Forwarded from: ACSAC Publicity <m22227at_private> PRELIMINARY PROGRAM 2003 IEEE Symposium on Security and Privacy May 11-14, 2003 The Claremont Resort Oakland, California, USA sponsored by IEEE Computer Society Technical Committee on Security and Privacy in cooperation with The International Association for Cryptologic Research (IACR) For more information, see www.ieee-security.org/TC/SP-Index.html Sunday, May 11, 2003 4:00-7:00 Registration and Reception Monday, May 12, 2003 8:45-9:00 Opening Remarks 9:00-10:30 Session: Anonymity Mixminion: Design of a Type III Anonymous Remailer Protocol George Danezis (Cambridge Univ.), Roger Dingledine, Nick Mathewson (Free Haven Project) Probabilistic Treatment of MIXes to Hamper Traffic Analysis Dakshi Agrawal (IBM Watson), Dogan Kesdogan, Stefan Penz (Aachen Univ. Tech.) Defending Anonymous Communication Against Passive Logging Attacks Matt Wright, Micah Adler, Brian Neil Levine, Clay Shields (U. Mass.) 10:30-11:00 Break 11:00-12:00 Session: IDS Active Mapping: Resisting NIDS Evasion Without Altering Traffic Umesh Shankar (UC Berkeley), Vern Paxson (ICSI) Anomaly Detection Using Call Stack Information Henry Hanping Feng (U. Mass.), Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee (Georgia Tech.), Weibo Gong (U. Mass.) 12:00-1:30 Lunch 1:30-2:30 Invited talk 2:30-3:00 Break 3:00-4:00 Session: OS Defending Against Denial-of-Service Attacks with Puzzle Auctions XiaoFeng Wang, Mike Reiter (CMU) Pi: A Path Identification Mechanism to Defend against DDoS Attacks Abraham Yaar, Adrian Perrig, Dawn Song (CMU) 4:00-6:00 5-minute talks Tuesday, May 13, 2003 9:00-10:30 Session: Formal Methods A Unified Scheme for Resource Protection in Automated Trust Negotiation Ting Yu, Marianne Winslett (U. Illinois, Urbana-Champaign) Beyond Proof-of-compliance: Safety and Availability Analysis in Trust Management Ninghui Li (Stanford), William H. Winsborough (NAI Labs), John C. Mitchell (Stanford) Intransitive Non-Interference for Cryptographic Purposes Michael Backes, Birgit Pfitzmann (IBM Zurich) 10:30-11:00 Break 11:00-12:00 Session: Hardware Specifying and Verifying Hardware for Tamper-Resistant Software David Lie, John Mitchell (Stanford), Chandramohan Thekkath (Microsoft Research), Mark Horowitz (Stanford) Using Memory Errors to Attack a Virtual Machine Sudhakar Govindavajhala, Andrew W. Appel, (Princeton) 12:00-1:30 Lunch 1:30-2:30 Invited talk 2:30-3:00 Break 3:00-4:00 Session: Hardware & Crypto Secret Handshakes from Pairing-Based Key Agreements D. Balfanz, G. Durfee (PARC), N. Shankar (U. Maryland), D.K. Smetters, J. Staddon, H.C. Wong (PARC) Random Key Predistribution Schemes for Sensor Networks Haowen Chan, Adrian Perrig, Dawn Song (CMU) Wednesday, May 14, 2003 9:00-10:30 Session: Distributed Systems Hardening Functions for Large Scale Distributed Computations Douglas Szajda, Barry Lawson, Jason Owen (U. Richmond) A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards Noam Kogan, Yuval Shavitt, Avishai Wool (Tel Aviv Univ.) Using Replication and Partitioning to Build Secure Distributed Systems Lantian Zheng, Stephen Chong, Andrew C. Myers (Cornell), Steve Zdancewic (U. Pennsylvania) 10:30-11:00 Break 11:00-12:00 Vulnerabilities in Synchronous IPC Designs Jonathan S. Shapiro (Johns Hopkins) Garbage Collector Memory Accounting in Language-Based Systems David W. Price, Algis Rudys, Dan S. Wallach (Rice) --------------- ACSAC is sending this message for the 2003 IEEE Symposium on Security and Privacy Committee. ACSAC does not share its mailing lists. See ACSAC activities at http://www.acsac.org - ISN is currently hosted by Attrition.org To unsubscribe email majordomoat_private with 'unsubscribe isn' in the BODY of the mail.
This archive was generated by hypermail 2b30 : Thu Mar 13 2003 - 06:46:06 PST