|   FINAL PROGRAM2008 IEEE Symposium on Security and PrivacyMay 18-22, 2008The Claremont Resort | 
| 16:00-19:00 | Registration and Reception | 
| 7:30-8:45 | Continental breakfast | 
| 8:45-9:15 | Opening Remarks (Patrick McDaniel, Avi Rubin, Yong Guan) | 
| 9:15-10:15 | Session: Peering
 A Near-Optimal Social Network Defense Against Sybil Attacks Anonymous Networking with Minimum Latency in Multihop Networks | 
| 10:15-10:45 | Break | 
| 10:45-12:15 | Session: Communications Security
 Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations Preserving Caller Anonymity in Voice-over-IP Networks Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping | 
| 12:15-13:30 | Lunch | 
| 13:30-15:00 | Session: Data
 Casting out Demons: Sanitizing Training Data for Anomaly Sensors Efficient and Robust TCP Stream Normalization Robust De-Anonymization of Large Datasets | 
| 15:00-15:30 | Break | 
| 15:30-17:30 | Session: Attacks
 Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications Compromising Reflections -or- How to Read LCD Monitors Around the Corner ClearShot: Eavesdropping Keyboard Input from Video | 
| 18:00-20:00 | Reception | 
| 19:30-21:30 | Student Forum Session Chair: David Du Room: Lanai 2 | 
| 7:30-8:45 | Continental breakfast | 
| 8:45-10:15 | Session: Miscellaneous
 XFA: Faster signature matching with extended automata Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol Practical Privacy for Genomic Computation | 
| 10:15-10:45 | Break | 
| 10:45-12:15 | Session: Defenses
 Lares: An Architecture for Secure Active Monitoring Using Virtualization Practical Proactive Integrity Preservation: A Basis for Malware Defense Preventing memory error exploits with WIT | 
| 12:15-13:30 | Lunch | 
| 13:30-15:00 | Session: Attacks II
 Thinking Inside the Box: System-level Failures of Tamper Proofing Cloaker: Hardware Supported Rootkit Concealment Predictable Design of Network-Based Covert Communication Systems | 
| 15:00-15:30 | Break | 
| 15:30-17:00 | Session: 5-minute Work-in-Progress Talks
     | 
| 17:15-18:30 | Business Meeting | 
| 7:30-8:30 | Continental breakfast | 
| 8:30-10:30 | Session: Programming Language Security
 Verifying the Safety of User Pointer Dereferences Expressive declassification policies and modular static enforcement Civitas: Toward a Secure Voting System Fable: A Language for Enforcing User-defined Security Policies | 
| 10:30-11:00 | Break | 
| 11:00-12:30 | Session: Web and File Sharing Security
 Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications Secure web browsing with the OP web browser Automated formal analysis of a protocol for secure file sharing on untrusted storage | 
| 12:30-12:45 | Closing Remarks (Patrick McDaniel, Avi Rubin, and David Du) | 
| 7:30-18:00 | Digital Forensics Workshop (SADFE 2008) | Lanai 2 | 
| 7:30-18:00 | Web 2.0 Security and Privacy Workshop (W2SP 2008) | Horizon | 
| Last modified: Wednesday May 11 21:34:01 EDT 2008 |