| Thursday, August 21 | Friday, August 22 | |||||
| 8:00-9:00 | Breakfast Service | |||||
| 8:45-9:00 | Opening | |||||
| 9:00-10:00 | Keynote by Lois Greisman | Keynote by Bradley Taylor | ||||
| Federal Trade Commission | Fighting Spam: Gmail's Story | |||||
| 10:00-10:20 | Coffee Break | |||||
| 10:20-12:00 | Filtering Techniques | Email Usage and Applications | ||||
| Improved Phishing Detection using Model-Based Features | Reducing E-Discovery Cost by Filtering Included Emails | |||||
| Andre Bergholz, Jeong-Ho Chang, Gerhard Paass, Frank Reichartz, Siehyun Strobel | Tsuen-Wan Ngan | |||||
| Filtering Email Spam in the Presence of Noisy User Feedback | Toward a stochastic speech act model of email behavior | |||||
| D. Sculley, Gordon Cormack | John Mildinhall, Jan Noyes | |||||
| Exploiting Transport-Level Characteristics of Spam | Activity-centred Search in Email | |||||
| Robert Beverly, Karen Solins | Einat Minkov, Ramnath Balasubramanyan, William Cohen | |||||
| Personalized Spam Filtering for Gray Mail | Short Paper: Do Zebras get more Spam than Aardvarks? | |||||
| Ming-Wei Chang, Scott Yih, Robert McCann | Richard Clayton | |||||
| 12:00-1:40 | Lunch Break (catered) | |||||
| 1:40-3:20 | Trusted Friends | Filtering and Evaluation | ||||
| Improving Email Trustworthiness through Social-Group Key Authentication | Breaking out of the Browser to Defend Against Phishing Attacks | |||||
| Vivek Pathak, Danfeng Yao, Liviu Iftode | Diana Smetters, Paul Stewart | |||||
| Tracking Email Reputation for Authenticated Sender Identities | Resolving FP-TP Conflict in Digest-Based Collaborative Spam Detection by Use of Negative Selection Algorithm | |||||
| Gautam Singaraju, Jeffrey Moss, Brent ByungHoon Kang | Slavisa Sarafijanovic, Sabrina Perez, Jean-Yves Le Boudec | |||||
| Social Honeypots: Making Friends With A Spammer Near You | Global-scale Anti-spam Testing in Your Own Back Yard | |||||
| Steve Webb, James Caverlee, Calton Pu | Margaret Nielsen, Dane Bertram, Sampson Pun, John Aycock, Nathan Friess | |||||
| On Free Speech and Civil Discourse: Filtering Abuse in Blog Comments | A Mail Client Plugin for Privacy-Preserving Spam Filter Evaluation | |||||
| D. Sculley | Mona Mojdeh, Gordon Cormack | |||||
| 3:20-3:50 | Coffee Break | |||||
| 3:50-5:40 | Sending Spam | Black- and Whitelisting | ||||
| A Survey of Modern Spam Tools | The Effectiveness of Whitelisting: a User-Study | |||||
| Henry Stern | David Erickson | |||||
| A Campaign-based Characterization of Spamming Strategies | Empirical research on IP blacklisting | |||||
| Pedro Calais, Douglas Pires, Dorgival Guedes, Wagner Meira Jr., Cristine Hoepers, Klaus Steding-Jessen | Christian Dietrich, Christian Rossow | |||||
| Detecting Known and New Salting Tricks in Unwanted Emails | 4:40 Business Meeting | |||||
| Andre Bergholz, Gerhard Paass, Frank Reichartz, Siehyun Strobel, Marie-Francine Moens, Brian Witten | ||||||
| Short Papers | ||||||
| Improving Image Spam Filtering Using Image Text Features | ||||||
| Giorgio Fumera, Fabio Roli, Battista Biggio, Ignazio Pillai | ||||||
| Analysis of Spectral Parameters of Audio Signals for the Identification of Spam Over IP Telephony | ||||||
| Christoph Prschmann, Heiko Knospe | ||||||
| 6:00-7:00 | Bar Service | |||||
| from 7:00 | Conference Banquet and Poster Session | |||||