|
WORKSHOP SESSIONS
Session papers are available to workshop registrants immediately and to everyone after August 5, 2008.
All sessions will take place in the Constitution B
room of the Sheraton Boston Hotel unless otherwise noted.
Workshop Sessions: Monday, August 6 | Tuesday, August 7
Sunday, August 5, 2007
|
5:00 p.m.7:00 p.m. On-site Registration, Constitution Foyer |
|
5:30 p.m.7:00 p.m. |
|
USENIX Security '07 Welcome Get-Together
Constitution Foyer
|
Monday, August 6, 2007
|
7:30 a.m.5:00 p.m. On-site Registration, Constitution Foyer |
|
9:00 a.m.9:15 a.m. |
|
Welcome
Doug Maughan, DHS
|
9:15 a.m.10:45 a.m. |
|
Security Testbeds
Design, Deployment, and Use of the DETER Testbed
Terry Benzel and Robert Braden, University of Southern California Information Sciences Institute (ISI); Dongho Kim and Anthony Joseph, University of California, Berkeley; Clifford Neuman, University of Southern California Information Sciences Institute (ISI); Ron Ostrenga and Stephen Schwab, SPARTA; Keith Sklower, University of California, Berkeley
Read the paper in PDF | HTML
SEER: A Security Experimentation EnviRonment for DETER
Stephen Schwab, Brett Wilson, Calvin Ko, and Alefiya Hussain, SPARTA
Read the paper in PDF | HTML
A Hypervisor Based Security Testbed
Dan Duchamp and Greg DeAngelis, Stevens Institute of Technology
Read the paper in PDF | HTML
|
|
10:45 a.m.11:15 a.m. Break |
|
11:15 a.m.12:30 p.m. |
|
Experimentation Tools
Automating DDoS Experimentation
Jelena Mirkovic, University of Delaware; Brett Wilson and Alefiya Hussain, SPARTA; Sonia Fahmy, Purdue University; Peter Reiher, University of California, Los Angeles; Roshan Thomas and Stephen Schwab, SPARTA
Read the paper in PDF | HTML
Evaluation of Collaborative Worm Containments on DETER Testbed
L. Li, P. Liu, Y.C. Jhi, and G. Kesidis, Pennsylvania State University
Read the paper in PDF | HTML
Design and Implementation of an Isolated Sandbox with Mimetic Internet Used to Analyze Malwares
Shinsuke MIWA, Information Security Research Center; Toshiyuki MIYACHI, Hokuriku Research Center; Masashi ETO, Masashi YOSHIZUMI, and Yoichi SHINODA, Information Security Research Center
Read the paper in PDF | HTML
|
|
12:30 p.m.2:00 p.m. Lunch, Constitution A |
|
2:00 p.m.3:30 p.m. |
|
Experimentation
Distributed Change-Point Detection of DDoS Attacks: Experimental Results on DETER Testbed
Yu Chen, State University of New York; Kai Hwang, University of Southern California; Wei-Shinn Ku, Auburn University
Read the paper in PDF
Dependency-based Distributed Intrusion Detection
Ji Li, Dah-Yoh Lim, and Karen Sollins, Massachusetts Institute of Technology
Read the paper in PDF
Stress Testing Cluster Bro
Nicholas Weaver and Robin Sommer, ICSI
Read the paper in PDF | HTML
|
|
3:30 p.m.4:00 p.m. Break |
|
4:00 p.m.5:30 p.m. |
|
Panel Session: Malware Containment
A Plan for Malware Containment in the DETER Testbed
Ron Ostrenga and Stephen Schwab, SPARTA; Robert Braden, University of Southern California Information Sciences Institute (ISI)
Read the paper in PDF | HTML
Panel Chair: Steve Schwab
Panelist TBD
|
|
5:30 p.m.7:00 p.m. |
|
Reception, Demos, and Posters Open
Constitution A
The DETER 2007 workshop will include a poster session, featuring snacks and drinks. All those attending USENIX Security '07 and the
co-located workshops are welcome to attend.
|
Workshop Sessions: Sunday, August 5 |
Monday, August 6 | Tuesday, August 7
Tuesday, August 7, 2007
|
9:00 a.m.10:30 a.m. |
|
Federation
A DETER Federation Architecture
Ted Faber, John Wroclawski, and Kevin Lahey, University of Southern California Information Sciences Institute (ISI)
Read the paper in PDF | HTML
Very Large Scale Cooperative Experiments in Emulab-Derived Systems
Keith Sklower and Anthony D. Joseph, University of California, Berkeley
Read the paper in PDF | HTML
Emulating an Embedded Firewall
Clifford Neuman, University of Southern California Information Sciences Institute (ISI); Deepak Dayama, University of Southern California
Read the paper in PDF | HTML
|
|
10:30 a.m.11:00 a.m. Break |
|
11:00 a.m.12:30 p.m. |
|
Panel Session: Real Datasets and Experiment Fidelity
|
|
|
|