June 18, 2011 - June 30, 2011

The 2011 Summer School on Security and Privacy

Location: Bangalore, India

Date  Time Topic(s) Speaker(s)
June 18 0800  Registrations
0900 Introduction to the Summer School and preparatory lecture Prasad Naldurg
1100  Foundations of Privacy I: Logical methods for specification and enforcement of privacy policies Anupam Dutta
1400  Practicum: Buffer Overflows Saikat Guha
1600  Practicum: Buffer Overflows Saikat Guha
June 19 Off-day
June 20 0900 Privacy Preserving Data Publication I Marianne Winslett
1100  Foundations of Privacy II: Game-theoretic and learning-theoretic techniques for enforcing privacy policies Anupam Dutta
1400  Your ISP and the Government: Best Friends Forever Christopher Soghoian
1600  Panel discussion – Web Privacy Is Obsolete! So Now What? Christopher Soghoian, Marianne Winslett, Anupam Datta
June 21 0900  Privacy Preserving Data Publication II Marianne Winslett
1100  Can you hear me now? What we know about law enforcement surveillance of Internet and mobile communications Christopher Soghoian
1400 Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL Christopher Soghoian
1600  Paper presentation – VEX: Vetting Browser Extensions for Security Vulnerabilities Authors: Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, and Marianne Winslett (UIUC)
June 22 0900  Privacy Preserving Data Publication III Marianne Winslett
1100  Logical analysis of security protocols I SP Suresh
1400  Automated Worm Detection: the NetSift Experience George Varghese
1600  Paper presentation – Baaz: A System for Detecting Access Control Misconfigurations Authors: Tathagata Das, Ranjita Bhagwan, and Prasad Naldurg (Microsoft Research India)
June 23 0900  User Authentication: A Developing World Perspective Saurabh Panjwani
1100  Logical analysis of security protocols II SP Suresh
1400  Rethinking Network Security: Why Handling Evasion in IPS Devices is fundmentally hard without Protocol Changes George Varghese
1600  Paper presentation
June 24 0900  Internet surveillance law and policy Part 1: from Data Protection to the “Crypto Wars” Caspar Bowden
1100  Logical analysis of security protocols III SP Suresh
1400  Retroffiting Legacy Code for Security Somesh Jha
1600  Panel discussion
June 25 0900  Internet surveillance law and policy Part 1: from Data Protection to the “Crypto Wars” Caspar Bowden
1100  Behavior-Based Malware Detection Somesh Jha
1400  Practicum: SQL Injection and XSS Saikat Guha
1600  Practicum: SQL Injection and XSS Saikat Guha
June 26 Off-day
June 27 0900  An Introduction to Differential Privacy: Definitions and Early Uses Frank McSherry
1100  Atomic Execution in Untrusted Environments Ramarathnam Venkatesan
1400  Provable Security: A Primer Sanjit Chaterjee
1600  Rump session
June 28 0900  Programming with Differential Privacy: PINQ and other Languages Frank McSherry
1100  Privacy Regulation in India Malvika Jayaram
1400  Authentication and UID Saurabh Panjwani
1600  Noiseless Differential Privacy Raghav Bhaskar
June 29 0900  Applications of Differential Privacy: Synthetic Datasets and Network Trace Analysis Frank McSherry
1100  Security Emergency Response: Process and Case Studies S. S. Sarma
1400  Issues in Electronic Voting Josh Benaloh, Ron Rivest (video)
1600  Practicum: Brute Force Cracking with the GPU Saikat Guha
June 30 0900  Foundations of Dynamic Access Control Prasad Naldurg
1100  Practical Privacy in Online Advertising Saikat Guha
1400  Entropy-based Information Leakage in Programs Deepak D’Souza
1600  Capture the Flag Team from Amrita University