Internet Society Frontpage

Events Membership
About the Internet Standards
Publications  Public Policy
About ISOC Education


NDSS Symposium 2005

NDSS '05

The 12th Annual Network and Distributed System Security Symposium
Catamaran Resort Hotel
San Diego, California
3-4 February 2005-Symposium
2 February 2005-Pre-Conference Workshop


NDSS 2005 - DAY 1 - February 3

8:45 - 9:00 - Introductory Remarks

9:00 -10:30 - SESSION 1: Cryptography in Network Security

Space-Efficient Block Storage Integrity - Alina Oprea, Carnegie Mellon University; Mike Reiter, Carnegie Mellon University;  Ke Yang, Google

Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage - Giuseppe Ateniese, Johns Hopkins University; Kevin Fu, MIT; Matthew Green, Johns Hopkins University;   Susan Hohenberger, MIT

Rekeying and Storage Cost for Multiple User Revocation - Sandeep S. Kulkarni, Michigan State University; Bezawada Bruhadeshwar, Michigan State University

10:30 -11:00 Break

11:00 -12:00 - SESSION 2: Invited Talk
Invited Speaker - Amit Yoran

Amit Yoran was appointed by President George W Bush as the Administration's official in coordinating the nation's activities in cyber security. Working with the Secretary of Homeland Security, Mr. Yoran coordinated among federal departments, law enforcement and intelligence efforts, as well as direct interaction with many leading IT and IT security companies - particularly focused on the cyber security of the 13 critical infrastructures of the United States.

Prior to joining the Bush Administration, Mr. Yoran was the Vice President of Managed Security Services at the Symantec Corporation. Mr. Yoran was the founder and CEO of Riptech, a market leading IT security company acquired by Symantec in 2002. He previously served an officer in the US Air Force as the Director of Vulnerability Programs for the Department of
Defense's Computer Emergency Response Team and in support of the Assistant Secretary of Defense's Office. Mr. Yoran received a Master of Science degree from the George Washington University and Bachelor of Science from the United States Military Academy at West Point.

12:00-13:30 Lunch

13:30-15:00 - SESSION 3: Denial of Service Attacks

On a New Class of Pulsing Denial-of-Service Attacks and the Defense - Xiapu Luo, Hong Kong Polytechnic University; Rocky K. C. Chang, Hong Kong Polytechnic University

MOVE:  An End-to-End Solution to Network Denial of Service - Angelos Stavrou, Columbia University; Angelos D. Keromytis, Columbia University;   Jason Nieh, Columbia University; Vishal Misra, Columbia University;   Dan Rubenstein, Columbia University

Security Analysis and Improvements for IEEE 802.11i - Changhua He, Stanford University; John C. Mitchell, Stanford University

15:00-15:30 Break

15:30-16:30 - SESSION 4: Peer-to-Peer Approaches

Privacy-Preserving Friends Troubleshooting Network - Qiang Huang, Princeton University; Helen J. Wang, Microsoft Research;   Nikita Borisov, University of California, Berkeley

Pretty Secure BGP, psBGP - Tao Wan, Carleton University; Evangelos Kranakis, Carleton University; P.C. van Oorschot, Carleton University

NDSS 2005 - DAY 2 - February 4

9:00-10:30 - SESSION 5: Internet Defense

New Streaming Algorithms for Fast Detection of Superspreaders
Shobha Venkataraman (Carnegie Mellon University),
Dawn Song (Carnegie Mellon University),
Phillip B. Gibbons (Intel Research),
Avrim Blum (Carnegie Mellon University)

The Internet Motion Sensor: A Distributed Blackhole Monitoring System
Michael Bailey (University of Michigan),
Evan Cooke (University of Michigan),
Farnam Jahanian (University of Michigan),
Jose Nazario (Arbor Networks),
David Watson (University of Michigan)

DNS-based Detection of Scanning Worms in an Enterprise Network
David Whyte (Carleton University),
Evangelos Kranakis (Carleton University),
P.C. van Oorschot (Carleton University)

10:30-11:00 Break

11:00-12:00 SESSION 6: Invited Talk
Invited Speaker: Stefan Savage, Computer Science Dept., UCSD

Internet Outbreaks: Epidemiology and Defenses
In the time it takes to read this sentence, the 2003 Slammer worm was able to probe over a hundred million Internet hosts. Worse, this attack was both trivial and unsophisticated. Unfortunately, the combination of widespread software homogeneity and unrestricted connectivity has created "perfect storm" conditions for such Internet outbreaks. This talk surveys the concrete threats posed by epidemic attacks, the engineering requirements for meaningful defenses, and the technologies being developed
to protect future systems.

12:00-13:30 Lunch

13:30-15:00 SESSION 7: Intrusion Detection

DIRA: Automatic Detection, Identification and Repair of Control-Hijacking Attacks
Alexey Smirnov (Stony Brook University)
Tzi-cker Chiueh (Stony Brook University)

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
James Newsome (Carnegie Mellon University)
Dawn Song (Carnegie Mellon University)

Enriching Intrusion Alerts Through Multi-Host Causality
Samuel T. King, (University of Michigan)
Z. Morley Mao, (University of Michigan)
Dominic G. Lucchetti, (University of Michigan)
Peter M. Chen (University of Michigan)

15:00-15:30 Break

15:30-16:30 SESSION 8: Platform Security

A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities
Shuo Chen (University of Illinois, Urbana-Champaign),
John Dunagan (Microsoft Research),
Chad Verbowski (Microsoft Research)
Yi-Min Wang (Microsoft Research)

One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments
Weiqing Sun (Stony Brook University),
Zhenkai Liang (Stony Brook University),
V.N. Venkatakrishnan (Stony Brook University),
R. Sekar (Stony Brook University)

16:30-16:45 Conference Adjournment