[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[infowar.de] 2003 IEEE Symposium on Security and Privacy, Mai in Oakland/CA
Infowar.de, http://userpage.fu-berlin.de/~bendrath/liste.html
-------------------------------------------------------------
Etwas für die Techies unter uns. "Privacy" taucht leider im Programm gar
nicht explizit auf, es wird wohl angenommen, dass das mit guter Security
automatisch gesichert ist. Naja.
RB
PRELIMINARY PROGRAM
2003 IEEE Symposium on Security and Privacy
May 11-14, 2003
The Claremont Resort
Oakland, California, USA
sponsored by
IEEE Computer Society Technical Committee on Security and Privacy
in cooperation with
The International Association for Cryptologic Research (IACR)
For more information, see www.ieee-security.org/TC/SP-Index.html
Sunday, May 11, 2003
4:00-7:00 Registration and Reception
Monday, May 12, 2003
8:45-9:00 Opening Remarks
9:00-10:30 Session: Anonymity
Mixminion: Design of a Type III Anonymous Remailer Protocol
George Danezis (Cambridge Univ.), Roger Dingledine, Nick
Mathewson (Free Haven Project)
Probabilistic Treatment of MIXes to Hamper Traffic Analysis
Dakshi Agrawal (IBM Watson), Dogan Kesdogan, Stefan Penz (Aachen
Univ. Tech.)
Defending Anonymous Communication Against Passive Logging Attacks
Matt Wright, Micah Adler, Brian Neil Levine, Clay Shields
(U. Mass.)
10:30-11:00 Break
11:00-12:00 Session: IDS
Active Mapping: Resisting NIDS Evasion Without Altering Traffic
Umesh Shankar (UC Berkeley), Vern Paxson (ICSI)
Anomaly Detection Using Call Stack Information
Henry Hanping Feng (U. Mass.), Oleg M. Kolesnikov, Prahlad Fogla,
Wenke Lee (Georgia Tech.), Weibo Gong (U. Mass.)
12:00-1:30 Lunch
1:30-2:30 Invited talk
2:30-3:00 Break
3:00-4:00 Session: OS
Defending Against Denial-of-Service Attacks with Puzzle Auctions
XiaoFeng Wang, Mike Reiter (CMU)
Pi: A Path Identification Mechanism to Defend against DDoS Attacks
Abraham Yaar, Adrian Perrig, Dawn Song (CMU)
4:00-6:00 5-minute talks Tuesday, May 13, 2003
9:00-10:30 Session: Formal Methods
A Unified Scheme for Resource Protection in Automated Trust Negotiation
Ting Yu, Marianne Winslett (U. Illinois, Urbana-Champaign)
Beyond Proof-of-compliance: Safety and Availability Analysis in Trust
Management
Ninghui Li (Stanford), William H. Winsborough (NAI Labs), John
C. Mitchell (Stanford)
Intransitive Non-Interference for Cryptographic Purposes
Michael Backes, Birgit Pfitzmann (IBM Zurich)
10:30-11:00 Break
11:00-12:00 Session: Hardware
Specifying and Verifying Hardware for Tamper-Resistant Software
David Lie, John Mitchell (Stanford), Chandramohan Thekkath
(Microsoft Research), Mark Horowitz (Stanford)
Using Memory Errors to Attack a Virtual Machine
Sudhakar Govindavajhala, Andrew W. Appel, (Princeton)
12:00-1:30 Lunch
1:30-2:30 Invited talk
2:30-3:00 Break
3:00-4:00 Session: Hardware & Crypto
Secret Handshakes from Pairing-Based Key Agreements
D. Balfanz, G. Durfee (PARC), N. Shankar (U. Maryland),
D.K. Smetters, J. Staddon, H.C. Wong (PARC)
Random Key Predistribution Schemes for Sensor Networks
Haowen Chan, Adrian Perrig, Dawn Song (CMU)
Wednesday, May 14, 2003
9:00-10:30 Session: Distributed Systems
Hardening Functions for Large Scale Distributed Computations
Douglas Szajda, Barry Lawson, Jason Owen (U. Richmond)
A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards
Noam Kogan, Yuval Shavitt, Avishai Wool (Tel Aviv Univ.)
Using Replication and Partitioning to Build Secure Distributed Systems
Lantian Zheng, Stephen Chong, Andrew C. Myers (Cornell), Steve
Zdancewic (U. Pennsylvania)
10:30-11:00 Break
11:00-12:00
Vulnerabilities in Synchronous IPC Designs
Jonathan S. Shapiro (Johns Hopkins)
Garbage Collector Memory Accounting in Language-Based Systems
David W. Price, Algis Rudys, Dan S. Wallach (Rice)
---------------------------------------------------------------
Liste verlassen:
Mail an infowar -
de-request -!
- infopeace -
de mit "unsubscribe" im Text.