===========================================================================
2004 IEEE Symposium on Security and Privacy
May 9-12, 2004, The Claremont Resort, Oakland, California, USA
sponsored by
IEEE Computer Society Technical Committee on Security and Privacy
in cooperation with
The International Association for Cryptologic Research (IACR)
For more information, see http://www.ieee-security.org/TC/SP-Index.html
For registration, see http://www.cics.unt.edu/ieeereg/register.php
Preliminary Program:
Monday MORNING
Session: Attacks and Defenses
Keyboard Acoustic Emanations
Dmitri Asonov, Rakesh Agrawal (IBM Research)
Effects of Mobility and Multihoming on Transport-Protocol Security
Tuomas Aura (Microsoft Research), Pekka Nikander (Ericsson Research),
Gonzalo Camarillo (Ericsson Research)
Analysis of an Electronic Voting System
Tadayoshi Kohno (UC San Diego), Adam Stubblefield (Johns Hopkins Univ.),
Aviel D. Rubin (Johns Hopkins Univ.), Dan S. Wallach (Rice Univ.)
Session: Theory of Access Control
Access Control By Tracking Shallow Execution History
Philip W. L. Fong (U. Regina)
A Layered Design of Discretionary Access Controls with Decidable
Safety Properties
Jon A. Solworth, Robert Sloan (U. Illinois, Chicago)
Monday AFTERNOON
Invited Talk
Session: Cryptography
Symmetric encryption in automatic analyses for confidentiality against
active adversaries
Peeter Laud (Tartu University)
Automatic Proof of Strong Secrecy for Security Protocols
Bruno Blanchet (Ecole Normale Superieure)
5-minute work-in-progress talks
Tuesday MORNING
Session: Denial of service
An empirical analysis of target-resident DoS filters
Michael Collins (CERT), Michael Reiter (CMU)
Large-Scale IP Traceback in High-Speed Internet: Practical Techniques
and Theoretical Foundation
Jun Li, Minho Sung, Jun (Jim) Xu (Georgia Tech.),
Li (Erran) Li (Bell Labs)
An Endhost Capability Mechanism to Mitigate DDoS Flooding Attacks
Abraham Yaar, Dawn Song, Adrian Perrig (CMU)
Session: Access Control and Privacy
Safety in Automated Trust Negotiation
William H. Winsborough (George Mason Univ.), Ninghui Li (Purdue Univ.)
Securing OLAP Data Cubes Against Privacy Breaches
Lingyu Wang, Sushil Jajodia, Duminda Wijesekera (George Mason Univ.)
Tuesday AFTERNOON
1:30-2:30
Panel
Session: Static Analysis
Run-time Principals in Information-flow Type Systems
Stephen Tse, Steve Zdancewic (U. Pennsylvania)
Formalizing Sensitivity in Static Analysis for Intrusion Detection
Henry Hanping Feng (U. Mass., Amherst), Jonathon T. Giffin (U.
Wisconsin, Madison), Yong Huang (U. Mass., Amherst), Somesh Jha (U.
Wisconsin, Madison), Wenke Lee (Georgia Tech.), Barton P. Miller (U.
Wisconsin, Madison)
Wednesday MORNING
Session: Network Security
Fast Portscan Detection Using Sequential Hypothesis Testing
Jaeyeon Jung (MIT), Vern Paxson (ICIR), Arthur W. Berger, Hari
Balakrishnan (MIT)
On-the-Fly Verification of Rateless Erasure Codes for Efficient
Content Distribution
Maxwell N. Krohn (MIT), Michael J. Freedman, David Mazičres (NYU)
Multicast Authentication in Fully Adversarial Networks
Anna Lysyanskaya, Roberto Tamassia, Nikos Triandopoulos (Brown Univ.)
Session: Security Against Physical Attacks
An Interleaved Hop-by-Hop Authentication Scheme for Filtering False
Data Injection in Sensor Networks
Sencun Zhu, Sanjeev Setia, Sushil Jajodia (George Mason Univ.), Peng
Ning (NC State Univ.)
SWAtt: Software-based Attestation for Embedded Devices
Arvind Seshadri, Adrian Perrig (CMU), Leendert van Doorn (IBM and CMU),
Pradeep Khosla (CMU)