Forwarded from: noreply (at) crypto.cs.stonybrook.edu 2012 Network and Distributed System Security Symposium February 5-8, 2012 Hilton San Diego Resort & Spa San Diego, California http://www.isoc.org/tools/conferences/ndss/12 Call for Papers The Network and Distributed System Security Symposium fosters information exchange among research scientists and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technology. The proceedings are published by the Internet Society (ISOC). SPEAKERS We are happy to continue the tradition of highly distinguished and fun speakers. The three distinguished speakers this year are as follows. --------------------------------------------------------------------- David Brin, Scientist and Award-Winning Author ---------------------- David Brin is a scientist, inventor, and New York Times bestselling author. With books ranslated into 25 languages, he has won multiple Hugo, Nebula, and other awards. A film directed by Kevin Costner was based on David's novel The Postman. Other works have been optioned by Paramount and Warner Bros. One of them . Kiln People . has been called a book of ideas disguised as a fast-moving and fun noir detective story, set in a vividly original future; while a hardcover graphic novel "The Life Eaters" explored alternate outcomes to World War II. David's science-fictional Uplift Universe explores a future when humans genetically engineer higher animals, like dolphins, to speak. As a "scientist/futurist", David is seen frequently on television shows such as The ArchiTechs, Universe, and Life After People (the most popular show ever, on the History Channel). along with many appearances on PBS and NPR. He is also much in-demand to speak about future trends, keynoting for IBM, Google, Procter & Gamble, SAP, Microsoft, Qualcomm, the Mauldin Group, and Casey Research, all the way to think tanks, Homeland Security, and the CIA. With degrees from Caltech and the University of California-San Diego, David serves serves on advisory panels ranging from astronomy, space exploration, nanotech, and SETI to national defense and technological ethics. His nonfiction book The Transparent Society explores the dangers of secrecy and loss of privacy in our modern world. It garnered the prestigious Freedom of Speech Prize from the American Library Association. --------------------------------------------------------------------- Eric Grosse, Google Security Director ------------------------------- Eric Grosse is currently an Engineering Director at Google in Mountain View CA, working to ensure systems and data stay safe and users' privacy remains secure. Before retiring from Alcatel-Lucent's Bell Laboratories in Murray Hill NJ, Eric was a Director and Fellow, where he founded an internal venture, CloudControl, that offered enterprise security officers a unique opportunity to quickly install up to a million address filters in carrier networks to block or rate-limit unwanted traffic hitting their enterprise from the Internet, based on automated analysis of web server and other logs. He applied encrypted key exchange to build an incrementally and quietly deployable single-signon solution, called Factotum, that stores credentials in the network and improves the security even of legacy authentication protocols, all without requiring new central or federated trust relationships. This was part of a redesign of security in the Plan 9 operating system, which was well received at the USENIX Security conference. In an earlier security project, he supervised the team that built the prototype Lucent Managed Firewall, designed to be used like watertight compartment doors throughout an enterprise or provider with delegated control but central supervision. He also collaborated on a VPN appliance that separates security administration from PC administration. He built a smartcard based system for Lucent licensing applications. He co-founded and continues to help run the Netlib repository of mathematical software, widely used by the scientific computing community. The systems issues involved in scaling that up were intriguing and led him to his current focus on security from his earlier work on numerical analysis. Algorithms for approximation and visualization, especially ones driven by problems from semiconductor design and fabrication, were the main theme of his first years at Bell Labs. Powerful tools like splines enabled rapid addition of new transistor designs into circuit simulators that had previously used ad hoc, labor intensive semi-analytic models. This was a challenge because of the multiple variables, the need to preserve monotonicity, and the continuity and performance requirements. In combination with numerical optimization, some of these spline techniques allow unique nondestructive measurement of heterostructure lasers. Other multivariate approximation innovations include: isosurface-aligned grids, critical to more accurate silicon energy band models for Boltzman transport; multivariate generalization of the lowess moving least squares algorithm, widely used in the statistical community for smoothing scattered data; first proof of non-obtuse, no-small-angle triangulation of polygons, a result that launched a flurry of additional work on the outside leading to some of today's best grid generators. He majored in mathematics as an undergraduate, then earned a PhD in Computer Science at Stanford University under Gene Golub with a thesis on tensor splines. He has served on the editorial boards of ACM Trans. Math. Software, IEEE Computational Science & Engineering, Netlib/NHSE, Numerical Algorithms, SIAM Journal on Scientific Computing, SIAM News, SIAM Software Environments and Tools, SIAM Electronic Publishing and the SIAM Council and Board of Trustees. --------------------------------------------------------------------- Stephen Schmidt, Chief Information Security Officer, Amazon AWS ----- Stephen Schmidt is Chief Information Security Officer for Amazon Web Services (AWS). In