4:00 - 7:00 | Registration and Reception |
8:45 - 9:00 | Opening Remarks |
9:00 - 10:30 | Session: Attacks
Optical Time-Domain Eavesdropping Risks of CRT Displays
Statistical Identification of Encrypted Web Browsing Traffic
Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards
|
10:30 - 11:00 | Break |
11:00 - 12:00 | Session: Privacy and Anonymity
Collaborative Filtering with Privacy
P5: A Protocol for Scalable Anonymous Communication
|
12:00 - 1:30 | Lunch |
1:30 - 2:30 | Invited Talk: Exploits of Large-Scale Web Services and Counter-measures Udi Manber (Yahoo!) |
2:30 - 3:00 | Break |
3:00 - 4:00 | Session: Composition and Conciliation
Methods and Limitations of Security Policy Reconciliation
On the Composition of Secure Systems
|
4:00 - 6:00 | 5-minute Recent Research Presentations |
6:15 - 7:15 | Reception |
7:00 - ??? | Poster Sessions? |
9:00 - 10:30 | Session: Authorization and Delegation
Binder, a Logic-based Security Language
Design of a Role-based Trust-management Framework
Constrained Delegation
|
10:30 - 11:00 | Break |
11:00-12:00 | Session: Static Analysis
Detecting Lots of Security Holes Using System-Specific Static Analysis
Improving Computer Security Using Extended Static Checking
|
12:00 - 1:30 | Lunch |
1:30 - 2:30 | Invited Talk: Questions About National Identity Systems Bob Blakley (IBM Software Group/Tivoli) |
2:30 - 3:00 | Break |
3:00 - 5:00 | Session: Intrusion Detection I
Noninterference and Intrusion Detection
"Why 6?" Defining the Operational Limits of stide
Alert Correlation in a Cooperative Intrusion Detection Framework
Intrusion-Tolerant Enclaves
|
5:15 - 5:45 | Security and Privacy Technical Committee Meeting |
9:00 - 10:30 | Session: Network Protocols
Efficient Multicast Packet Authentication Using Signature Amortization
Self-Healing Key Distribution with Revocation
Expander Graphs for Digital Stream Authentication and Robust Overlay
Networks
|
10:30 - 11:00 | Break |
11:00 - 12:00 | Session: Intrusion Detection II
Automated Generation and Analysis of Attack Graphs
Stateful Intrusion Detection for High-Speed Networks
|