Program for NDSS 2005
NDSS 2005 - DAY 1 - February 3
8:45 - 9:00 - Introductory Remarks
9:00 -10:30 SESSION 1: Cryptography in Network Security
Space-Efficient Block Storage Integrity
Alina Oprea (Carnegie Mellon University),
Mike Reiter (Carnegie Mellon University),
Ke Yang (Google)
Improved Proxy Re-Encryption Schemes with Applications to Secure
Distributed Storage
Giuseppe Ateniese (Johns Hopkins University),
Kevin Fu (MIT),
Matthew Green (Johns Hopkins University),
Susan Hohenberger (MIT)
Rekeying and Storage Cost for Multiple User Revocation
Sandeep S. Kulkarni (Michigan State University)
Bezawada Bruhadeshwar (Michigan State University)
10:30 -11:00 Break
11:00 -12:00 SESSION 2: Invited Talk
TBD
12:00-13:30 Lunch
13:30-15:00 SESSION 3: Denial of Service Attacks
On a New Class of Pulsing Denial-of-Service Attacks and the Defense
Xiapu Luo (Hong Kong Polytechnic University),
Rocky K. C. Chang (Hong Kong Polytechnic University)
MOVE: An End-to-End Solution to Network Denial of Service
Angelos Stavrou (Columbia University),
Angelos D. Keromytis (Columbia University),
Jason Nieh (Columbia University),
Vishal Misra (Columbia University),
Dan Rubenstein (Columbia University)
Security Analysis and Improvements for IEEE 802.11i
Changhua He (Stanford University),
John C. Mitchell (Stanford University)
15:00-15:30 Break
15:30-16:30 SESSION 4: Peer-to-Peer Approaches
Privacy-Preserving Friends Troubleshooting Network
Qiang Huang (Princeton University),
Helen J. Wang (Microsoft Research),
Nikita Borisov (University of California, Berkeley)
Pretty Secure BGP (psBGP)
Tao Wan (Carleton University),
Evangelos Kranakis (Carleton University),
P.C. van Oorschot (Carleton University)
NDSS 2004 - DAY 2 - February 4
9:00-10:30 SESSION 5: Internet Defense
New Streaming Algorithms for Fast Detection of Superspreaders
Shobha Venkataraman (Carnegie Mellon University),
Dawn Song (Carnegie Mellon University),
Phillip B. Gibbons (Intel Research),
Avrim Blum (Carnegie Mellon University)
The Internet Motion Sensor: A Distributed Blackhole Monitoring System
Michael Bailey (University of Michigan),
Evan Cooke (University of Michigan),
Farnam Jahanian (University of Michigan),
Jose Nazario (Arbor Networks),
David Watson (University of Michigan)
DNS-based Detection of Scanning Worms in an Enterprise Network
David Whyte (Carleton University),
Evangelos Kranakis (Carleton University),
P.C. van Oorschot (Carleton University)
10:30-11:00 Break
11:00-12:00 SESSION 6: Invited Talk
(TBD)
12:00-13:30 Lunch
13:30-15:00 SESSION 7: Intrusion Detection
DIRA: Automatic Detection, Identification and Repair of
Control-Hijacking Attacks
Alexey Smirnov (Stony Brook University)
Tzi-cker Chiueh (Stony Brook University)
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature
Generation of Exploits on Commodity Software
James Newsome (Carnegie Mellon University)
Dawn Song (Carnegie Mellon University)
Enriching Intrusion Alerts Through Multi-Host Causality
Samuel T. King, (University of Michigan)
Z. Morley Mao, (University of Michigan)
Dominic G. Lucchetti, (University of Michigan)
Peter M. Chen (University of Michigan)
15:00-15:30 Break
15:30-16:30 SESSION 8: Platform Security
A Black-Box Tracing Technique to Identify Causes of Least-Privilege
Incompatibilities
Shuo Chen (University of Illinois, Urbana-Champaign),
John Dunagan (Microsoft Research),
Chad Verbowski (Microsoft Research)
Yi-Min Wang (Microsoft Research)
One-Way Isolation: An Effective Approach for Realizing Safe Execution
Environments
Weiqing Sun (Stony Brook University),
Zhenkai Liang (Stony Brook University),
V.N. Venkatakrishnan (Stony Brook University),
R. Sekar (Stony Brook University)
16:30-16:45 Conference Adjournment