TECHNICAL SESSIONS: Wednesday, December
7 | Thursday, December 8 | Friday, December 9
Wednesday, December 7, 2005 |
Wednesday
8:45 a.m. 10:30 a.m.
|
Opening Remarks, Awards,
Keynote Town & Country
Keynote Address
Scaling Search Beyond the Public Web
Qi Lu, Vice President of Engineering, Yahoo! Inc.
Listen in MP3 format
What's next in "search"? Scaling, fault tolerance, and storage management become a lot more exciting when we go from the colossal scale of Yahoo! to the challenges of searching not just the public Web, but your desktop, email, bookmarks, and other repositories of information such as your online communities. This talk introduces Yahoo!'s personal and social search initiative, and focuses on technology infrastructure that can store, index, and search user and community content on a massive scale. Specific topics also include storage management, fault tolerance, metrics, and real-time monitoring.
Dr. Qi Lu is a VP of Engineering of Yahoo! Inc., responsible for the technology development of Yahoo!'s Search and Marketplace businesses unit, which includes the company's search, e-commerce, and local listings of businesses and products. Prior to joining Yahoo! in 1998, Dr. Lu was a Research Staff Member at IBM Almaden Research Center. Before that, Dr. Lu worked at Carnegie Mellon University as a Research Associate, and at Fudan University in China as a faculty member. He holds 20 U.S. patents, and received his B.S. and M.S. in computer science from Fudan University and his Ph.D. in computer science from Carnegie Mellon University.
More information on the speaker can be found here.
|
Wednesday, 10:30
a.m.11:00 a.m. Break |
Wednesday
11:00 a.m. 12:30 p.m.
|
REFEREED PAPERS California
Vulnerabilities
Session Chair: John "Rowan" Littell, Earlham College
GULP: A Unified Logging Architecture for Authentication Data
Matt Selsky and Daniel Medina, Columbia University
Awarded Best Student Paper!
Toward an Automated Vulnerability Comparison of Open Source IMAP Servers
Chaos Golubitsky, Carnegie Mellon University
Fast User-Mode Rootkit Scanner for the Enterprise
Yi-Min Wang and Doug Beck, Microsoft Research
|
Wednesday
11:00 a.m. 12:30 p.m.
|
INVITED TALKS I San Diego
Session Chair: Lee Damon, University of Washington
Computing on Amateur Satellites
Bdale Garbee, HP Open Source & Linux CTO
Listen in MP3 format
Less than five years after the launch of Sputnik in late 1957, the first
satellite built entirely by amateur radio operators was in orbit. Since
then, more than fifty amateur satellites of increasing sophistication
have been successfully delivered to Earth orbit.
The environment of space imposes interesting constraints, as does an
all-volunteer ground station network. This talk will discuss the
evolution of computing systems aboard amateur satellites from OSCAR 1 to
the future, including a satellite intended for Mars orbit.
|
Wednesday
11:00 a.m. 12:30 p.m.
|
INVITED TALKS II Golden West
Session Chair: David N. Blank-Edelman, Northeastern University CCIS
TALK POSTPONED
This talk has been rescheduled for Thursday, December 8, 1:00 p.m.2:00 p.m. It will take place in the San Diego room. You're welcome to pick up lunch and bring it to the talk.
Network Black Ops: Extracting Unexpected Functionality from
Existing Networks
Dan Kaminsky, DoxPara Research
Listen in MP3 format
View the presentation slides
There is the set of functionality we expect from our network. There's
the set of functionality your network is capable of. These two sets
are not identical. This talk will explore security risks you may not
even be aware your network is exposed to and will demonstrate new
techniques for managing those risks. Mechanisms will be discussed for:
- Establishing video-capable tunnels over DNS (and detecting such
tunnels)
- Evading intrusion detection systems by exploiting IP's lack of
statelessness
- Reliably auditing Internet-scale networks
- Visualizing complex network activity
|
Wednesday
11:00 a.m. 12:30 p.m.
