Speakers
Adrian Perrig
Professor in Electrical and Computer Engineering, Engineering and Public Policy, and Computer Science
Carnegie Mellon University

Adrian Perrig is a Professor in Electrical and Computer Engineering, Engineering and Public Policy, and Computer Science at Carnegie Mellon University. Adrian also serves as the technical director for Carnegie Mellon's Cybersecurity Laboratory (CyLab) and for the iCast project. He earned his Ph.D. degree in Computer Science from Carnegie Mellon University, and spent three years during his Ph.D. degree at University of California at Berkeley. He received his B.Sc. degree in Computer Engineering from the Swiss Federal Institute of Technology in Lausanne (EPFL). Adrian's research revolves around building secure systems and includes network security, trustworthy computing and security for social networks. More specifically, he is interested in trust establishment, trustworthy code execution in the presence of malware, and how to design secure next-generation networks. More information about his research is available on Adrian's web page. He is a recipient of the NSF CAREER award in 2004, IBM faculty fellowships in 2004 and 2005, and the Sloan research fellowship in 2006.



Ernie Brickell
Chief Security Architect
Intel Corporation

Ernie Brickell is the Chief Security Architect at Intel. He runs the Security Architecture Forum which is the decision making body on security architecture at Intel. He is responsible for review and approval of all security architectures across all products at Intel and evaluating new technologies for their impact on security and privacy of Intel platforms. He is also responsible for developing priorities for path finding for security technologies.

Ernie earned his BS in Mathematics from Oklahoma State University in 1975. He went on to the Ohio State University for both his MS in Computer and Information Science in 1978, and a Ph.D. in Mathematics in 1981. He started his career at Sandia National Laboratories in 1981, joined Bellcore in 1985, went back to Sandia in 1988, joined a startup, Certco in 1995, and then joined Intel in 1999. He has chaired, been a program chair, and been a guest speaker at the annual Crypto and Eurocrypt conferences. He was the founding Editor-in-Chief of the Journal of Cryptology, and served as editorial board member for 12 years.

Ernie has focused his recent personal research on privacy protocols. He developed with coauthors, Jan Camenish and Liqun Chen, the Direct Anonymous Attestation protocol so that a hardware device could provide a proof that it was a trusted device without revealing the identity of the device. With coauthor Jiangtao Li, he improved the revocation capability so that an anonymous signer of a message could be revoked. Earlier in his career, Ernie received a reward from the author for breaking the Merkle Hellman knapsack cryptosystem. He also invented protocols for secure audio teleconferencing as well as a private, yet traceable, electronic cash system, and developed a classification for ideal secret sharing schemes.

Accepted Papers
Invited Papers
The Monterey Security Architecture
Cynthia E. Irvine, Thuy N. Nguyen, Timothy E. Levin, David S. Shifflett, Timothy Levin, Jean Khosalim Charles Prince, Paul C. Clark, And Mark Gondree
Full Papers
Trust in a Small package - Minimized MRTM Software Implementation for Mobile Secure Environments
Jan-Erik Ekberg and Sven Bugiel
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi and Marcel Winandy
LaLa: A Late Launch Application
Carl Gebhardt and Chris I. Dalton
A Practical Property-based Bootstrap Architecture
René Korthaus, Ahmad-Reza Sadeghi, Christian Stüble and Jing Zhan
Short Papers
Dynamic Integrity Measurement and Attestation: Towards Defense Against Return-Oriented Programming Attacks
Lucas Davi, Ahmad-Reza Sadeghi and Marcel Winandy
Towards Platform-Independent Trusted Computing
Ronald Toegl, Thomas Winkler, Mohammad Nauman and Theodore Hong
Physically Restricted Authentication with Trusted Hardware
Michael Kirkpatrick and Elisa Bertino
Towards Secure DataFlow Processing in Open Distributed Systems
Juan Du, Wei Wei, Xiaohui Gu and Ting Yu

Program
07:30 - 09:00 Breakfast
09:00 - 09:30 Welcome
09:30 - 10:30 Keynote 1
Adrian Perrig
Designing Secure Systems with Attestation
10:30 - 11:00 Short Break
11:00 - 12:30 Software-based Approaches to Secure Computing
(Chair: Xiaohui Helen Gu, North Carolina State University)
LaLa: A Late Launch Application
Carl Gebhardt and Chris I. Dalton
Trust in a Small package - Minimized MRTM Software Implementation for Mobile Secure Environments
Jan-Erik Ekberg and Sven Bugiel
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi and Marcel Winandy
12:30 - 14:00 Lunch & Mingle
14:00 - 15:00 Keynote 2
Ernie Brickell
A Vision for Platform Security
15:00 - 16:00 Architectural Approaches to Secure Computing
(Chair: Jon McCune, Carnegie Mellon University)
A Practical Property-based Bootstrap Architecture
René Korthaus, Ahmad-Reza Sadeghi, Christian Stüble and Jing Zhan
MYSEA: The Monterey Security Architecture
Cynthia E. Irvine, Thuy N. Nguyen, Timothy E. Levin, David S. Shifflett, Timothy Levin, Jean Khosalim Charles Prince, Paul C. Clark, And Mark Gondree
16:00 - 16:30 Short Break
16:30 - 17:30 Short Papers
(Chair: Christian Stüble, Sirrix AG security technologies)
Dynamic Integrity Measurement and Attestation: Towards Defense Against Return-Oriented Programming Attacks
Lucas Davi, Ahmad-Reza Sadeghi and Marcel Winandy
Physically Restricted Authentication with Trusted Hardware
Michael Kirkpatrick and Elisa Bertino
Towards Platform-Independent Trusted Computing
Ronald Toegl, Thomas Winkler, Mohammad Nauman and Theodore Hong
Towards Secure DataFlow Processing in Open Distributed Systems
Juan Du, Wei Wei, Xiaohui Gu and Ting Yu