Center for Information Protection June 17, 2008
Table of Contents
Agenda............................................................................................................................................................2 Attendees.......................................................................................................................................................3 Industry...................................................................................................................................................3 National Science Foundation.........................................................................................................5 Center for Information Protection ..............................................................................................6 University of California at Davis...................................................................................................7 Talks.............................................................................................................................................................. 10 Deception and Consistency (Bishop)...................................................................................... 10 Information Visualization (Ma)................................................................................................. 18 Davis Social Links: P2P, Online Social Network, and Autonomous Community (Wu)...................................................................................................................... 19 Mobile Web Phishing Defense (Hsu, Chen).......................................................................... 20 Modeling Vulnerabilities: from Buffer Overflows to Insider Threat (Engle, Bishop).......................................................................................................................................... 30 Systematic and Practical Methods for Computer Forensics and Attack Analysis (Peisert) ..................................................................................................................... 53 Secure Programming Education (Bishop) ............................................................................ 65 Mithridates: Peering into the Future with Idle Cores (Barr, Su)................................. 74 Detecting Sensitive Data Exfiltration by an Insider Attack (Ghosal)......................... 92