University of Minnesota
University Relations
myU OneStop

Go to unit's home.

Home | Seminars and Symposia | Past seminars/symposia: May 13–14, 2004

Third Annual Workshop on Economics of Information Security (WEIS04)

May 13–14, 2004

402 Walter Library


Wednesday May 12
6:00–9:00 p.m.informal reception, Walter Library 401
Thursday, May 13
8:00–9:15 a.m.continental breakfast and registration, Walter 401
9:15–9:30 a.m.introduction, Walter 402
9:30–10:30 a.m.

Eric Rescorla, Is finding security holes a good idea? Slides: (pdf 281 KB) Paper: (pdf 112 KB)

Ashish Arora, Rahul Telang, and Hao Xu, Optimal Policy for Software Vulnerability Disclosure. Slides: (pdf 109 KB) Paper: (pdf 226 KB)
10:30–11:00 a.m.break
11:00–noonDan Geer, The Economics of Shared Risk at the National Scale (invited lecture) Slides: (pdf 279 KB)
noon–1:30 p.m.lunch, Walter 401
1:30–3:00 p.m.

Hal Varian, Fredrik Wallenberg, and Glenn Woroch, Who Signed Up for the Do-Not-Call List? Slides: (pdf 1.1 MB) Paper: (pdf 1.58 MB)

Alessandro Acquisti and Jens Grossklags, Privacy and Rationality: Preliminary Evidence from Pilot Data. Slides: (pdf 469 KB) Paper: (pdf 183 KB)

Ashish Arora, Ramayya Krishnan, Anand Nandkumar, Rahul Telang, and Yubao Yang, Impact of Vulnerability Disclosure and Patch Availability — An Empirical Analysis. Slides: (pdf 171 KB) Paper: (pdf 516 KB)
3:00–3:30 p.m.break
3:30–5:00 p.m.

Karthik Kannan and Rahul Telang, An Economic Analysis of Market for Software Vulnerabilities. Slides: (pdf 270 KB) Paper: (pdf 94KB)

George Danezis and Ross Anderson, The Economics of Censorship Resistance. Slides: (pdf 581 KB) Paper: (pdf 212 KB)

Roger Adkins, An Insurance Style Model for Determining the Appropriate Investment Level against Maximum Loss arising from an Information Security Breach. Slides: (pdf 189 KB) Paper: (pdf 143 KB)
6:00 p.m.reception, Coffman Union
7:00 p.m.banquet, Coffman Union
Friday, May 14
8:00–9:00 a.m.continental breakfast and registration, Walter 401
9:00–10:30 a.m.

Andrei Serjantov and Ross Anderson, On dealing with adversaries fairly. Slides: (pdf 59 KB) Paper: (pdf 178 KB)

Michal Feldman, Christos Papadimitriou, John Chuang, and Ion Stoica, Free-Riding and Whitewashing in Peer-to-Peer Systems. Slides: (pdf 358 KB) Paper: (pdf 121 KB)

Rupert Gatti, Stephen Lewis, Andy Ozment, Thierry Rayna, and Andrei Serjantov, Sufficiently Secure Peer-to-Peer Networks. Slides: (pdf 351 KB) Paper: (pdf 155 KB)
10:30–11:00 a.m.break
11:00–12:30 p.m.

Joan Feigenbaum, Dirk Bergemann, Scott Shenker, and Jonathan M. Smith, Towards an Economic Analysis of Trusted Systems. Slides: (PowerPoint 360KB), (pdf 328KB) Paper: (pdf 100KB)

Stuart Schechter, Toward Econometric Models of the Security Risk from Remote Attacks. (pdf 176 KB)

Maximillian Dornseif and Sascha A. May, Modelling the costs and benefits of Honeynets. Slides: (pdf 2.4 MB) Paper: (pdf 41 KB)
12:30–2:00 p.m.lunch, Walter 401
2:00–3:30 p.m.

Ben Laurie and Richard Clayton, ‘Proof-of-Work’ Proves Not to Work. Slides: (pdf 199 KB) Paper: (pdf 109 KB)

Andy Ozment, Bug Auctions: Vulnerability Markets Reconsidered. Slides: (pdf 190 KB) Paper: (pdf 190 KB)

Nicholas Weaver and Vern Paxson, A Worst-Case Worm. Slides: (pdf 563 KB) Paper: (pdf 67 KB) Dissenting Opinion, Stuart Staniford — slides: (pdf 188 KB)
3:30–4:00 p.m.break
4:00 p.m.discussion