Internet Society Frontpage

Events Membership
About the Internet Standards
Publications  Public Policy
About ISOC Education

Events 

NDSS Symposium 2000

NDSS 2000 3-4 February 2000 Dan Diego, California, USA

Network and Distributed System Security Symposium
Catamaran Resort Hotel
San Diego, California

2 February 2000 - Technical Tutorials
3-4 February 2000 - Symposium

Proceedings and Slides

Copyright and Reprint Permissions : The Internet Society owns the copyrights for this publication and all of the papers contained herein. You may freely reproduce all or part of any paper for noncommercial purposes if you credit the author(s), provide notice to the Internet Society, and cite the Internet Society as the copyright owner. Reproduction for commercial purposes is strictly prohibited without the prior written consent of the Internet Society, the first-named author (for reproduction of an entire paper only), and the author's employer if the paper was prepared within the scope of employment.

Address your correspondence to: Manager of Conferences, Internet Society, 1775 Wiehle Ave., Suite 102, Reston, Virginia 20190-5321, U.S.A., tel. +1 703 326 9880, fax +1 703 326 9881, orders@isoc.org.

The papers and slides linked from this site reflect the authors' opinions and, in the interest of timely dissemination, are published as presented and without change. Their inclusion here does not necessarily constitute endorsement by the editors or the Internet Society.

A CD ROM compilation of papers is also available for purchase from the ISOC Store.

Note : Slides have been posted for now in the format that they were received. All received slide sets will eventually be available as PDF files. We have not yet received slides from all of the presenters.


SESSION 1: SOFTWARE ASSURANCE
Chair: G. McGraw (Reliable Software Technologies, UNITED STATES)

A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities [Paper] [Slides]
D. Wagner, J. Foster, E. Brewer, and A. Aiken (UC Berkeley, UNITED STATES)

User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement [Paper] http://seclab.cs.sunysb.edu/sekar/talks/ndss00/ [Slides]
K. Jain and R. Sekar (Iowa State University, UNITED STATES)

SESSION 2: GROUP AND MULTICAST SECURITY
Chair: T. Hardjono (Bay Networks / Nortel, UNITED STATES)

Optimized Rekey for Group Communication Systems [Paper] [Slides]
O. Rodeh (Hebrew University of Jerusalem, ISRAEL), K. Birman (Cornell University, UNITED STATES) and D. Dolev (Hebrew University of Jerusalem, ISRAEL)

An IPSec-based Host Architecture for Secure Internet Multicast [Paper] [Slides]
R. Canetti, P. Cheng, F. Giraud, D. Pendarakis, J. Rao, P. Rohatgi, and D. Saha (IBM TJ Watson Research Center, UNITED STATES)

SESSION 3: PANEL -- THE ECONOMICS OF SECURITY [Summary]
Moderators: J. Ellis (Sun Microsystems, UNITED STATES), and G. McGraw (Reliable Software Technologies, UNITED STATES)

Panelists:

  • N. Economidis (InsureTrust.com, UNITED STATES)
  • N. Pasciullo (Jones, Gregg, Creehan & Gerace, LLP, UNITED STATES)
  • F. C. Smith (Attorney, UNITED STATES)
  • L. Wagner (ICSA.net, UNITED STATES) [Slides]

SESSION 4: PROTOCOLS I
Chair: M. Dacier (IBM Zurich Research Laboratory, SWITZERLAND)

A First Step Towards the Automatic Generation of Security Protocols [Paper] [Slides]
A. Perrig and D. Song (Carnegie Mellon University, UNITED STATES)

A Revocation, Validation and Authentication Protocol for SPKI Based Delegation Systems [Paper] [Slides]
Y. Kortesniemi, T. Hasu (Helsinki University of Technology, FINLAND) and J. Särs (Nixu Oy, FINLAND)

Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues [Paper] [Slides]
S. Kent, C. Lynn, J. Mikkelson, and K. Seo (BBN Technologies / GTE Internetworking, UNITED STATES)

BOF on Windows 2000 Security [Slides]

SESSION 5: PROTOCOLS II
Chair: P. Van Oorschot (Entrust Technologies, CANADA)

Analysis of a Fair Exchange Protocol [Paper] [Slides]
V. Shmatikov and J. Mitchell (Stanford University, UNITED STATES)

Secure Password-Based Cipher Suite for TLS [Paper] [Slides]
P. Buhler, T. Eirich, and M. Waidner (IBM Zurich Research Laboratory, SWITZERLAND), and M. Steiner (Universität des Saarlandes, GERMANY)

Chameleon Signatures [Paper] [Slides]
H. Krawczyk (Technion, ISRAEL and IBM TJ Watson Research Center, UNITED STATES) and T. Rabin (IBM TJ Watson Research Center, UNITED STATES)

SESSION 6: INTRUSION DETECTION
Chair: D. Maughan (DARPA/ITO, UNITED STATES)

A Lightweight Tool for Detecting Web Server Attacks [Paper] [Slides]
M. Almgren, H. Debar, and M. Dacier (IBM Zurich Research Laboratory, SWITZERLAND)

Building Adaptive and Agile Applications Using Intrusion Detection and Response [Paper] [Slides]
J. Loyall, P. Pal, R. Schantz, and F. Webber (BBN Technologies / GTE Internetworking, UNITED STATES)

SESSION 7: DISTRIBUTED SYSTEMS
Chair: Virgil Gligor - (UMD College Park, UNITED STATES)

Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies [Paper] [Slides]
D. Shands, R. Yee, J. Jacobs (NAI Labs, Network Associates, UNITED STATES), and E. J. Sebes (Kroll-O'Gara/Information Services Group, UNITED STATES)

Security of Encrypted rlogin Connections Created With Kerberos IV [Paper]
K. Hildrum (UC Berkeley, UNITED STATES)

Accountability and Control of Process Creation in Metasystems [Paper]
M. Humphrey, F. Knabe, A. Ferrari, and A. Grimshaw (University of Virginia, UNITED STATES)

SESSION 8: PANEL II -- RED TEAMING AND NETWORK SECURITY [Summary]
Moderator: Douglas Maughan (DARPA, UNITED STATES)

Panelists:

  • B. Wood (Sandia National Labs, UNITED STATES) [Slides]
  • S. Saydjari (DARPA, UNITED STATES)
  • M. Puldy (IBM)