SlideShare a Scribd company logo
The 2014 IEEE
Workshop on Web 2.0
Security and Privacy
May 18th, 2014
• Statistics
• Post-Workshop Impact
• Best Paper Announcement
• KeyNote Introduction
Workshop Statistics
Authors
Belgium
5%
China
4%
Germany
8%
India
4%
Ireland
1%
Israel
9%
Mexico
1%
Pakistan
2%
Saudi Arabia
1%
Singapore
4%
United
Kingdom
3%
United States
58%
Submissions
Austria
3%
Belgium
3%
China
3%
Germany
8%
India
6%
Ireland
3%
Israel
6%Mexico
3%
Pakistan
3%
Saudi
Arabia
3%
Singapore
3%
United
Kingdom
3%
United States
53%
Program Committee
Brazil
3%
Germany
5%
India
3%
Italy
8%
Jamaica
5%
Morocco
3%Poland
3%
Russian
Federation
3%
United
Kingdom
3%
United States
64%
Program Committee
Female
34%
Male
66%
Accepted Papers
Germany
20%
Israel
10%
Singapore
10%
United States
60%
General Statistics
Accepted
29%
Rejected
71%
Impact
Post-Workshop
Publication Venues
IEEE Internet
Computing
18%
IEEE
Software
12%
IEEE IT
Professional
26%
No Venue
44%
Best Paper
I Know Where You’ve Been: Geo-Inference
Attacks via the Browser Cache
Many websites customize their services according to different geo-
locations of users, to provide more relevant content and better
responsiveness, including Google, Craigslist, etc. Recently, mobile devices
further allow web applications to directly read users’ geo-location
information from GPS sensors. However, if such websites leave location-
sensitive content in the browser cache, other sites can sniff users’ geo-
locations by utilizing timing side-channels. In this paper, we demonstrate
that such geo-location leakage channels are widely open in popular web
applications today, including 62% of Alexa Top 100 websites. With geo-
inference attacks that measure the timing of browser cache queries, we can
locate users’ countries, cities and neighborhoods in our case studies. We
also discuss whether existing defenses can effectively prevent such attacks
and additional support required for a better defense deployment.
Yaoqi Jia, Xinshu Dong, Zhenkai Liang, Prateek Saxena.
Keynote
Michelle Finneran Dennedy
Vice President & Chief Privacy Officer, McAfee
Michelle currently serves as Chief Privacy Officer to McAfee, an Intel
Company. She is responsible to creating a privacy practice that is focused on
quality and excellence in McAfee’s policies, products, procedures and
governance efforts. Her team is a staunch supporter of McAfee’s outreach
efforts to educate and protect children, families and communities in the
Digital Age.
Before coming to McAfee, Michelle founded The iDennedy Project, a
consulting and advisory company specializing in privacy and security
sensitive organizations. Michelle is also a founder and editor in chief of a
new media site—TheIdentityProject.com—that was started as an advocacy
and education site, currently focused on the growing crime of Child ID theft.
Michelle was the Vice President for Security & Privacy Solutions for the
Oracle Corporation. Her team worked closely with customers to enable them
to proceed with the confidence that information is protected and accelerated
as an asset.
Before the Oracle acquisition of Sun, Michelle was Chief Data Governance
Officer within the Cloud Computing division at Sun Microsystems, Inc.
Michelle worked closely with Sun's business, technical and legal teams to
create to the best data governance policies and processes possible for cloud
computing to build trust for cloud environments through vendor
transparency.
Michelle also served as Sun’s Chief Privacy Officer where she was
responsible for the development and implementation of Sun's data privacy
policies and practices, working across Sun's business groups to drive the
company's continued data privacy excellence.
Michelle has a JD from Fordham University School of Law and a BS degree
with university honors from The Ohio State University. In 2009, she was
awarded the Goodwin Procter-IAPP Vanguard award for lifetime
achievement and the EWF – CSO Magazine Woman of Influence award for
work in the privacy and security fields. In 2012, she was honored by the
National Diversity Council as one of California’s Most Powerful and
Influential Women.
Michelle is a Coauthor, The Privacy Engineer's Manifesto: Getting from
Policy to Code to QA to Value, 2014, Apress Media."

