[crypto] [fubob@MIT.EDU: USENIX Security Symposium]

R. Hirschfeld ray@unipay.nl
Thu, 11 Jul 2002 18:40:47 -0400


------- Start of forwarded message -------
Subject: USENIX Security Symposium
Date: Mon, 08 Jul 2002 00:10:50 -0400
From: Kevin Fu <fubob@MIT.EDU>

The USENIX Security Symposium is just around the corner.  Below is a
list of the accepted papers.

For detailed information and to register, visit
http://www.usenix.org/sec02/

They early registration discount ends July 10, 2002 (this Wednesday).
So hurry up and register!  :-)

- --------
Kevin E. Fu (fubob@mit.edu)


- ---------------------
Wednesday, August 7th
- ---------------------

Keynote Address: 

 Information Security in the 21st Century
       Whitfield Diffie, Distinguished Engineer at Sun Microsystems


Session 1:  OS Security

 Security in Plan 9
       Russ Cox, MIT LCS; 
       Eric Grosse, Bell Labs; 
       Rob Pike, Bell Labs; 
       Dave Presotto, Avaya Labs and Bell Labs; 
       Sean Quinlan, Bell Labs

 Linux Security Modules: General Security Support for the Linux Kernel
       Chris Wright and Crispin Cowan, WireX, 
       Stephen Smalley, NAI Labs, 
       James Morris, Intercode Pty., 
       Greg Kroah-Hartman, IBM

 Using CQUAL for Static Analysis of Authorization Hook Placement
       Xiaolan Zhang, IBM;
       Antony Edwards, IBM; 
       Trent Jaeger, IBM;


Session 2: Intrusion detection/protection

 Using Text Categorization Techniques for Intrusion Detection
       Yihua Liao, V. Rao Vemuri,  UC Davis.

 Detecting Manipulated Remote Call Streams
        Jonathon Giffin,  University of Wisconsin, Madison;  
        Somesh Jha,  University of Wisconsin Madison;  
        Bart Miller,  University of Wisconsin, Madison;

 Type-Assisted Dynamic Buffer Overflow Detection
        Kyung-Suk Lhee, Syracuse University; 
        Steve J. Chapin, Syracuse University

Session 3: Access control

 A General and Flexible Access-Control System for the Web
       Lujo Bauer, Princeton University; 
       Michael Schneider, Princeton University; 
       Ed Felten, Princeton University

 Access and Integrity Control in a Public-Access High-Assurance 
    Configuration Management System
        Jonathan S. Shapiro, John Vanderburgh
        Systems Research Laboratory
        Johns Hopkins University


- ---------------------
Thursday, August 8th
- ---------------------

Session 4: Hacks/Attacks

 Deanonymizing Users of the SafeWeb Anonymizing Service
       David Martin, Boston University 
       Andrew Schulman, Privacy Foundation

 VeriSign CZAG: Privacy Leak in X.509 Certificates
       Scott Renfro, Yahoo! Inc.

 How to 0wn the Internet in Your Spare Time
        Stuart Staniford, Silicon Defense; 
        Vern Paxson, ICIR / ICSI
        Nicholas Weaver, UC Berkeley

Session 5: Sandboxing

 Setuid Demystified
        Hao Chen, David Wagner, UC Berkeley; 
        Drew Dean, SRI International

 Secure Execution Via Program Shepherding
       Vladimir Kiriansky (MIT), 
       Derek Bruening (MIT), 
       Saman Amarasinghe (MIT)

 A Flexible Containment Mechanism for Executing Untrusted Code
       David S. Peterson (graduate student, UC Davis), 
       Matt Bishop (professor of computer science, UC Davis), 
       Raju Pandey (professor of computer science, UC Davis)


Session 6: Web security

 SSLACC: A Clustered SSL Accelerator
       Eric Rescorla, RTFM, Inc. 
       Adam Cain, Nokia Inc. 
       Brian Korver, Xythos Software, Inc.

 Infranet: Circumventing Web Censorship and Surveillance
        Nick Feamster, MIT Laboratory for Computer Science;  
        Magdalena Balazinska, MIT Laboratory for Computer Science; 
        Greg Harfst, MIT Laboratory for Computer Science; 
        Hari Balakrishnan, MIT Laboratory for Computer Science; 
        David Karger, MIT Laboratory for Computer Science
   
 Trusted Paths for Browsers: An Open-Source Solution to Web Spoofing
       Zishuang (Eileen) Ye, Dartmouth College; 
       Sean Smith, Dartmouth College.


Session 7: Generating keys and timestamps

 Using Speech to Generate Cryptographic Keys on Resource 
     Constrained Devices
        Fabian Monrose (Bell Labs, Lucent Technologies); 
        Michael Reiter (Carnegie Mellon University); 
        Daniel Bleichenbacher (Bell Labs, Lucent Technologies)
        Qi Li (Bell Labs, Lucent Technologies)

 Secure History Preservation through Timeline Entanglement
        Petros Maniatis, Computer Science Department, Stanford University; 
        Mary Baker, Computer Science Department, Stanford University


- ---------------------
Friday, August 9th
- ---------------------

Session 8: Deploying crypto

 Lessons Learned in Implementing and Deploying Crypto Software
       Peter Gutmann, University of Auckland

 Side-Channel Attacks on Symmetric Encryption Schemes: 
    The Case for Authenticated Encryption
       John R. Black, Univ. Nevada, Reno 
       Hector Urtubia, Univ. Nevada, Reno

 Making Mix Nets Robust For Electronic Voting By Randomized 
    Partial Checking
       Markus Jakobsson (RSA Labs), 
       Ari Juels (RSA Labs), 
       Ron Rivest (MIT)


Session 9: Work in Progress Reports

- ---------------------------------------------------------------------
------- End of forwarded message -------