PRELIMINARY PROGRAM
2004
IEEE Symposium on Security and Privacy
May 9-12, 2004
The Claremont Resort
Oakland, California, USA
sponsored by
IEEE Computer Society
Technical Committee on Security and Privacy
in cooperation with
The International Association
for Cryptologic Research (IACR)
4:00-7:00 |
Registration and Reception |
8:45-9:00 |
Opening Remarks |
9:00-10:30 |
Session:
Attacks and Defenses
Keyboard Acoustic Emanations
Dmitri Asonov, Rakesh Agrawal (IBM Research)
Effects of Mobility and Multihoming on Transport-Protocol Security
Tuomas Aura (Microsoft Research), Pekka Nikander (Ericsson Research), Gonzalo Camarillo (Ericsson Research)
Analysis of an Electronic Voting System
Tadayoshi Kohno (UC San Diego), Adam Stubblefield (Johns Hopkins Univ.),
Aviel D. Rubin (Johns Hopkins Univ.), Dan S. Wallach (Rice Univ.) |
10:30-11:00 |
Break |
11:00-12:00 |
Panel: Electronic Voting
Dan Wallach (Rice), Dana DeBeauvoir (County Clerk, Travis County, TX), Josh Benaloh (Microsoft Research)
|
12:00-1:30 |
Lunch |
1:30-2:30 |
Session:
Theory of Access Control
Access Control By Tracking Shallow Execution History
Philip W. L. Fong (U. Regina)
A Layered Design of Discretionary Access Controls with Decidable Safety Properties
Jon A. Solworth, Robert Sloan (U. Illinois, Chicago) |
2:30-3:00 |
Break |
3:00-4:00 |
Session:
Cryptography
Symmetric encryption in automatic analyses for confidentiality against active adversaries
Peeter Laud (Tartu University)
Automatic Proof of Strong Secrecy for Security Protocols
Bruno Blanchet (Ecole Normale Superieure)
|
4:00-6:00 |
5-minute work-in-progress talks |
9:00-10:30 |
Session:
Denial of service
An empirical analysis of target-resident DoS filters
Michael Collins (CERT), Michael Reiter (CMU)
Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation
Jun Li, Minho Sung, Jun (Jim) Xu (Georgia Tech.), Li (Erran) Li (Bell Labs)
An Endhost Capability Mechanism to Mitigate DDoS Flooding Attacks
Abraham Yaar, Dawn Song, Adrian Perrig (CMU)
|
10:30-11:00 |
Break |
11:00-12:00 |
Session:
Access Control and Privacy
Safety in Automated Trust Negotiation
William H. Winsborough (George Mason Univ.), Ninghui Li (Purdue Univ.)
Securing OLAP Data Cubes Against Privacy Breaches
Lingyu Wang, Sushil Jajodia, Duminda Wijesekera (George Mason Univ.)
|
12:00-1:30 |
Lunch |
1:30-2:30 |
Panel: Grand Challenges in Computer Security Research
Virgil Gligor (U. Maryland), Mike Reiter (Carnegie Mellon),
Dan Simon (Microsoft Research), Gene Tsudik (U.C. Irvine)
|
2:30-3:00 |
Break |
3:00-4:00 |
Session:
Static Analysis
Run-time Principals in Information-flow Type Systems
Stephen Tse, Steve Zdancewic (U. Pennsylvania)
Formalizing Sensitivity in Static Analysis for Intrusion Detection
Henry Hanping Feng (U. Mass., Amherst), Jonathon T. Giffin (U.
Wisconsin, Madison), Yong Huang (U. Mass., Amherst), Somesh Jha (U.
Wisconsin, Madison), Wenke Lee (Georgia Tech.), Barton P. Miller (U.
Wisconsin, Madison) |
9:00-10:30 |
Session:
Network Security
Fast Portscan Detection Using Sequential Hypothesis Testing
Jaeyeon Jung (MIT), Vern Paxson (ICIR), Arthur W. Berger, Hari Balakrishnan (MIT)
On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution
Maxwell N. Krohn (MIT), Michael J. Freedman, David Mazières (NYU)
Multicast Authentication in Fully Adversarial Networks
Anna Lysyanskaya, Roberto Tamassia, Nikos Triandopoulos (Brown Univ.)
|
10:30-11:00 |
Break |
11:00-12:00 |
Session:
Security Against Physical Attacks
An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data Injection in Sensor Networks
Sencun Zhu, Sanjeev Setia, Sushil Jajodia (George Mason Univ.), Peng Ning (NC State Univ.)
SWAtt: Software-based Attestation for Embedded Devices
Arvind Seshadri, Adrian Perrig (CMU), Leendert van Doorn (IBM and CMU), Pradeep Khosla (CMU) |