Program
Note that the papers linked in the program are DRAFT pre-proceedings papers.
Thursday, February 15, 2007
1:30PM - Full Paper Session 1
- An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks
- Collin Jackson (Stanford University)
- Dan Simon (Microsoft Research)
- Desney Tan (Microsoft Research)
- Adam Barth (Stanford University)
- WSKE: Web Server Key Enabled Cookies
- Presentation Slides (PDF)
- Chris Masone (Dartmouth College)
- Kwang-Hyun Baek (Dartmouth College)
- Sean Smith (Dartmouth College)
2:30PM - Break
3PM - Panel: The Future of Phishing
- Moderator:
- Ross Anderson, University of Cambridge [PPT Slides]
- Panelists:
- Mike Bond
- Moti Yung, RSA Laboratories
- N. Asokan, Nokia Research Center and Helsinki University of Technology, Phishing and Mobile Phones [PDF Slides]
6PM - USEC Reception
Friday, February 16, 2007
9AM - Full Paper Session 2
- Usability Analysis of Secure Pairing Methods
- Presentation Slides (PDF)
- Ersin Uzun (University of California, Irvine, Nokia Research Center Helsinki)
- Kristiina Karvonen (Helsinki University of Technology)
- N. Asokan (Helsinki University of Technology, Nokia Research Center Helsinki)
- Low-cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup
- Presentation Slides (PPT)
- Cynthia Kuo (Carnegie Mellon University)
- Jesse Walker (Intel Corporation)
- Adrian Perrig (Carnegie Mellon University)
- Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers
- Jens Grossklags (University of California, Berkeley)
- Nathan Good (University of California, Berkeley)
10:30AM - Break
11AM - Demo
- Prime III: Where Usable Security and Electronic Voting Meet
- Philicity Williams, E. Vincent Cross, II, Idongesit Mkpong-Ruffin, Yolanda McMillian, Kathryn Nobles, Priyanka Gupta, and Juan E. Gilbert (Auburn University)
11:30PM - Panel
- Building Trusted Systems: Does Trusted Computing Enable Trusted Systems?
- Moderator: Raquel Hill (Indiana University)
12:30PM - Lunch
2PM - Work-in-Progress (WIP) Papers Session
- What Instills Trust? A Qualitative Study of Phishing
- Markus Jakobsson (Indiana University-Bloomington and RavenWhite, Inc.)
- Alex Tsow (Indiana University-Bloomington)
- Ankur Shah (Indiana University-Bloomington)
- Eli Blevis (Indiana University-Bloomington)
- Youn-Kyung Lim (Indiana University-Bloomington)
- Phishing IQ Tests Measure Fear, Not Ability
- Vivek Anandpara (Indiana University-Bloomington)
- Andrew Dingman (Indiana University-Bloomington)
- Markus Jakobsson (Indiana University-Bloomington and RavenWhite, Inc.)
- Debin Liu (Indiana University-Bloomington)
- Heather Roinestad (Indiana University-Bloomington)
- Improving Usability by Adding Security to Video Conference Systems
- April Slayden Mitchell (Hewlett Packard Laboratories)
- Alan H. Karp (Hewlett Packard Laboratories)
- A Sense of Security in Pervasive Computing - is the light on when the refrigerator door is closed?
- Jakob Illeborg Pagter (Centre for IT Security, The Alexandra Institute Ltd., Denmark)
- Marianne Graves Petersen (Dept. of Computer Science, University of Aarhus, Denmark)
- Risk Communication in Computer Security Using Mental Models
- Debin Liu (Indiana University-Bloomington)
- Farzaneh Asgharpour (Indiana University-Bloomington)
- L. Jean Camp (Indiana University-Bloomington)
3:30PM - Closing Session