traynor · V. N. Venkatakrishnan · Dan Wallach Brent Waters · Westley Weimer · XiaoFeng Wang Felix Wu · DongyanXu · Haifeng Yu · Sencun Zhu Program Committee

  11. Research Papers 26 papers selected from 237 submissions Rigorous review process ( 5 reviews / paper) Emphasis on novel research contributions Spanning breadth of security research Authors from: 10 different countries 27 different university campuses 6 different companies/institutes

  12. Systematization Papers: New for 2010 Systematization of Knowledge: “work that evaluates, systematizes, and contextualizes existing knowledge.” 5 papers selected from 30 submissions Same rigorous review process as research papers Emphasis on value to community Two sessions tomorrow: intrusion detection, taint analysis, vulnerability testing, CAPTCHAs, bootstrapping trust

  13. Other Program Elements Short Talks (Chair: AngelosStavrou) Tomorrow 4:30pm Poster Session and Reception (Carrie Gates and Terry Benzel) Tomorrow 5:45-7:30pm US Cybersecurity R & D (NSF, DHS, etc.) Wednesday, 1:30-5pm Workshops – Thursday (separate registration required) Systematic Approaches to Digital Forensic Engineering W2SP 2010: Web 2.0 Security & Privacy

  14. Evening 10:00 11:00 noon 8:30 9:00 1:00 2:00 3:00 4:00 5:00 Opening Session 1: Malware Analysis Session 2: Information Flow Lunch Session 3: Root of Trust Session 4: Information Abuse Break Break Gala Dinner Today Session 5: Network Security Session 6: SoK 1 Lunch Business Meeting Session 7: Secure Systems Session 8: SoK 2 Short Talks Break Break Break Poster Session Tues 9:00 Closing Session 9: Analyzing Deployed Systems Session 10: Language-Based Security US Cybersecurity R&D (Open to all attendees) Break Weds 9:00 Thursday: Workshops

  15. Enjoy the Symposium! Session 1 (right now!) Malware Analysis Chair: Jon Giffin, Georgia Tech

More Related