FINAL PROGRAM2006 IEEE Symposium on Security and PrivacyMay 21-24, 2006The Claremont Resort
|
16:00-19:00 | Registration and Reception |
8:45-9:00 | Opening Remarks (Hilarie Orman, Vern Paxson) |
9:00-10:30 |
Session: Signature Generation (Christopher Kruegel) Towards Automatic Generation of Vulnerability-Based Signatures Misleading Worm Signature Generators Using Deliberate Noise Injection Hamsa: Fast Signature Generation for Zero-day Polymorphic Worms |
10:30-11:00 | Break |
11:00-12:15 |
Session: Detection (Robert Cunningham) Dataflow Anomaly Detection Towards a Framework for the Evaluation of Intrusion Detection Systems Siren: Detecting Evasive Malware (Short Paper) |
12:15-13:45 | Lunch |
13:45-15:45 |
Session: Privacy (Carl Landwehr) Fundamental Limits on the Anonymity Provided by the MIX Technique Locating Hidden Servers Practical Inference Control for Data Cubes (Extended Abstract) Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks New Constructions and Practical Applications for
Private Stream Searching (Extended Abstract) |
15:45-16:15 | Break |
16:15-17:45 |
Session: 5-minute Work-in-Progress Talks (Herve Debar and Philippe Golle) |
18:00-20:00 | Reception and Posters |
8:45-10:15 |
Session: Formal Methods (Susan Landau) A Computationally Sound Mechanized Prover for Security Protocols A Logic for Constraint-based Security Protocol Analysis Simulatable Security and Concurrent Composition |
10:15-10:45 | Break |
10:45-12:15 |
Session: Analyzing and Enforcing Policy (Tuomas Aura) Privacy and Contextual Integrity: Framework and Applications FIREMAN: A Toolkit for FIREwall Modeling and ANalysis Retrofitting Legacy Code for Authorization Policy Enforcement |
12:15-13:45 | Lunch |
13:45-15:30 |
Session: Analyzing Code (Doug Tygar) Deriving an Information Flow Checker and Certifying Compiler for Java Automatically Generating Malicious Disks using Symbolic Execution Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper) Cobra: Fine-grained Malware Analysis using Stealth Localized-Executions |
15:30-16:00 | Break |
16:00-17:15 |
Session: Authentication (Paul Van Oorschot) Integrity (I) codes: Message Integrity Protection and Authentication
Cognitive Authentication Schemes Safe Against Spyware (Short Paper) Cache Cookies for Browser Authentication (Extended Abstract) Secure Device Pairing based on a Visual Channel (Short Paper) |
17:15-17:30 | Break |
17:30-18:30 | Business Meeting |
9:00-10:15 |
Session: Attacks (Kevin Fu) SubVirt: Implementing malware with virtual machines Practical Attacks on Proximity Identification Systems (Short Paper) On the Secrecy of Timing-Based Active Watermarking
Trace-Back Techniques |
10:15-10:45 | Break |
10:45-12:30 |
Session: Systems (Helen Wang) A Safety-Oriented Platform for Web Applications Tamper-Evident, History-Independent, Subliminal-Free Data Structures
Analysis of the Linux Random Number Generator The Final Nail in WEP's Coffin |
Last modified: Thu May 4 19:29:34 MST 2006 |