PRELIMINARY PROGRAM
2004
IEEE Symposium on Security and Privacy
May 9-12, 2004
The Claremont Resort
Oakland, California, USA
sponsored by
IEEE Computer Society
Technical Committee on Security and Privacy
in cooperation with
The International Association
for Cryptologic Research (IACR)
| 
       4:00-7:00  | 
      
       Registration   and Reception  | 
    
| 
       8:45-9:00        | 
      
       Opening   Remarks  | 
    
| 
       9:00-10:30  | 
      
       Session: 
Attacks and Defenses 
Keyboard Acoustic Emanations
 
Dmitri Asonov, Rakesh Agrawal (IBM Research)
 
Effects of Mobility and Multihoming on Transport-Protocol Security
 
Tuomas Aura (Microsoft Research), Pekka Nikander (Ericsson Research), Gonzalo Camarillo (Ericsson Research)
  
Analysis of an Electronic Voting System
 
Tadayoshi Kohno (UC San Diego), Adam Stubblefield (Johns Hopkins Univ.),
Aviel D. Rubin (Johns Hopkins Univ.), Dan S. Wallach (Rice Univ.)   | 
    
| 
       10:30-11:00      | 
      
       Break  | 
    
| 
       11:00-12:00       | 
      
       Panel:  Electronic Voting 
Dan Wallach (Rice), Dana DeBeauvoir (County Clerk, Travis County, TX), Josh Benaloh (Microsoft Research)
  | 
    
| 
       12:00-1:30       | 
      
       Lunch  | 
    
| 
       1:30-2:30  | 
      
       Session: 
Theory of Access Control 
Access Control By Tracking Shallow Execution History
 
Philip W. L. Fong (U. Regina)
 
A Layered Design of Discretionary Access Controls with Decidable Safety Properties
 Jon A. Solworth, Robert Sloan (U. Illinois, Chicago)  | 
    
| 
       2:30-3:00       | 
      
       Break  | 
    
| 
       3:00-4:00       | 
      
       Session:  
Cryptography
 
Symmetric encryption in automatic analyses for confidentiality against active adversaries
 
Peeter Laud (Tartu University)
 
Automatic Proof of Strong Secrecy for Security Protocols
 
Bruno Blanchet (Ecole Normale Superieure)
  | 
    
| 
       4:00-6:00       | 
      
       5-minute work-in-progress talks  | 
    
| 
       9:00-10:30      | 
      
       Session: 
Denial of service
 
An empirical analysis of target-resident DoS filters
 
Michael Collins (CERT), Michael Reiter (CMU)
 
Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation
 
Jun Li, Minho Sung, Jun (Jim) Xu (Georgia Tech.), Li (Erran) Li (Bell Labs)
 
An Endhost Capability Mechanism to Mitigate DDoS Flooding Attacks
 
Abraham Yaar, Dawn Song, Adrian Perrig (CMU)
  | 
    
| 
       10:30-11:00      | 
      
       Break  | 
    
| 
       11:00-12:00      | 
      
       Session: 
Access Control and Privacy 
Safety in Automated Trust Negotiation
 
William H. Winsborough (George Mason Univ.), Ninghui Li (Purdue Univ.)
 
Securing OLAP Data Cubes Against Privacy Breaches
 
Lingyu Wang, Sushil Jajodia, Duminda Wijesekera (George Mason Univ.)
  | 
    
| 
       12:00-1:30       | 
      
       Lunch  | 
    
| 
       1:30-2:30       | 
      
       Panel: Grand Challenges in Computer Security Research 
Virgil Gligor (U. Maryland), Mike Reiter (Carnegie Mellon),
Dan Simon (Microsoft Research), Gene Tsudik (U.C. Irvine)
  | 
    
| 
       2:30-3:00      | 
      
       Break  | 
    
| 
       3:00-4:00       | 
      
       Session: 
Static Analysis
 
Run-time Principals in Information-flow Type Systems
 
Stephen Tse, Steve Zdancewic (U. Pennsylvania)
 
Formalizing Sensitivity in Static Analysis for Intrusion Detection  
 
Henry Hanping Feng (U. Mass., Amherst), Jonathon T. Giffin (U.
Wisconsin, Madison), Yong Huang (U. Mass., Amherst), Somesh Jha (U.
Wisconsin, Madison), Wenke Lee (Georgia Tech.), Barton P. Miller (U.
Wisconsin, Madison)   | 
    
| 
       9:00-10:30      | 
      
       Session: 
Network Security
 
Fast Portscan Detection Using Sequential Hypothesis Testing  
 
Jaeyeon Jung (MIT), Vern Paxson (ICIR), Arthur W. Berger, Hari Balakrishnan (MIT)
 
On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution
 
Maxwell N. Krohn (MIT), Michael J. Freedman, David Mazières (NYU)
 
Multicast Authentication in Fully Adversarial Networks
 
Anna Lysyanskaya, Roberto Tamassia, Nikos Triandopoulos (Brown Univ.)
  | 
    
| 
       10:30-11:00      | 
      
       Break  | 
    
| 
       11:00-12:00      | 
      
       Session: 
Security Against Physical Attacks
 
An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data Injection in Sensor Networks
 
Sencun Zhu, Sanjeev Setia, Sushil Jajodia (George Mason Univ.), Peng Ning (NC State Univ.)
 
SWAtt: Software-based Attestation for Embedded Devices
 Arvind Seshadri, Adrian Perrig (CMU), Leendert van Doorn (IBM and CMU), Pradeep Khosla (CMU)  |