4:00- 7:00 | Registration and Reception |
8:45-9:00 | Opening remarks |
9:00-10:30 | Tamper-resistance and Cryptography
Chair: Cryptographic Security for Mobile Code
Networked Cryptographic Devices Resilient to Capture
Protection of Keys against Modification Attack
|
10:30-11:00 | Break |
11:00-12:00 | Intrusion and anomaly detection, I
Chair: Data Mining Methods for Detection of New Malicious Executables
Evaluation of Intrusion Detectors: A Decision Theory Approach
|
12:00- 1:30 | Lunch |
1:30- 2:30 | Information flow
Chair: On Confidentiality and Algorithms
Preserving Information Flow Properties under Refinement
|
2:30- 3:00 | Break |
3:00- 4:30 | Access control and trust management
Chair: Understanding Trust Management Systems
SD3: a trust management system with certified evaluation
Formal Treatment of Certificate Revocation Under Communal Access
Control
|
9:00-10:30 | Intrusion and Anomaly Detection II
Chair: Information-Theoretic Measures for Anomaly Detection
A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors
Intrusion Detection via Static Analysis
|
10:30-11:00 | Break |
11:00-12:00 | Cryptographic Protocols, I
Chair: Performance of Public Key-Enabled Kerberos Authentication in Large
Networks
A Model for Asynchronous Reactive Systems and its Application to
Secure Message Transmission
|
12:00- 1:30 | Lunch |
1:30- 2:30 | What's really different
Chair: Cryptographic Key Generation from Voice
A Trend Analysis of Exploitations
|
2:30- 3:00 | Break |
3:00- 5:00 | 5-minute presentations on developing research |
9:00-10:30 | Invited Talk: Reverse Engineering:
A Legal Right or Wrong?
Speaker: Pamela Samuelson School of Information Management and Systems University of California at Berkeley |
10:30-11:00 | Break |
11:00-12:00 | Cryptographic protocols, 2
Chair: Graph-Based Authentication of Digital Streams
ELK, a New Protocol for Efficient Large-Group Key Distribution
|
Abstracts for 5-minute talks should fit on one 8.5"x11" or A4 page,
including the title and all author names and affiliations. Send an email with a MIME attachment containing your abstract in PDF or
portable postscript format to needham@microsoft.com.
This email should state that your abstract is for the session of 5-minute
presentations at the 2001 IEEE Symposium on Security and Privacy, and should include the presenter's name, email and postal
addresses, and phone and fax numbers. Please use a
subject field containing the string "Oakland01".
5-minute abstracts due: | March 24, 2001 |
Acceptance notification: | April 12, 2001 |