PRELIMINARY PROGRAM
2003 IEEE
Symposium on Security and Privacy
May 11-14, 2003
The Claremont Resort
Oakland, California, USA
sponsored by
IEEE Computer Society Technical Committee
on Security and Privacy
in cooperation with
The International Association for
Cryptologic Research (IACR)
4:00-7:00 |
Registration
and Reception |
8:45-9:00 |
Opening
Remarks |
9:00-10:30 |
Session: Anonymity Mixminion:
Design of a Type III Anonymous Remailer Protocol George Danezis (Cambridge Univ.), Roger Dingledine, Nick
Mathewson (Free Haven Project) Probabilistic
Treatment of MIXes to Hamper Traffic Analysis Dakshi Agrawal
(IBM Watson), Dogan Kesdogan, Stefan Penz (Aachen Univ. Tech.) Defending
Anonymous Communication Against Passive Logging Attacks Matt
Wright, Micah Adler, Brian Neil Levine, Clay Shields (U. Mass.) |
10:30-11:00 |
Break |
11:00-12:00 |
Session: IDS Active
Mapping: Resisting NIDS Evasion Without Altering Traffic Umesh Shankar (UC Berkeley), Vern Paxson (ICSI) Anomaly
Detection Using Call Stack Information Henry Hanping Feng (U. Mass.), Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee (Georgia Tech.), Weibo Gong (U. Mass.) |
12:00-1:30 |
Lunch |
1:30-2:30 |
Invited
talk |
2:30-3:00 |
Break |
3:00-4:00 |
Session:
OS Defending
Against Denial-of-Service Attacks with Puzzle Auctions XiaoFeng Wang,
Mike Reiter (CMU) Pi: A
Path Identification Mechanism to Defend against DDoS Attacks Abraham Yaar, Adrian Perrig, Dawn Song (CMU) |
4:00-6:00 |
5-minute talks |
9:00-10:30 |
Session: Formal Methods A
Unified Scheme for Resource Protection in Automated Trust Negotiation Ting Yu, Marianne Winslett (U. Illinois, Urbana-Champaign) Beyond
Proof-of-compliance: Safety and Availability Analysis in Trust Management Ninghui Li (Stanford), William H. Winsborough (NAI Labs), John
C. Mitchell (Stanford) Intransitive
Non-Interference for Cryptographic Purposes Michael Backes,
Birgit Pfitzmann (IBM Zurich) |
10:30-11:00 |
Break |
11:00-12:00 |
Session: Hardware Specifying
and Verifying Hardware for Tamper-Resistant Software David Lie, John Mitchell (Stanford), Chandramohan Thekkath
(Microsoft Research), Mark Horowitz (Stanford) Using
Memory Errors to Attack a Virtual Machine Sudhakar Govindavajhala, Andrew W. Appel, (Princeton) |
12:00-1:30 |
Lunch |
1:30-2:30 |
Invited
talk |
2:30-3:00 |
Break |
3:00-4:00 |
Session: Hardware & Crypto Secret
Handshakes from Pairing-Based Key Agreements D. Balfanz, G. Durfee (PARC), N. Shankar (U. Maryland), D.K.
Smetters, J. Staddon, H.C. Wong (PARC) Random
Key Predistribution Schemes for Sensor Networks Haowen Chan, Adrian Perrig, Dawn Song (CMU) |
9:00-10:30 |
Session: Distributed Systems Hardening
Functions for Large Scale Distributed Computations Douglas Szajda, Barry Lawson, Jason Owen (U. Richmond) A
Practical Revocation Scheme for Broadcast Encryption Using Smart Cards Noam Kogan, Yuval Shavitt, Avishai Wool (Tel Aviv Univ.) Using
Replication and Partitioning to Build Secure Distributed Systems Lantian Zheng, Stephen Chong, Andrew C. Myers (Cornell), Steve
Zdancewic (U. Pennsylvania) |
10:30-11:00 |
Break |
11:00-12:00 |
Vulnerabilities
in Synchronous IPC Designs Jonathan S. Shapiro (Johns Hopkins) Garbage
Collector Memory Accounting in Language-Based Systems David W. Price, Algis Rudys, Dan S. Wallach (Rice) |