Summer 2012 retreat (Public page)

The summer 2012 retreat was Tuesday, May 29 to Thursday, May 31, 2012, in Half Moon Bay, California.

Slides and posters from the retreat are available to funders and members of the center only.  (They will be made available to the public approximately 6 months after the retreat.)


Tuesday, May 29:

12:45-2:00pm: Introductions and welcome

2:00-3:00pm: Highlight talks

  • 2:00-2:30pm: Measuring User Confidence in Smartphone Security and Privacy (Erika Chin)
  • 2:30-3:00pm: Verification of Hypervisors and CPU Emulators (Cynthia Sturton)
  • 3:00-3:30pm: A Methodology for Choosing Access Control Mechanisms (Serge Egelman)

4:00-5:40pm: Short talks

  • 4:00-4:25pm: On the Feasibility of Large-Scale Author Identification (Neil Gong)
  • 4:25-4:50pm: ScreenPass: Secure Password Entry on Touchscreen Devices (Dongtao Liu)
  • 4:50-5:15pm: ACComplice: Location Inference using Accelerometers on Smartphones (Jun Han)
  • 5:15-5:40pm: Abusing Brain Computer Interfaces as a side-channel into the brain (Daniele Perito)

7:30-8:30pm: Incorporating Engineering Issues into Security Research Agenda (Ernie Brickell, Intel) (in Grand Ballroom)

Wednesday, May 30

8:45-10:15am: Data-centric security and STIL

  • 8:45-9:15am: Platform for Private Data (Mohit Tiwari)
  • 9:15-9:45am: Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems (Stephen McCamant)
  • 9:45-10:15am: Generalizing the BlueChip system (Matt Hicks)

10:30-12:30pm: Security analytics

  • 10:30-11:00am: Security Analytics for Social Network Spam (Alex Kantchelian)
  • 11:00-11:30am: Automation and Improving Public Discourse on the Web (Mike Brennan)
  • 11:30-12:00pm: Privacy-preserving data analysis made easy (Elaine Shi)
  • 12:00-12:30pm: Anonymouth and Its Role in Helping Users Understand Security Analytics (Ariel Stolerman and Andrew McDonald)

7:00-9:00pm: poster session (Montara)

Thursday, May 31

8:30-10:00am: Mobile security and more

  • 8:30-9:00am: Taming Implicit Flows by Ignoring the Road Not Taken (Peter Gilbert)
  • 9:00-9:30am: Privilege Separation in HTML5 applications (Devdata Akhawe)
  • 9:30-10:00am: Cyber-security: present and future (Igor Muttik, McAfee)

10:30-10:35am: presentation of Best Poster Awards
10:35-12:30pm: feedback, closing remarks, direction for the future



We had a poster session at the retreat.  The list of posters presented at the poster session is available to funders and center members here.