Works in Progress Session, Thursday, December 13, 2007, 15:30 - 17:00

A methodology to build secure systems using patterns. Eduardo B. Fernandez, Maria M Larrondo-Petrie, and Michael VanHilst, Dept. of Computer Science and Eng., Florida Atlantic University, USA

Towards securing inter-device communication: Applying Inter-device Authentication and Authorization Framework to Home Appliances. Manabu Hirano, Takeshi Okuda, Suguru Yamaguchi, Toyota National College of Technology, Aichi, 471-8525, Japan, Nara Institute of Science and Technology, Nara, 630-0192, Japan

EXAMIN: Tools for Malware Incubation. Steve Brueckner, Greg Durrett, and Hajime Inoue, ATC-NY, Ithaca, NY, USA

Design and Implementation of a Portable Educational Network to Teach Cyber Security Curricula and Digital Forensics at a Community College. Donna Kaputa, Erie Community College, Williamsville, NY, USA

Towards a High Assurance, Multi-level Secure, Off-the-Shelf PC. David Kleidermacher, Green Hills Software, Inc.

Reducing Vulnerabilities in Software: A European Approach. Per Håkon Meland, Jostein Jensen and Lillian Røstad, SINTEF ICT - Software Engineering, Safety and Security, Trondheim, Norway

The Secflow source code security checker: Current problems and solution alternatives. Dr. Holger Peine and Stefan Mandel, Fraunhofer Institute for Experimental Software Engineering, Kaiserslautern, Germany

Dynamic, Intelligent and Adaptable Access Control. Lillian Røstad, Gunnar René Øie, and Øystein Nytrø, Norwegian University of Science and Technology, Department of Computer and Information Science, Norway

Network Security Analysis Using Attack Graphs. Anoop Singhal, Lingyu Wang, and Sushil Jajodia, Computer Security Division, NIST, Gaithersburg, Maryland, USA, Center for Secure Information Systems, George Mason University, Fairfax, Virginia, USA

Correlating Packet Timing with Memory Content Detects IP Covert Timing Channels. Richard Stillman, Graduate School of Computer and Information Sciences, Nova Southeastern University, Fort Lauderdale, Florida, USA

fakePointer: A User Authentication Scheme That Makes Peeping Attack with a Video Camera Hard. Tetsuji Takada, National Institute of Advanced Industrial Science and Technology, Tokyo, Japan

Security Analysis of the Native Code in Sun's JDK. Jason Croft and Gang Tan, Department of Computer Science, Boston College, Boston, Massachusetts, USA

Social Engineering: Where's the Research? Carol Taylor and Nolan Garrett, Computer Science Department, Eastern Washington University, Cheney, Washington, USA, 2Intrinium Networks, Spokane Valley, Washington, USA