DIMACS Workshop on Theft in E-Commerce: Content, Identity, and Service
April 14 - 15, 2005
DIMACS Center, CoRE Building, Rutgers University, Piscataway, NJ
- Organizers:
- Drew Dean, SRI International, ddean@csl.sri.com
- Markus Jakobsson, Indiana University, markus@indiana.edu
Presented under the auspices of the
Special Focus on Communication Security and Information Privacy and
Workshop Program:
This is a preliminary program subject to change.
Thursday, April 14, 2005
8:00 - 8:30 Registration and Breakfast
8:30 - 8:45 Welcome and Opening Comments
Brenda Latka, DIMACS Associate Director
8:45 - 9:45 Identity Theft: A Risk to Be Managed
Richard A Parry, Consumer Risk Management, JPMorganChase
9:45 - 10:15 Identity Theft and Legitimately - Minted Fraudulent Credentials
Paul Van Oorschot, Carleton University, Canada
10:15 - 10:30 Break
10:30 - 11:00 Some are not thieves!
Alexandr Andoni, MIT
11:00 - 11:30 Using Mutual Authentication to Fight Phishing
Steve Myers, IUB
11:30 - 12:00 Building a Cryptovirus Using Microsoft's Cryptographic API
Adam L: Young, LECG, LLC
12:00 - 1:30 Break
1:30 - 1:45 PhishHook: A Tool to Detect and Prevent Phishing Attacks
Mike Stepp, University of Arizona
1:45 - 2:15 Passwords Don't Get No Respect - - Or, How to Make the Most of (Weak) Shared Secrets
Burt Kaliski, RSA Security
2:15 - 2:45 Blocking Phishing Spam: Pitfalls and Future Directions
Minaxi Gupta, IUB
2:45 - 3:15 Break
3:15 - 3:45 Phishing Countermeasures
Aaron Emigh, Radix Labs
3:45 - 4:15 Messin' with Texas: Deriving Mother's Maiden Names Using Public Records
Virgil Griffith, IUB
4:30 - 5:30 Wine and Cheese Reception - DIMACS Lounge
Friday, April 15, 2005
8:00 - 8:30 Breakfast and Registration
8:30 - 9:00 Identity Theft: Methods and Prevention
John Black, University of Colorado
9:00 - 9:30 Preventing Theft in the Open
Naftaly Minsky, Rutgers University
9:30 - 10:00 Expressing Human Trust in Distributed Systems: the Mismatch Between Tools and Reality
Sean Smith, Dartmouth College
10:00 - 10:15 Break
10:15 - 10:45 Separable Identity - Based Ring Signatures: Theoretical Foundations for Fighting Phishing Attacks
Susan Hohenberger, MIT
10:45 - 11:15 Fighting Phishing Attacks: A Lightweight Trust Architecture for Detecting Spoofed Emails
Ben Adida, MIT
11:15 - 11:45 How to Search Privately on Streaming Data
Rafail Ostrovsky, UCLA
11:45 - 12:15 Distributed Phishing Attacks
Markus Jakobsson, IUB, CACR
12:15 - 1:45 Lunch
1:45 - 2:15 Are Peripheral Security Indicators Effective to Prevent Phishing Attacks?
Min Wu, MIT
2:15 - 2:45 Kleptography: The Outsider Inside Your Crypto Devices, and its Trust Implications
Moti Yung, Columbia University
2:45 - 3:15 Safeguarding wireless service access
Panos Papadimitratos, Virginia Tech
3:15 - 3:30 Break
3:30 - 4:00 Social Networks and Trust Networks
Jean Camp, IUB
4:00 - 4:30 Fraud and Fraud Reduction on the Internet
Bezalel Gavish, Southern Methodist University
Previous: Participation
Next: Registration
Workshop Index
DIMACS Homepage
Contacting the Center
Document last modified on April 8, 2005.