Program for NDSS 2005


NDSS 2005 - DAY 1 - February 3 


8:45 - 9:00 - Introductory Remarks


9:00 -10:30 SESSION 1: Cryptography in Network Security

Space-Efficient Block Storage Integrity 
  Alina Oprea (Carnegie Mellon University),
  Mike Reiter (Carnegie Mellon University), 
  Ke Yang (Google)

Improved Proxy Re-Encryption Schemes with Applications to Secure
Distributed Storage 
  Giuseppe Ateniese (Johns Hopkins University), 
  Kevin Fu (MIT), 
  Matthew Green (Johns Hopkins University),
  Susan Hohenberger (MIT)

Rekeying and Storage Cost for Multiple User Revocation
  Sandeep S. Kulkarni (Michigan State University)
  Bezawada Bruhadeshwar (Michigan State University)

 

10:30 -11:00 Break


11:00 -12:00 SESSION 2: Invited Talk

TBD


12:00-13:30 Lunch


13:30-15:00 SESSION 3: Denial of Service Attacks
 
On a New Class of Pulsing Denial-of-Service Attacks and the Defense
  Xiapu Luo (Hong Kong Polytechnic University),
  Rocky K. C. Chang (Hong Kong Polytechnic University)


MOVE:  An End-to-End Solution to Network Denial of Service 
  Angelos Stavrou (Columbia University), 
  Angelos D. Keromytis (Columbia University), 
  Jason Nieh (Columbia University), 
  Vishal Misra (Columbia University), 
  Dan Rubenstein (Columbia University)
  
Security Analysis and Improvements for IEEE 802.11i 
  Changhua He (Stanford University),
  John C. Mitchell (Stanford University) 


15:00-15:30 Break


15:30-16:30 SESSION 4: Peer-to-Peer Approaches

Privacy-Preserving Friends Troubleshooting Network 
  Qiang Huang (Princeton University), 
  Helen J. Wang (Microsoft Research),
  Nikita Borisov (University of California, Berkeley)

Pretty Secure BGP (psBGP) 
  Tao Wan (Carleton University), 
  Evangelos Kranakis (Carleton University), 
  P.C. van Oorschot (Carleton University)


NDSS 2004 - DAY 2 - February 4 


9:00-10:30 SESSION 5: Internet Defense

New Streaming Algorithms for Fast Detection of Superspreaders 
  Shobha Venkataraman (Carnegie Mellon University), 
  Dawn Song (Carnegie Mellon University), 
  Phillip B. Gibbons (Intel Research), 
  Avrim Blum (Carnegie Mellon University)

The Internet Motion Sensor:  A Distributed Blackhole Monitoring System 
  Michael Bailey (University of Michigan), 
  Evan Cooke (University of Michigan), 
  Farnam Jahanian (University of Michigan), 
  Jose Nazario (Arbor Networks),
  David Watson (University of Michigan)

DNS-based Detection of Scanning Worms in an Enterprise Network 
  David Whyte (Carleton University), 
  Evangelos Kranakis (Carleton University), 
  P.C. van Oorschot (Carleton University)


10:30-11:00 Break


11:00-12:00 SESSION 6: Invited Talk

(TBD)


12:00-13:30 Lunch


13:30-15:00 SESSION 7: Intrusion Detection

DIRA: Automatic Detection, Identification and Repair of 
Control-Hijacking Attacks
  Alexey Smirnov  (Stony Brook University)
  Tzi-cker Chiueh (Stony Brook University)

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature
Generation of Exploits on Commodity Software 
  James Newsome (Carnegie Mellon University)
  Dawn Song (Carnegie Mellon University)


Enriching Intrusion Alerts Through Multi-Host Causality
  Samuel T. King, (University of Michigan)
  Z. Morley Mao, (University of Michigan)
  Dominic G. Lucchetti, (University of Michigan)
  Peter M. Chen (University of Michigan)


15:00-15:30 Break


15:30-16:30 SESSION 8: Platform Security

A Black-Box Tracing Technique to Identify Causes of Least-Privilege
Incompatibilities 
  Shuo Chen (University of Illinois, Urbana-Champaign),
  John Dunagan (Microsoft Research), 
  Chad Verbowski (Microsoft Research) 
  Yi-Min Wang (Microsoft Research)

One-Way Isolation:  An Effective Approach for Realizing Safe Execution
Environments 
  Weiqing Sun (Stony Brook University), 
  Zhenkai Liang (Stony Brook University), 
  V.N. Venkatakrishnan (Stony Brook University), 
  R. Sekar (Stony Brook University) 

16:30-16:45 Conference Adjournment