- Overview
- Symposium Organizers
- Registration Information
- Registration Discounts
- At a Glance
- Calendar
- Technical Sessions
- Birds-of-a-Feather Sessions
- Poster Session
- Sponsorship
- Workshops
- Activities
- Hotel and Travel Information
- Services
- Students
- Questions
- Help Promote!
- Flyer PDF
- For Participants
- Call for Papers
- Past Symposia
sponsors
USENIX Conference Policies
Technical Sessions
Symposium papers are available to registered attendees immediately and to everyone beginning Wednesday, August 14, 2013. Everyone can view the abstracts and the proceedings front matter immediately.
Proceedings Front Matter:
Cover Page | Title Page and List of Organizers | Table of Contents | Message from the Program Chair
USENIX Security '13 Full Proceedings (PDF)
USENIX Security '13 Proceedings Interior (PDF, best for mobile devices)
USENIX Security '13 Erratum (PDF)
USENIX Security '13 Full Proceedings (EPUB)
USENIX Security '13 Full Proceedings (MOBI)
(Registered attendees: Sign in to your USENIX account to download this file.)

Wednesday, August 14, 2013
| 8:15 a.m.–8:45 a.m. | Wednesday |
Continental BreakfastHall of Battles |
|
| 8:45 a.m.–9:00 a.m. | Wednesday |
| 9:00 a.m.–10:30 a.m. | Wednesday |
| 10:30 a.m.–11:00 a.m. | Wednesday |
Break with RefreshmentsHall of Battles |
|
| 11:00 a.m.–12:30 p.m. | Wednesday |
| 12:30 p.m.–2:00 p.m. | Wednesday |
Lunch, on your own |
|
| 2:00 p.m.–3:30 p.m. | Wednesday |
| 3:30 p.m.–4:00 p.m. | Wednesday |
Break with RefreshmentsHall of Battles |
|
| 4:00 p.m.–5:30 p.m. | Wednesday |
| 6:00 p.m.–7:30 p.m. | Wednesday |
| 8:00 p.m.–9:30 p.m. | Wednesday |
Thursday, August 15, 2013
| 8:30 a.m.–9:00 a.m. | Thursday |
Continental BreakfastHall of Battles |
|
| 9:00 a.m.–10:30 a.m. | Thursday |
| 10:30 a.m.–11:00 a.m. | Thursday |
Break with RefreshmentsHall of Battles |
|
| 11:00 a.m.–12:30 p.m. | Thursday |
| 12:30 p.m.–2:00 p.m. | Thursday |
Lunch, on your own |
|
| 2:00 pm.–3:30 p.m. | Thursday |
| 3:30 p.m.–4:00 p.m. | Thursday |
Break with RefreshmentsHall of Battles |
|
| 4:00 p.m.–5:30 p.m. | Thursday |
| 6:00 p.m.–7:30 p.m. | Thursday |
Friday, August 16, 2013
| 8:30 a.m.–9:00 a.m. | Friday |
Continental BreakfastHall of Battles |
|
| 9:00 a.m.–10:30 a.m. | Friday |
| 10:30 a.m.–11:00 a.m. | Friday |
Break with RefreshmentsHall of Battles |
|
| 11:00 a.m.–12:30 p.m. | Friday |
| 12:30 p.m.–2:00 p.m. | Friday |
Lunch, on your own |
|
| 2:00 pm.–3:30 p.m. | Friday |
| 3:30 p.m.–4:00 p.m. | Friday |
Break with RefreshmentsHall of Battles |
|
| 4:00 p.m.–5:30 p.m. | Friday |
© USENIX
EIN 13-3055038























Computing appliances should let users just use the device without having to having to “be careful” what they click on. Worse, “being careful” doesn’t even work anymore, as attackers have invaded nearly every aspect of digital life, and so could be lurking in search engine results, social networks, and even app stores. Windows 8 provides security features such as malware resistance, app isolation, and modernized access controls that defend against attacks by both technical and social means, giving the user the confidence to click what they want. Windows 8 can be used by any member of the family, and network administrators can confidently deploy Windows 8 to their users, without fearing that the user will be co-opted by attackers.
It's been said that the human brain is comprised of 300 million pattern matchers fed with data from our five primary senses and memories. In this age of distributed computing and cheap storage in the cloud, "thinking" without a biological brain is possible for the first time in history. The sensory input into this new, extracorporeal brain is big data. Global data supply chains carry exabytes of government, corporate, and social data powering breakthrough uses in medicine, transportation, communications, and energy. However, equally fantastic is the specter of abuses by powerful players to exploit private information, subtly discriminate, or mistakenly prosecute the innocent.
The Chrome Security Team was founded in 2009 and has adopted a different approach and structure to traditional security teams. We hypothesize that some of Chrome Security's successes can be directly attributed to the unconventional approach. We will freely share details in the hope that progressive organizations will be interested in adopting some of the same tactics.
Using an open-sourced stack from bottom to top, this presentation will discuss the practical challenges alongside the security opportunities of standing up a private cloud infrastructure. Looking beyond the obvious upside of programmatically definable systems, private clouds present a new platform for security controls that are generally unattainable in traditional infrastructure models. Building on this concept, this talk will present a few interesting security ideas that are currently under development and some that could be the subject of future research.
The talk will open with an entertaining demonstration of what is widely considered the best casino-cheating move ever that made millions and fooled state-of-the-art video surveillance technology only because the move was so simple-stupid. Marcus will move on to cover how modern-day casino cheats use computers to scam tables and how casinos battle back with their own. He will discuss roulette computers, RFID technology, hacking into online gaming, and hacking into land casinos’ security systems.