More Related Content

PPT
Module0&1 intro-foundations-b
PDF
Close the Security Gaps of a Remote Workforce
PDF
Security is a process not a magic
PDF
Public Cloud is Not Always the Answer... but Sometimes it is
PPTX
Mobile Protect Pro - Powered by Zimperium
PPTX
How to Gather Global Mobile Threat Intelligence
PPTX
SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud
PPTX
Etl523 pres jj jarick
Module0&1 intro-foundations-b
Close the Security Gaps of a Remote Workforce
Security is a process not a magic
Public Cloud is Not Always the Answer... but Sometimes it is
Mobile Protect Pro - Powered by Zimperium
How to Gather Global Mobile Threat Intelligence
SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud
Etl523 pres jj jarick

What's hot (9)

PDF
[Infographic] 2019: ENTERPRISE MOBILITY TRENDS, CHALLENGES & THE WAY FORWARD
PDF
The Secure Path to Value in the Cloud by Denny Heaberlin
PPTX
Social Media Can Not Be Ignored
PPTX
Are Your IT Systems Secure?
PDF
Security in the New World of Content and Documents
PDF
David's Law
PPTX
CSA Research: Mitigating Cloud Threats
PDF
CSS 2018 Trivia
PDF
June 2016 Worldwide Netskope Cloud Report
[Infographic] 2019: ENTERPRISE MOBILITY TRENDS, CHALLENGES & THE WAY FORWARD
The Secure Path to Value in the Cloud by Denny Heaberlin
Social Media Can Not Be Ignored
Are Your IT Systems Secure?
Security in the New World of Content and Documents
David's Law
CSA Research: Mitigating Cloud Threats
CSS 2018 Trivia
June 2016 Worldwide Netskope Cloud Report
Ad

Viewers also liked (20)

PPT
Wat Is Digital Creator Eigenlijk Vo Info Tekstversie
PDF
Course 1: Create and Prepare Ubuntu 12.04 VM Template
PPS
Presentatie het nieuwe wonen ppt
PPTX
Tierra
PPTX
Jw day 9 (unit 3)
PPT
Project 2000
PDF
Food And Thought
PPTX
Ben's two year presentation
KEY
Weinman danny macbeth
PDF
When communication innovations lead to social exclusion
PDF
VALS WP7 – Dissemina1on Status at Bolton meeting
PDF
Library Instruction Session Outline Example
PPTX
Linked in for career development MBA Talk (08.12.11)
PPT
Project 2000
PPTX
The Power of SharePoint Mobile Web Solutions
PDF
IFS World 2010/1
PPT
Compensation Plan J
PPT
Tobias N Tripp--Juggling
PDF
Social media marketing
PDF
Melhore o seu linkedin!
Wat Is Digital Creator Eigenlijk Vo Info Tekstversie
Course 1: Create and Prepare Ubuntu 12.04 VM Template
Presentatie het nieuwe wonen ppt
Tierra
Jw day 9 (unit 3)
Project 2000
Food And Thought
Ben's two year presentation
Weinman danny macbeth
When communication innovations lead to social exclusion
VALS WP7 – Dissemina1on Status at Bolton meeting
Library Instruction Session Outline Example
Linked in for career development MBA Talk (08.12.11)
Project 2000
The Power of SharePoint Mobile Web Solutions
IFS World 2010/1
Compensation Plan J
Tobias N Tripp--Juggling
Social media marketing
Melhore o seu linkedin!
Ad

Similar to Welcome & Introductory Remarks - IEEE 2014 Web 2.0 Security & Privacy Workshop (20)

