Check out the new USENIX Web site.
2003 USENIX Annual Technical Conference, June 9-14, 2003, Marriott Rivercenter, San Antonio, Texas
USENIX '03 Home  | USENIX Home  | Events  | Publications  | Membership
Register Now! Technical Sessions: Thurs., June 12 | Fri., June 13 | Sat., June 14 | All in one file | FREENIX only

Friday, June 13, 2003
9:00 a.m.–10:30 a.m.

Needles and Haystacks

A Logic File System
Yoann Padioleau and Olivier Ridoux, IRISA / University of Rennes

Application-Specific Delta-Encoding via Resemblance Detection
Fred Douglis and Arun Iyengar, IBM T.J. Watson Research Center

Opportunistic Use of Content Addressable Storage for Distributed File Systems
Niraj Tolia, Carnegie Mellon University and Intel Research Pittsburgh; Michael Kozuch, Intel Research Pittsburgh; Mahadev Satyanarayanan, Carnegie Mellon University and Intel Research Pittsburgh; Brad Karp, Intel Research Pittsburgh; Thomas Bressoud, Denison University and Intel Research Pittsburgh; Adrian Perrig, Carnegie Mellon University


How to Build an Insecure System out of Perfectly Good Cryptography
Radia Perlman, Sun Microsystems Laboratories

Problems in network security systems tend not to be subtle mathematical flaws in the cryptography, but instead broader system issues. This talk discusses deployed systems or standards with such flaws. It includes a public-keyxbased system with no advantages over a secret-keyxbased system, one in which encryption was used where what was really needed was integrity protection, one in which adding security decreased the reliability and did nothing to enhance the security of the system, unmanageable or unscalable PKI models, and an email standard that allowed forging signatures.


BIOS and Virtual Devices
Session Chair: Guido van Rooij, Madison Gurkha

Awarded Best Student Paper!
Flexibility in ROM: A Stackable Open Source BIOS
Adam Agnew and Adam Sulmicki, University of Maryland at College Park; Ronald Minnich, Los Alamos National Labs; William Arbaugh, University of Maryland at College Park

Console over Ethernet
Mike Kistler, Eric van Hensbergen, and Freeman Rawson, IBM Austin Research Laboratory

Implementing Clonable Network Stacks in the FreeBSD Kernel
Marko Zec, University of Zagreb


Release Engineering in a Large Distributed Project
Scott Long, FreeBSD Project

Scott's experience with FreeBSD dates back to the fall of 1992, when he discovered 386BSD-0.1. Since obtaining his src commit privileges in 2000, he has contributed to and maintained RAIDframe, the UDF filesystem, and several hardware drivers. In November 2002 he joined the FreeBSD Release Engineering team and quickly assumed the lead for the 5.0 release. He is currently working with the FreeBSD community to define the path for the 5.x series. His day job is as a software engineer for Adaptec, Inc., writing Linux and FreeBSD drivers and doing Open Source evangelism.

10:30 a.m.–11:00 a.m.   Break
11:00 a.m.–12:30 p.m.

Change Is Constant

System Support for Online Reconfiguration
Craig A. N. Soules, Carnegie Mellon University; Jonathan Appavoo and Kevin Hui, University of Toronto; Robert W. Wisniewski and Dilma Da Silva, IBM T.J. Watson Research Center; Gregory R. Ganger, Carnegie Mellon University; Orran Krieger, IBM T.J. Watson Research Center; Michael Stumm, University of Toronto; Marc Auslander, Michal Ostrowski, Bryan Rosenburg, and Jimi Xenidis, IBM T.J. Watson Research Center

Checkpoints of GUI-based Applications
Victor C. Zandy and Barton P. Miller, University of Wisconsin

CUP: Controlled Update Propagation in Peer-to-Peer Networks
Mema Roussopoulos and Mary Baker, Stanford University


The NPACI Rocks Cluster Toolkit: Breaking the Myth of Homogeneous Clusters
Philip Papadopoulos, San Diego Supercomputer Center

The Rocks toolkit allows users to stand up small, medium, and large-scale x86 and IA64 clusters in a short period of time. It starts with the assumption that clusters are heterogeneous in both hardware and functionality. Rocks decomposes the configuration of nodes (termed appliances) into small, reusable building blocks that include both software package and configuration information. Using a graph construction, shared configuration information across appliance types can be easily expressed. Utilizing the extensive hardware probing of modern OS installers, heterogeneous nodes become no harder to support than assumed homogeneous nodes. Installation and reinstallation performance figures will be given.


