Starts |
Project Topic and Members |
08:50 |
Opening Remarks, Konstantin Beznosov |
From Randomness to Usability |
09:00 |
"Design of Software-based Pseudo-random Number Generator" Third Best Design Project
Joey Liu, Leon Yu, Aobo Yu, Braulio Chavez
|
09:25 |
"What’s Up With WhatsApp"
Simon Mo, Adama Ode, Avi Kumar, Nathan Cheung |
09:50 |
"Rogue Access Point and WiFi Phishing"
Kevin Shiah, Changhoon Baek, Andrew Yoon |
10:15 |
"Usability Analysis of the Personal Firewall in Mac OS X Lion"
Edward Budiman, Surya Adi Jaya, Jane Lau, Marlow Payne |
10:40 |
Refreshments Break (30 minutes) |
Fooling Home Alarm, RFID Entry, printing, anf GSM Systems
|
11:10 |
"Security Analysis of EYEZ-ON EnvisaLink 2DS Module for Networked Home Alarm System" Second Best Analysis Project, Second Best Video of the Project
Brian Lau, Joanne Chow, Steven Chow, Yolanda Qian |
11:35 |
"Analysis of HID iCLASS Security System" Best Analysis Project, Most Holisitc Approach to Security Engineering
Shirley Gong, Edward Han, Yonatan Indrajaya, Nathaniel Sham |
12:00 |
"Security Analysis of Translink’s Pass System"
David Adomat, Ian Cheng, Malavika Mantripragada, Joshua Shelley |
12:25 |
"A security analysis of the pay-for-printing system deployed at a UBC library" Best Presentation
Anuj Mehta, Denis Abalakov, Dhruv Raturi, Audun Lie Indergaard |
12:50 |
Lunch Break (1 hour) |
Authentication |
13:50 |
"Password Gamification" Best Design Project, Third Best Presentation
Peter Cheung, Peter Yeung, Crystal Ng |
14:15 |
"A password-less login system" Second Best Design Project
Craig Penner, Nick Adams, Peter Schuurman |
14:40 |
"Facebook Security Analysis"
Allister MacLean, Victor de Lima Soares, Gabriel Parreiras |
15:05 |
"Security Analysis of the Richmond Public Library Login System" Honorable Mention
Timothy Tang, Tony Cheng, Vinson Yu, Ken Hu |
15:30 |
Refreshments Break (30 minutes) |
Security Analysis de Jour |
16:00 |
"Analysis of the Security of Gift Cards" Best Video of the Project, Second Most Holistic Approach to Security Engineering
Nor Bainin Khairudin, Kevin Li, Lap Kiu Li, Calvin Ng |
16:25 |
"Security Analysis of the ECE Account Login System" Third Most Holistic Approach to Security Engineering
Catherine Wang, Edmond Louie, Preethal Fernandes, Richard Hsu |
16:50 |
"PayByPhone Mobile Platform Analysis" Second Best Presentation, Third Best Analysis Project, Third Best Video of the Project
Mark Duppenthaler, Keith N. Lee, Shruti Shruti, Cary Wong |
17:15 |
"Free Data: DNS Loopholes in GSM Practices"
Adrian Lindsay, Nick Chow, David Slater, Ben Jeffery |
17:40 |
Awards and prizes
|
18:00 |
Adjourn |