PDF
The Architecture of Privacy 1st Edition Courtney Bowman
PPTX
Presentation on Information Privacy
DOCX
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
PPTX
Privacy in the Information Age
PPTX
Privacy in the Information Age [Q3 2015 version]
PDF
Privacy vs personalization: advisory for brand and comms practitioners into 2...
PPTX
AIIM 2015 - Data Privacy
PDF
Privacy awareness full book-l
DOCX
Journal of Criminal Law and CriminologyVolume 103 Issue .docx
PPTX
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
PPTX
Online privacy
PPTX
Online privacy; myth or reality?
PPTX
How your nonprofit can avoid data breaches and ensure privacy
PPTX
Cybersecurity and data privacy
PPTX
Designing for Privacy in an Increasingly Public World
PPT
Tech Topic Privacy
PPT
Aleksandr Yampolskiy Presentation
PDF
Consumers' and Citizens' Privacy
PPTX
IT law : the middle kingdom between east and West
PDF
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
The Architecture of Privacy 1st Edition Courtney Bowman
Presentation on Information Privacy
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
Privacy in the Information Age
Privacy in the Information Age [Q3 2015 version]
Privacy vs personalization: advisory for brand and comms practitioners into 2...
AIIM 2015 - Data Privacy
Privacy awareness full book-l
Journal of Criminal Law and CriminologyVolume 103 Issue .docx
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
Online privacy
Online privacy; myth or reality?
How your nonprofit can avoid data breaches and ensure privacy
Cybersecurity and data privacy
Designing for Privacy in an Increasingly Public World
Tech Topic Privacy
Aleksandr Yampolskiy Presentation
Consumers' and Citizens' Privacy
IT law : the middle kingdom between east and West
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...

More from Tyrone Grandison (20)

PDF
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
PPTX
Learning From the COViD-19 Global Pandemic
PPTX
Systemic Barriers in Technology: Striving for Equity and Access
PDF
COVID and the Ederly
PPTX
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
PPTX
Using Data and Computing for the Greater Good
PPTX
How to effectively collaborate with your IT Departments to Develop Secure IA ...
PPTX
DOES innovation Lab Launch
PPTX
Creating Chandler's IT Strategic Plan
PPTX
Inventing with Purpose, Intention and Focus
PPTX
Becoming a Nation of Innovation
PPTX
Running Mixed Workloads on Kubernetes at IHME
PPTX
The Power Of Open
PDF
ISPAB Presentation - The Commerce Data Service
PDF
Building APIs in Government for Social Good
PPTX
Strategies and Tactics for Accelerating IT Modernization
PPTX
The Creative Economy within the United States of America
PPTX
Enabling Data-Driven Private-Public Collaborations
PPTX
Creating a Data-Driven Government: Big Data With Purpose
PPTX
Security and Privacy in Healthcare
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Learning From the COViD-19 Global Pandemic
Systemic Barriers in Technology: Striving for Equity and Access
COVID and the Ederly
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Using Data and Computing for the Greater Good
How to effectively collaborate with your IT Departments to Develop Secure IA ...
DOES innovation Lab Launch
Creating Chandler's IT Strategic Plan
Inventing with Purpose, Intention and Focus
Becoming a Nation of Innovation
Running Mixed Workloads on Kubernetes at IHME
The Power Of Open
ISPAB Presentation - The Commerce Data Service
Building APIs in Government for Social Good
Strategies and Tactics for Accelerating IT Modernization
The Creative Economy within the United States of America
Enabling Data-Driven Private-Public Collaborations
Creating a Data-Driven Government: Big Data With Purpose
Security and Privacy in Healthcare

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Machine Learning_overview_presentation.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
A Presentation on Artificial Intelligence
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
cuic standard and advanced reporting.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Spectroscopy.pptx food analysis technology
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Assigned Numbers - 2025 - Bluetooth® Document
The AUB Centre for AI in Media Proposal.docx
Advanced methodologies resolving dimensionality complications for autism neur...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Building Integrated photovoltaic BIPV_UPV.pdf
Spectral efficient network and resource selection model in 5G networks
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Machine Learning_overview_presentation.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
A Presentation on Artificial Intelligence
Per capita expenditure prediction using model stacking based on satellite ima...
cuic standard and advanced reporting.pdf
Big Data Technologies - Introduction.pptx
Review of recent advances in non-invasive hemoglobin estimation
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Encapsulation_ Review paper, used for researhc scholars
Spectroscopy.pptx food analysis technology
Network Security Unit 5.pdf for BCA BBA.
NewMind AI Weekly Chronicles - August'25-Week II
Assigned Numbers - 2025 - Bluetooth® Document

Welcome & Introductory Remarks - IEEE 2014 Web 2.0 Security & Privacy Workshop