File Systems
Session Chair: Chuck Lever, Network Appliance

Awarded Best Paper!
StarFish: Highly Available Block Storage
Eran Gabber, Jeff Fellin, Michael Flaster, Fengrui Gu, Bruce Hillyer, Wee Teck Ng, Banu Özden, and Elizabeth Shriver, Lucent Technologies, Bell Labs

Secure and Flexible Global File Sharing
Stefan Miltchev, University of Pennsylvania; Vassilis Prevelakis, Drexel University; Sotiris Ioannidis, University of Pennsylvania; John Ioannidis, AT&T Labs—Research; Angelos D. Keromytis, Columbia University; Jonathan M. Smith, University of Pennsylvania

The CryptoGraphic Disk Driver
Roland C. Dowdeswell, The NetBSD Project; John Ioannidis, AT&T Labs—Research


X, Fonts, 2D Graphics
Keith Packard, HP Cambridge Research Labs

Keith Packard has been a member of the XFree86 core team for the last few years, building a new rendering system for X applications. Before joining Hewlett-Packard, he worked at the MIT X Consortium. He has worked with the X window system since 1986.

12:30 p.m.–2:00 p.m.   Lunch on your own
2:00 p.m.–3:30 p.m.

Security Mechanisms

The Design of the OpenBSD Cryptographic Framework
Angelos D. Keromytis, Columbia University; Jason L. Wright and Theo de Raadt, OpenBSD Project

NCryptfs: A Secure and Convenient Cryptographic File System
Charles P. Wright, Michael C. Martino, and Erez Zadok, Stony Brook University

A Binary Rewriting Defense Against Stack-based Buffer Overflow Attacks
Manish Prasad and Tzi-cker Chiueh, Stony Brook University


Alternative Top-Level Domains (a.k.a. The Game of the Name)
Steve Hotz,

Naming is a fundamental concept for systems architects, a critical decision for marketers, and a requirement for operating networked computers. Quite simply, we care about names. Consequently, it is no surprise that control of the DNS, the primary Internet namespace, is a morass of highly charged technical, financial, legal, and political issues. This talk discusses issues surrounding alternative top-level domains, and the somewhat controversial approach has taken to expanding the operational DNS namespace.


X Window System
Session Chair: Bart Massey, Portland State University

Xstroke: Full-Screen Gesture Recognition for X
Carl D. Worth, University of Southern California

Matchbox: Window Management Not for the Desktop
Matthew Allum, OpenedHand Ltd.

X Window System Network Performance
Keith Packard and James Gettys, Cambridge Research Laboratory, HP Labs


Keith Bostic, Sleepycat Software

Keith Bostic was a member of the Berkeley Computer Systems Research Group, where he was the architect of the 2.10BSD release and a principal developer of the 4.4BSD and related releases. He co-designed and implemented the 4.4BSD log-structured filesystem and the Berkeley DB database library. He is currently vice-president of engineering at Sleepycat Software.

3:30 p.m.–4:00 p.m.   Break
4:00 p.m.–5:30 p.m.
Work-in-Progress Reports

Short, pithy, and fun, Work-in-Progress reports introduce interesting new or ongoing work. If you have work you would like to share or a cool idea that's not quite ready for publication, send a one- or two-paragraph summary to We are particularly interested in presenting students' work. A schedule of presentations will be posted at the conference, and the speakers will be notified in advance. Work-in-Progress reports are five-minute presentations; the time limit will be strictly enforced.

?Need help? Use our Contacts page.

Last changed: 23 June 2003 jel