The Community for Technology Leaders
2012 IEEE Symposium on Security and Privacy Workshops (2012)
San Francisco, CA USA
May 24, 2012 to May 25, 2012
ISBN: 978-0-7695-4740-4
TABLE OF CONTENTS
Papers

Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching (PDF)

M. Rostami , Electr. & Comput. Eng. Dept., Rice Univ., Houston, TX, USA
M. Majzoobi , Electr. & Comput. Eng. Dept., Rice Univ., Houston, TX, USA
F. Koushanfar , Electr. & Comput. Eng. Dept., Rice Univ., Houston, TX, USA
D. S. Wallach , Comput. Sci. Dept., Rice Univ., Houston, TX, USA
S. Devadas , Comput. Sci. & Artificial Intell. Lab., Massachusetts Inst. of Technol., Cambridge, MA, USA
pp. 33-44

A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem (PDF)

R. Nithyanand , Stony Brook Univ., Stony Brook, NY, USA
J. Solis , Sandia Nat. Labs., Livermore, CA, USA
pp. 1-11

Side-Channel Analysis of Grøstl and Skein (PDF)

S. Lévêque , Gemalto, Meudon, France
C. Boura , Gemalto, Meudon, France
D. Vigilant , Gemalto, Meudon, France
pp. 16-26

A Knowledge-Based Approach to Intrusion Detection Modeling (PDF)

S. More , Comput. Sci. & Electr. Eng, Univ. of Maryland, Baltimore, MD, USA
M. Matthews , Comput. Sci. & Electr. Eng, Univ. of Maryland, Baltimore, MD, USA
A. Joshi , Comput. Sci. & Electr. Eng, Univ. of Maryland, Baltimore, MD, USA
T. Finin , Comput. Sci. & Electr. Eng, Univ. of Maryland, Baltimore, MD, USA
pp. 75-81

Using Consensus Clustering for Multi-view Anomaly Detection (PDF)

A. Y. Liu , Appl. Res. Labs., Univ. of Texas at Austin, Austin, TX, USA
D. N. Lam , Appl. Res. Labs., Univ. of Texas at Austin, Austin, TX, USA
pp. 117-124

Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud (PDF)

S. J. Stolfo , Comput. Sci. Dept., Columbia Univ., New York, NY, USA
M. B. Salem , Cyber Security Lab., Accenture Technol. Labs., Reston, VA, USA
A. D. Keromytis , Allure Security Technol., New York, NY, USA
pp. 125-128

[Title page iii] (PDF)

pp. iii

A Framework for Modeling Decision Making and Deception with Semantic Information (PDF)

C. Griffin , Appl. Res. Lab., Penn State Univ., University Park, PA, USA
K. Moore , Coll. of Inf. Sci. & Technol., Penn State Univ., University Park, PA, USA
pp. 68-74

Towards a Semantics of Phish (PDF)

H. Orman , Purple Streak, Inc., Woodland Hills, UT, USA
pp. 91-96

Proactive Insider Threat Detection through Graph Learning and Psychological Context (PDF)

B. Price , Palo Alto Res. Center (PARC), Palo Alto, CA, USA
Juan Liu , Palo Alto Res. Center (PARC), Palo Alto, CA, USA
O. Brdiczka , Palo Alto Res. Center (PARC), Palo Alto, CA, USA
Jianqiang Shen , Palo Alto Res. Center (PARC), Palo Alto, CA, USA
A. Patil , Palo Alto Res. Center (PARC), Palo Alto, CA, USA
R. Chow , Palo Alto Res. Center (PARC), Palo Alto, CA, USA
E. Bart , Palo Alto Res. Center (PARC), Palo Alto, CA, USA
N. Ducheneaut , Palo Alto Res. Center (PARC), Palo Alto, CA, USA
pp. 142-149

Forensic Methods for Detecting Insider Turning Behaviors (PDF)

F. Cohen , IEEE, Livermore, CA, USA
pp. 150-158

A Method for Preventing "Skipping" Attacks (PDF)

M. Joye , Security & Content Protection Labs., Cesson-Sévigné, France
pp. 12-15

[Front cover] (PDF)

pp. C1

The BlueJay Ultra-Lightweight Hybrid Cryptosystem (PDF)

M-J O. Saarinen , REVERE SECURITY, Addison, TX, USA
pp. 27-32

Privacy Control in Smart Phones Using Semantically Rich Reasoning and Context Modeling (PDF)

A. Joshi , Univ. of Maryland Baltimore County, Baltimore, MD, USA
D. Ghosh , Univ. of Maryland Baltimore County, Baltimore, MD, USA
T. Finin , Univ. of Maryland Baltimore County, Baltimore, MD, USA
P. Jagtap , Univ. of Maryland Baltimore County, Baltimore, MD, USA
pp. 82-85

Implementing Mental Models (PDF)

J. Blythe , Inf. Sci. Inst., Univ. of Southern California, Marina del Rey, CA, USA
L. J. Camp , Sch. of Inf., Indiana Univ., Bloomington, IN, USA
pp. 86-90

Decision Support Procedure in the Insider Threat Domain (PDF)

J. P. Murphy , Thayer Sch. of Eng., Dartmouth Coll., Hanover, NH, USA
V. H. Berk , Thayer Sch. of Eng., Dartmouth Coll., Hanover, NH, USA
I. Gregorio-de Souza , Thayer Sch. of Eng., Dartmouth Coll., Hanover, NH, USA
pp. 159-163

Bridging the Semantic Gap to Mitigate Kernel-Level Keyloggers (PDF)

J. Navarro , Comput. Sci. Dept., Bowdoin Coll., Brunswick, ME, USA
E. Naudon , Comput. Sci. Dept., Bowdoin Coll., Brunswick, ME, USA
D. Oliveira , Comput. Sci. Dept., Bowdoin Coll., Brunswick, ME, USA
pp. 97-103

Preface - WRIT 2012 (PDF)

Cybenko , Dartmouth, USA
Moore , Boston Fusion Corp, USA
pp. xvii

Lost in Translation: Improving Decoy Documents via Automated Translation (PDF)

J. Voris , Dept. of Comput. Sci., Columbia Univ., New York, NY, USA
N. Boggs , Dept. of Comput. Sci., Columbia Univ., New York, NY, USA
S. J. Stolfo , Dept. of Comput. Sci., Columbia Univ., New York, NY, USA
pp. 129-133

Author index (PDF)

pp. 164

Message from the General Chair - SPW 2012 (PDF)

Dietrich , Stevens Institute of Technology, NJ, USA
pp. viii-ix

Toward a Game Theoretic Model of Information Release in Social Media with Experimental Results (PDF)

C. Griffin , Appl. Res. Lab., Penn State Univ., University Park, PA, USA
A. Squicciarini , Coll. of Inf. Sci. & Technol., Penn State Univ., University Park, PA, USA
pp. 113-116

Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks (PDF)

Youngho Cho , Dept. of Electr. & Comput. Eng., Univ. of Maryland, College Park, MD, USA
Gang Qu , Dept. of Electr. & Comput. Eng., Univ. of Maryland, College Park, MD, USA
Yuanming Wu , Sch. of Optoelectron. Inf., Univ. of Electron. Sci. & Technol., Chengdu, China
pp. 134-141
102 ms
(Ver )