Internet Society Frontpage

Events Membership
About the Internet Standards
Publications  Public Policy
About ISOC Education


NDSS Symposium 2007

NDSS 2007 - The Network and Security Conference

The 14th Annual Network & Distributed System Security Symposium
Catamaran Resort Hotel - San Diego, CA - 28th February - 2nd March


27th February 2007
16:30 - 19:30 Registration open : Rousseau Foyer
18:00 - 20:30 Welcome Reception: Beach Front
(inclement weather: Rousseau Center)
28th February 2007 - Toucan & Macaw rooms
07:30 - 18:00 Registration open : Aviary Foyer
07:30 - 08:30 Continental Breakfast: Aviary Foyer
08:45 - 09:00 Introductory remarks: Toucan & Macaw Rooms
General Chair: Eric Harder, National Security Agency
Program Chairs: William Arbaugh, University of Maryland
Crispin Cowan, Novell
09:00 - 10:00

Keynote Address: Vernor Vinge, author of "Deepness in the Sky" and other works in futurology

10:00 - 10:30 Break: Aviary Foyer
10:30 - 12:00 Session 1: Threats

Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing
Ying Zhang, Zhuoqing Morley Mao, University of Michigan; Jia Wang, AT&T Labs Research

Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces

Scott Coull, Charles Wright, Fabian Monrose, Johns Hopkins University; Michael Collins, Michael Reiter, Carnegie Mellon University

Fig: Automatic Fingerprint Generation
Shobha Venkataraman, Juan Caballero, Pongsin Poosankam, Min Gyung Kang, Dawn Song, Carnegie Mellon University

12:00 - 13:30 Buffet lunch: Toucan & Macaw Foyer - Sponsored by Afilias
13:30 -14:30 Invited Talk: David Hutton, organizer of the renowned hacker con ToorCon "Breaking Wireless and Mac OS-X Encryption with FPGAs"
14:30 -15:30 Break: Aviary Foyer
15:30 - 17:00 Session 2: Web Security

Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis
Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Kruegel - Secure Systems Lab Technical University Vienna; Giovanni Vigna - University of California, Santa Barbara

A Quantitative Study of Forum Spamming Using Context-based Analysis
Yuan Niu, Hao Chen, Francis Hsu, University of California, Davis; Yi-Min Wang, Ming Ma, Microsoft Research

17:00 Adjourn
18:15 Cash Bar open: Aviary Foyer
18:30 - 23:00 Banquet Night: Aviary Ballroom
1st March 2007 - Kon Tiki Ballroom
07:30 - 17:00 Registration open: Boardroom Foyer
07:30 - 08:30 Continental Breakfast: Kon Tiki Foyer
09:00 - 10:00 Invited Talk: John Viega, McAfee Chief Security Architect "Malware in the Real World"
10:00 - 10:30 Break: Kon Tiki Foyer
10:30 - 12:00 Session 3: More Threats

Phinding Phish: An Evaluation of Anti-Phishing Toolbars
Lorrie Cranor, Serge Egelman, Jason Hong, Yue Zhang, Carnegie Mellon University

Army of Botnets
Ryan Vogt, John Aycock, Michael Jacobson, University of Calgary, Canada

Shedding Light on the Configuration of Dark Addresses
Sushant Sinha, Michael Bailey, Farnam Jahanian, University of Michigan

12:00 - 13:30 Lunch: Rousseau Center - Sponsored by Google
13:30 - 14:30 Panel: Red Teaming and Hacking Games: How Much Do They Really Help?
Moderator: Crispin Cowan, Novell Director of Software Engineering, founder of Immunix, 3 time player of the DefconCtF games. Panelists: Rodney Thayer, long-time participant in Defcon CtF games and member of 2005 winning team; John Viega, McAfee Chief Security Architect, organizer of the Defcon 2005 and 2006 Kenshoto CtF games; Giovanni Vigna, professor of UCSB, leader of 2005 Defcon CtF winning team; Dennis W. Mattison, member of organizing team for ToorCon RootWars CtF game; Robert Harvey of IOActive, who dominated Defcon CtF for 4 years, revolutionized game with a new set of rules and infrastructure in 2001
14:30 - 15:00 Break: Kon Tiki Foyer
15:00 - 16:30 Session 4: Authentication

Consumable Credentials in Linear-Logic-Based Access-Control Systems
Kevin D. Bowers, Lujo Bauer, Deepak Garg, Frank Pfenning, Michael K. Reiter, Carnegie Mellon University
Secret Handshakes with Dynamic and Fuzzy Matching
Giuseppe Ateniese, Jonathan Kirsch, Johns Hopkins University; Marina Blanton, Purdue University

Attribute-Based Publishing with Hidden Credentials and Hidden Policies
Apu Kapadia, Patrick Tsang, Sean Smith, Dartmouth College

17:00 Adjourn
18:15 Cash Bar open: Aviary Foyer
18:30 - 23:00 Buffet Dinner & Casino Night : Aviary Ballroom
2nd March 2007 - Kon Tiki Ballroom
08:00 - 17:00 Registration open: Boardroom Foyer
07:30 - 08:30 Continental Breakfast: Kon Tiki Foyer
09:00 - 10:00 Invited Talk: Tom Liston, speaking on work with Ed Skoudis, "Virtual Machine Security Issues"
10:00 - 10:30 Break: Kon Tiki Foyer
10:30 - 12:00 Session 5: Privacy

File System Design with Assured Delete
Radia Perlman, Sun Microsystems

Cryptographic Methods for Storing Ballots on a Voting Machine
John Bethencourt, Carnegie Mellon University; Dan Boneh, Stanford University; Brent Waters, SRI International

On the Practicality of Private Information Retrieval
Radu Sion, Stony Brook University; Bogdan Carbunar, Motorola Labs

12:00 - 13:30 Lunch: Rousseau Center - Sponsored by Microsoft Research
13:30 - 14:30 Invited Talk: Jim Hoagland, speaking on work with Oliver Friedrichs on "A Network Attack Surface Analysis of RTM Windows Vista"
14:30 - 15:00 Break: Kon Tiki Foyer
15:00 - 16:30 Session 6: Intrusion Detection and Prevention

RICH: Automatically Protecting Against Integer-Based Vulnerabilities
David Brumley, Dawn Song, Carnegie Mellon University; Tzi-cker Chiueh, Rob Johnson, Stony Brook University; Huijia Lin, Cornell University

Generic Application-Level Protocol Analyzer and its Language Nikita Borisov, University of Illinois at Urbana-Champaign; David Brumley, Carnegie Mellon University; Helen Wang, John Dunagan, Microsoft Research; Pallavi Joshi, University of California, Berkeley; Chuanxiong Guo, the Institute of Communications Engineering, Nanjing, China

OPTWALL: A Hierarchical Traffic-Aware Firewall
Subrata Acharya, Bryan Mills, Mehmud Abliz, Taieb Znati, University of Pittsburgh; Jia Wang, Zihui Ge, Albert Greenberg, AT&T Labs Research

16:30 - 16:45 Parting Remarks