Session: Work-in-progress Talks 4:00: Introduction 4:05: "Cryptographically Justifying Dolev-Yao Under Active Attacks" Michael Backes (IBM Research) 4:10: "Static Analyzer for Vicious Executables (SAVE)" A.H. Sung, J. Xu, K. Ramamurthy, P. Chavez, S. Mukkamala, T. Sulaiman, T. Xie (New Mexico Tech) 4:15: "Testing Malware Detectors" Mihai Christodorescu, Somesh Jha (U. Wisconsin) 4:20: "A Theoretical and Practical Attack Derivation Model" Shai Rubin, Somesh Jha, Barton P. Miller (U. Wisconsin) 4:25: "A Semantics-Based Approach to Privacy Languages" Ninghui Li, Ting Yu, Annie I. Anton (Purdue) 4:30: "Ranking False Positives in Security Checkers Using Probabilistic Static Analysis" Rajeev Gopalakrishna, Eugene H. Spafford, Jan Vitek (Purdue) 4:35: "Fast Detection of Scanning Worms" Stuart E. Schechter (Harvard), Jaeyeon Jung (MIT) 4:40: "Shield: First-Line Worm Defense" Helen Wang (Microsoft Research) 4:45: "Privacy in Library RFID : Issues, Practices, and Architectures" David Molnar, David Wagner (UC Berkeley) 4:50: "Security Considerations for IEEE 802.15.4 Networks" Naveen Sastry, David Wagner (UC Berkeley) 4:55: "Pumped TFTP for UDP Covert Channel Identification, Analysis, and Mitigation" Steven J. Greenwald, M. Hossain Heydari (James Madison University) 5:00: "Detecting AAA Vulnerabilities by Mining Execution Profiles" Zhan Xu, David Leon, Andy Podgurski, Vincenzo Liberatore (Case Western Reserve University) 5:05: "A Method for Detection and Visualization of Anomalous Network Behaviors From IP Traffic Flow" John Zachary (U. South Carolina), John McEachen, David Ford (Naval Postgraduate School) 5:10: "Views of Privacy: Business Drivers, Strategies, and Directions" Carolyn Brodie, Clare-Marie Karat, John Karat (IBM Research) 5:15: "Isolating Drivers without Tears" Nathanael Paul, David Evans (U. Virginia) 5:20: "Generating Security Policies for Black-Box Software via Collaborative Execution Monitoring" Hilarie Orman 5:25: "Quarantine Region Scheme for Spam Attacks in Wireless Sensor Networks" Serdar Sancak, Erdal Cayirci, Vedat Coskun (Turkish Naval Academy), Albert Levi (Sabanci University) 5:30: "Analysis, Design and Real Time Implementation of Electronic Voting Machine" Nachiappan Arunkumar, Palaniappan Arunkumar (Coventry University) 5:35: "Detecting the Misappropriation of Information by Insiders" Matthew Broadhead, Terrance Goan (Stottler Henke Associates)