Internet Society Frontpage

Events Membership
About the Internet Standards
Publications  Public Policy
About ISOC Education

Events 

SPONSORS

Google

NDSS Symposium 2006

NDSS '06

The 13th Annual Network and Distributed System Security Symposium
Catamaran Resort Hotel
San Diego, California
2-3 February 2006-Symposium
1 February 2006-Pre-Conference Workshop

Pre-Conference Workshop
February 1, 2006
Catamaran Resort Hotel - San Diego, California, USA
Sponsored by the Internet Society

Workshop Schedule


eEye Digital Security has graciously permitted some of their more talented researchers to present multiple topics and demonstrations relating to Malware. The eEye R&D team is consistently featured and quoted in the national press for their ongoing discoveries and identification of security vulnerabilities in widely deployed software and systems.

7:30AM - 8:30AM WORKSHOP CONTINENTAL BREAKFAST – Kon Tiki Foyer
WORKSHOP LOCATION: Kon Tiki Ballroom
8:30AM - 10:00AM Skeletons in Microsoft's Closets; Silently Fixed Vulnerabilities
Presenters: Steve Manzuik and Andre Protas
10:00AM - 10:30AM MORNING BREAK – Kon Tiki Foyer
10:30AM - 12:00PM Building Honeypots for Malware Collection
Presenter: Hugo Samayao
12:00PM - 1:15PM WORKSHOP LUNCH – Rousseau Center
1:30PM - 3:00PM Hacking Embedded Systems
Presenter: Barnaby Jack
3:00PM - 3:30PM AFTERNOON BREAK – Kon Tiki Foyer
3:30PM - 5:00PM PiXiE: A Self-Propagating Network Boot Virus for Windows
Presenter: Derek Soeder


Year 2006
Network and Distributed System Security (NDSS’06) Symposium

Program


WEDNESDAY, FEBRUARY 1, 2006

7:30AM – 7:30PM REGISTRATION OPEN – Boardroom Foyer
6:00PM – 8:30PM WELCOME RECEPTION with Entertainment – Rousseau Center

THURSDAY, FEBRUARY 2, 2006

7:30AM – 6:00PM REGISTRATION OPEN – Boardroom Foyer
7:30AM – 8:30AM CONTINENTAL BREAKFAST – Boardroom Foyer
8:45AM – 9:00AM INTRODUCTORY REMARKS – Kon Tiki Ballroom
General Chair: Eric Harder, National Security Agency
Program Chairs: Dan Simon, Microsoft;
William Arbaugh, University of Maryland
9:00AM – 10:30AM SESSION 1 – THE WEB AND MALICE
Chair: Dawn Song – Carnegie Mellon University
A Crawler-based Study of Spyware in the Web
Alex Moshchuk , Tanya Bragin, Steven D. Gribble,
Henry Levy - University of Washington
Automated Web Patrol with Strider HoneyMonkeys: Finding
Web Sites That Exploit Browser Vulnerabilities

Yi-Min Wang, Doug Beck , Chad Verbowski, Shuo Chen,
Sam King - Microsoft Researc; ) Xuxian Jiang – Purdue;
Roussi Roussev - Florida Tech
Using Generalization and Characterization Techniques in the
Anomaly-based Detection of Web Attacks

William Robertson, Giovanni Vigna, Christopher Kruegel,
Richard A. Kemmerer – University of California, Santa Barbara
10:30AM – 11:00AM BREAK – Kon Tiki Foyer
 


Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities

Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Sam King

Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks
William Robertson, Giovanni Vigna, Christopher Kruegel, Richard A. Kemmerer

10:30 - 11:00 Break
11:00 - 12:00 Session 2: Panel Discussion: Virtualization Technologies
12:00 - 13:30 Lunch
13:30 - 15:00 Session 3: "Healing and Learning"
 
Isolating Intrusions by Automatic Experiments

Stephan Neuhaus, Andreas Zeller

Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software
James Newsome, David Brumley, Dawn Song, Jad Chamcham, Xeno Kovah

Software Self-Healing Using Collaborative Application
Stelios Sidiroglou, Michael Locasto, Angelos Keromytis
15:00 - 15:30 Break
15:30 - 17:00 Session 4: Potpourri I
 
Inoculating SSH Against Address Harvesting

Stuart Schechter, Jaeyeon Jung, Will Stockwell, Cynthia McLain

Enterprise Security: A Community of Interest Based Approach
Patrick McDaniel, Shubho Sen, Oliver Spatscheck, Jacobus Van der Merwe, Bill Aiello, Charles Kalmanek

Protocol-Independent Adaptive Replay of Application Dialog
Weidong Cui, Vern Paxson, Nicholas Weaver, Randy Katz

Day 2


9:00 - 10:30 Session 5: Crypto
 


Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles

Keith Frikken, Jiangtao Li, Mikhail Atallah

Deploying a New Hash Algorithm
Steven Bellovin, Eric Rescorla

Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage
Kevin Fu, Seny Kamara, Yoshi Kohno

10:30 - 11:00 Break
11:00 - 12:00 Session 6: Panel Discussion: Next Generation Secure Internet
12:00 - 13:30 Lunch
13:30 - 15:00 Session 7: Potpourri II
 
Churn as Shelter

Tyson Condie, Varun Kacholia, Sriram Sank, Joseph M. Hellerstein, Petros Maniatis

Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach
Ryan Gerdes, Thomas Daniels, Mani Mina, Steve Russell

Modeling Botnet Propagation Using Time Zones
David Dagon, Cliff Zou, Wenke Lee
15:00 - 15:30 Break
15:30 - 16:30 Session: Privacy and Integrity
 
Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorithm

Doug Szajda, Michael Pohl, Jason Owen, Barry Lawson

Toward Automated Information-Flow Integrity Verification for Security-Critical Applications
Umesh Shankar, Trent Jaeger, Reiner Sailer