addition to being responsible for AWS's standards-based security compliance, he currently leads security-centric product design, management, and engineering development. Prior to joining AWS, he had an extensive career as a senior executive at the US Federal Bureau of Investigation, including a term as chief technology officer and section chief of the FBI.s Cyber Division, overseeing areas of malicious code analysis, computer exploitation tool reverse-engineering and technical analysis of computer intrusions. --------------------------------------------------------------------- SUBMISSIONS Technical full and ***short*** papers and panel proposals are solicited. Technical papers must not substantially overlap with material published at or simultaneously submitted to a venue with proceedings. Double-submission will result in immediate rejection. Reviewing of technical papers is double-blind, and they should be properly anonymized to conceal the authors' identity. ***All*** technical papers should be at most 15 pages (11-point font, single column, 1-inch margins, US letter or A4) excluding the bibliography and well-marked appendices, and at most 20 pages total. Papers accepted as short will be limited to 10 pages total (8 + 2 bibliography) in the proceedings. Papers should be intelligible without appendices. Panel proposals should be one page and must identify the panel chair, explain the topic and format, and list potential panelists. A panel description will appear in the proceedings, and may include written position statements from panelists. Overall, we are looking not only for solid results but also for crazy out of the box ideas. Areas of interest include (but are not limited to): + Network perimeter controls: firewalls, packet filters, gateways + Network protocol security: routing, naming, network management + Cloud computing security + Security issues in Future Internet architecture and design + Security of web-based applications and services + Anti-malware techniques: detection, analysis, and prevention + Secure future home networks, Internet of Things, body-area networks + Intrusion prevention, detection, and response + Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques + Privacy and anonymity technologies + Security for wireless, mobile networks + Security of personal communication systems + Vehicular Ad-hoc Network (VANETs) Security + Security of peer-to-peer and overlay network systems + Electronic commerce security: e.g., payments, notarization, timestamping. + Network security policies: implementation deployment, management + Intellectual property protection: protocols, implementations, DRM + Public key infrastructures, key management, certification, and revocation + Security for Emerging Technologies + Special problems and case studies: cost, usability, security vs. efficiency + Collaborative applications: teleconferencing and video-conferencing + Smart Grid Security + Secure Electronic Voting + Security of large-scale critical infrastructures + Trustworthy Computing for network protocols and distributed systems + Network and distributed systems forensics DATES Abstracts: August 9, 2011 (11:59 pm ET) Papers: August 16, 2011 (11:59 pm ET) Notification: October 23, 2011 Camera-ready: December 2, 2011 Conference: February 5-8, 2012 PROGRAM COMMITTEE Ross Anderson, University of Cambridge Davide Balzarotti, EURECOM Sophia Antipolis Lujo Bauer, Carnegie Mellon Kosta Beznosov, University of British Columbia Matt Bishop, UC Davis Nikita Borisov, UIUC Elie Bursztein, Stanford University Christian Cachin, IBM Research Zurich Bogdan Carbunar, Motorola Labs Jeff Chase, Duke University Yan Chen, Northwestern University Landon Cox, Duke University Marc Dacier, Symantec Research Labs George Danezis, Microsoft Research Sven Dietrich, Stevens Institute of Technology Dave Evans, University of Virginia Nick Feamster, Georgia Tech Michael Freedman, Princeton University Carrie Gates, CA Technologies Russ Housley, Internet Engineering Task Force Xuxian Jiang, North Carolina State University Rob Johnson, Stony Brook University Ari Juels, RSA Labs Stefan Katzenbeisser, TU Darmstadt Angelos Keromytis, Columbia University Yongdae Kim, University of Minnesota Wenke Lee, Georgia Tech Brian Levine, UMASS Amherst Morley Mao, University of Michigan Patrick McDaniel, Penn State University John Mitchell, Stanford University David Molnar, Microsoft Research Peng Ning, North Carolina State University Cristina Nita-Rotaru, Purdue University Bryan Parno, Microsoft Research Vern Paxson, UC Berkeley / ICSI Giuseppe Persiano, Universita di Salerno Michael Reiter, UNC at Chapel Hill Volker Roth, Freie Universitaet Berlin Radu Sion, Stony Brook University (chair) Ahmad-Reza Sadeghi, Fraunhofer Institute Nitesh Saxena, NYU Poly R. Sekar, Stony Brook University Elaine Shi, UC Berkeley and Parc Vitaly Shmatikov, University of Texas at Austin Alex Snoeren, UC San Diego Robin Sommer, ICSI Paul Syverson, Naval Research Laboratory Doug Szaida, University of Richmond Wade Trappe, Rutgers University Arun Venkataramani, UMASS Amherst Dan Wallach, Rice University Cliff Wang, US Army Research Office Nick Weaver, ICSI Peter Williams, Stony Brook University Dongyan Xu, Purdue University Moti Yung, Google Inc. --- We appologize if you receive multiple copies of this (we have made every effort to avoid this). If you would like to not receive further emails from us please do not hesitate to email sion (at) cs.stonybrook.edu and we will promptly remove your address. ___________________________________________________________ Tegatai Managed Colocation: Four Provider Blended Tier-1 Bandwidth, Fortinet Universal Threat Management, Natural Disaster Avoidance, Always-On Power Delivery Network, Cisco Switches, SAS 70 Type II Datacenter. Find peace of mind, Defend your Critical Infrastructure. http://www.tegataiphoenix.com/Received on Wed May 11 2011 - 01:12:37 PDT
This archive was generated by hypermail 2.2.0 : Wed May 11 2011 - 01:22:24 PDT