Skip to Content

CSE-Related Research and Researchers Dominate USENIX Security Forum

Here's an alert to graduate students in CSE who want to attend the 23rd annual USENIX Security Symposium that will take place August 20-22 at the Manchester Grand Hyatt San Diego. The conference has extended the deadline for students to apply for travel, accommodations and/or registration grants to attend this year's event. The new deadline is Monday, July 14, and applications must be submitted online (see link below).

USENIX Security is one of the "big three" conferences in computer security, and this year's meeting is going to showcase the work of current faculty and grad students, but also the work of UC San Diego CSE alumni. CSE Prof. Hovav Shacham (pictured at right) is the senior author of a paper, "On the Practical Exploitability of Dual EC in TLS Implementations," co-authored with colleagues including grad student Jake Maskiewicz and CSE alumni Stephen Checkoway (now at Johns Hopkins) and Tom Ristenpart (University of Wisconsin-Madison). Shacham is also senior author on another paper with co-authors from UC San Diego and the University of Michigan. CSE Ph.D. student Neha Chachra (at left during previous internship at Google), advised by Geoffrey Voelker and Stefan Savage in the Systems and Networking group, is one of the co-authors on a paper titled, "Hulk: Eliciting Malicious Behavior in Browser Extensions." In addition to Chachra, the co-authors on the Hulk paper hail from two other University of California campuses -- three co-authors from UC Santa Barbara, and two from UC Berkeley and the International Computer Science Institute, including senior author Vern Paxson.

In addition to the paper above, CSE alumnus Tom Ristenpart (Ph.D. '10) has three other papers on the USENIX Security program. Both Ristenpart and Georgia Tech professor Alexandra (Sasha) Boldyreva (Ph.D. '04) studied under CSE Prof. Mihir Bellare, and Boldyreva also has a paper at USENIX Security this year. Another CSE alumnus, Stephen Checkoway (Ph.D. '12), had four papers accepted (two of them co-authored with UC San Diego researchers). A fourth CSE alumnus, Chris Kanich (Ph.D. '12) -- now an assistant professor at the University of Illinois at Chicago -- also has a paper ("The Long 'Taile' of Typosquatting Domain Names"). Pictured above (l-r): CSE alumni Ristenpart, Checkoway, Boldyreva and Kanich.

According to Center for Networked Systems director Stefan Savage, CSE's intellectual imprint on USENIX Security 2014 goes beyond the individual papers. "There are two sessions whose purpose is driven by our past work," said Savage. "There is a session on return-oriented programming (ROP) that is driven entirely by Hovav Shacham's seminal work on ROP. On top of that, roughly 75 percent of the side-channel session is motivated by the work Tom Ristenpart did here at UC San Diego on cross-VM attacks in the cloud."

Full-time grad student online application for grants to cover travel, accommodations or registration fees.
Visit the online program for USENIX Security 2014.



about seo