Oral Presentations
Order Name Excerpt Due Presentation First Author, Title of Article
2 Cao Shuping 27-Mar-02 5-Apr-02 Jakobsson, “Security Weaknesses in Bluetooth”
2.5 Lai Benjamin Sze Ting 27-Mar-02 5-Apr-02 Sirbu, “Distributed authentication in Kerberos using public key cryptography"
3 Yip Michael Chun Long 27-Mar-02 9-Apr-02 Craver, “Resolving Rightful Ownerships with Invisible Watermarking Techniques…"
4 Chen Yanqiang 27-Mar-02 9-Apr-02 Chang, “Protecting Software Code by Guards”
5 Chen Lixi 27-Mar-02 10-Apr-02 Wang, “Software Tamper Resistance: Obstructing Static Analysis of Programs”
6 Balakistareddy Swetha 10-Apr-02 16-Apr-02 Cohen, “Computer Viruses – Theory and Experiments"
7 Chin Siu Fung 10-Apr-02 16-Apr-02 Parks, “Vulnerabilities of Reliable Multicast Protocols"
8 Cronin Gareth George 10-Apr-02 19-Apr-02 Jakobsson, “Discouraging Software Piracy Using Software Aging”
9 Hong Seung Ki 10-Apr-02 19-Apr-02 Stern, "Robust Object Watermarking: Application to Code"
10 Chen Xiaoyu 10-Apr-02 30-Apr-02 Feigenbaum, “Privacy Engineering for Digital Rights Management Systems”
11 Siu Cho Jun 10-Apr-02 30-Apr-02 Miller,  “Playing Inside the Black Box: Using Dynamic Instrumentation...”
12 Yan Min 19-Apr-02 1-May-02 Horne, “Dynamic Self-Checking Techniques for Improved Tamper Resistance”
13 Chan Cheuk Fun 19-Apr-02 1-May-02 Bond, “API-Level Attacks on Embedded Systems”
14 Zhao Dejin 19-Apr-02 3-May-02 Palsberg, "Experience with Software Watermarking"
16 Mostafa Shareef Ismail 8-May-02 14-May-02 Greenberg, “Easter Egg Insertion, Detection and Deletion in Commercial Software”
17 Manoonpong Songpol 8-May-02 14-May-02 Anderson, “Low Cost Attacks on Tamper Resistant Devices”
19 Lin Xiang 8-May-02 15-May-02 Sander, “Towards Mobile Cryptography”
19.5 Luo Fenghui 8-May-02 15-May-02 Landwehr, “A Taxonomy of Computer Program Security Flaws”
20 Thoren Stefan Anders 17-May-02 22-May-02 McGraw, “Twelve Rules for Developing More Secure Java Code”
21 Derhamy Hosein 17-May-02 22-May-02 Berthold, “Identity Management Based on P3P"
22 Purnomo Eddy 17-May-02 24-May-02 Arbaugh, “Your 802.11 Wireless Network Has No Clothes"
23 Jin Weiguo 17-May-02 24-May-02 Kephart, "Directed-Graph Epidemiological Models of Computer Viruses"
25 Yang Gene 22-May-02 29-May-02 Davis, “Compliance Defects in Public-Key Cryptography”
26 Bannatyne Oliver Simon 22-May-02 28-May-02 Greenleaf, "An Endnote on Regulating Cyberspace: Architecture vs Law"
27 Tan Haiying 22-May-02 31-May-02 Gray, "D'Agents: Security in a Multiple-Language, Mobile-Agent System"
28 Raghuram Vijapurapu 22-May-02 31-May-02 Wallach, “SAFKASI: A Security Mechanism for Language-based Systems”