February 20, 2001 This note lists the papers accepted for the 2001 IEEE Symposium on Security and Privacy, May 13-16, 2001. The final program is expected to also include short presentations and an invited lecture. Watch the TC homepage (www.ieee-security.org/TC/sp2001.html) for details. Evaluation of Intrusion Detectors: A Decision Theory Approach John Gaffney, Jacob Ulvila Performance of Public Key-Enabled Kerberos Authentication in Large Networks Alan Harbitter, Daniel A. Menasce Cryptographic Security for Mobile Code Joy Algesheimer, Christian Cachin, Jan Camenisch, Günter Karjoth Intrusion Detection via Static Analysis David Wagner, Drew Dean On Confidentiality and Algorithms Johan Agat A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission Birgit Pfitzmann, Michael Waidner Protection of Keys against Modification Attack Wai-wa FUNG, Mordecai Golin, Jim Gray Cryptographic Key Generation from Voice Authors: Fabian Monrose, Michael Reiter, Qi Li, Susanne Wetzel Information-Theoretic Measures for Anomaly Detection Wenke Lee, Dong Xiang Preserving Information Flow Properties under Refinement Heiko Mantel A Trend Analysis of Exploitations Hilary Browne, William Arbaugh, John McHugh, William Fithen Understanding Trust Management Systems Stephen Weeks Data Mining Methods for Detection of New Malicious Executables Matthew Schultz, Eleazar Eskin, Erez Zadok, Sal Stolfo SD3: a trust management system with certified evaluation Trevor Jim A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors R Sekar, Mugdha Bendre, Pradeep Bollineni Formal Treatment of Certificate Revocation Under Communal Access Control Xuhui Ao, Naftaly Minsky, Victoria Ungureanu Networked Cryptographic Devices Resilient to Capture Philip MacKenzie, Michael Reiter Graph-Based Authentication of Digital Streams Sara Miner, Jessica Staddon ELK, a New Protocol for Efficient Large-Group Key Distribution Adrian Perrig, Dawn Song, J. D. Tygar