|
GURU IS IN SESSIONS Royal Palms Salon 1/2
Session Chair: Elizabeth Zwicky, Acuitus
Backups
W. Curtis Preston, Glasshouse
W. Curtis Preston is the VP of Data Protection for Glasshouse, a storage
consulting firm focused on bridging the gap between the business and
storage products. Curtis has twelve years of experience in designing
storage systems for many environments, both large and small. As a
recognized expert in the field, Curtis has advised the major product
vendors regarding product features and implementation methods. Curtis
is the administrator of the NetBackup and NetWorker FAQs and answers
the "Ask The Experts" backup forum on SearchStorage.com. He is also
the author of O'Reilly's UNIX Backup & Recovery and Using SANs & NAS,
the co-author of the SAGE Short Topics booklet Backups and
Recovery, and a contributing editor to Storage Magazine.
|
Wednesday, 12:30
p.m.2:00 p.m. Lunch (on your own)
|
Wednesday
2:00 p.m.3:30 p.m.
|
REFEREED PAPERS California
Configuration Management Theory
Session Chair: Yi-Min Wang, Microsoft Research
Configuration Tools: Working Together
Paul Anderson and Edmund Smith, University of Edinburgh
A Case Study in Configuration Management Tool Deployment
Narayan Desai, Rick Bradshaw, Scott Matott, Sandra Bittner, Susan Coghlan,
Rémy Evard, Cory Lueninghoener, Ti Leggett, John-Paul Navarro, Gene Rackow,
Craig Stacey, and Tisha Stacey, Argonne National Laboratory
Awarded Best Student Paper!
Reducing Downtime Due to System Maintenance and Upgrades
Shaya Potter and Jason Nieh, Columbia University
|
Wednesday
2:00 p.m.3:30 p.m.
|
INVITED TALKS I San Diego
Session Chair: Adam Moskowitz, Menlo Computing
What Big Sites Can Learn from Little Sites
Tom Limoncelli, Cibernet Corp.
Listen in MP3 format
View the presentation slides
Tom used to focus on IT at big sites. These past 4 years he's been
at a lot of small sites. The problems weren't any easier and often
were more interesting. What can we learn from small sites? First,
the fundamentals become much more important at small sites. And what
"the fundamentals" are becomes a lot clearer. Secondly, we learn
that "we are all small sites." Join Tom on his tour of what he's
been doing for the past 4 years, what beasts he's battled, and his
thoughts on where we, as an industry, could be going.
|
Wednesday
2:00 p.m.3:30 p.m.
|
INVITED TALKS II Golden West
Session Chair: William LeFebvre, Independent Consultant
Building MIT's Stata Center: An IT Perspective
Garrett Wollman, Infrastructure Group, MIT Computer Science & Artificial Intelligence Laboratory
Listen in MP3 format
View the presentation slides
Much has been written about doing large IT relocations in
the context of growing commercial businesses, including a number of
LISA papers. Making such a major move in a university research lab
involves challenges typically not faced in the business world. This
talk describes the context, challenges, and lessons from MIT CSAIL's
move from its 40-year-old home in commercial office space to the $300
million Ray and Maria Stata Center. We hope to offer some advice for
other institutional IT groups facing the challenge of relocating
several hundred scientists.
|
Wednesday
2:00 p.m.3:30 p.m.
|
GURU IS IN SESSIONS
Royal Palms Salon 1/2
Session Chair: David Williamson, Tellme Networks
LDAP
Howard Chu, Chief Architect, Symas Corp.
Howard Chu started formally supporting students at the U. of Michigan in 1986 and advanced to System Research Programmer with University-wide responsibilities. He moved on to the Jet Propulsion Lab at CalTech and then joined a start-up doing technology development for early computer telephony integration. Howard joined Locus Computing in 1995 and remained there through the acquisition by Platinum until he joined Symas in 1999 as a Founder. He has deep experience with system networking and security technologies. He started working with OpenLDAP in 1998 and has been one of the leading developers on the OpenLDAP core team since 1999.
|
Wednesday, 3:30
p.m.4:00 p.m. Break
|
Wednesday
4:00 p.m.5:30 p.m.
|
REFEREED PAPERS California
Configuration Management Practice
Session Chair: Yi-Min Wang, Microsoft Research
About the Integration of Mac OS X Devices into a Centrally Managed UNIX Environment
Anton Schultschik, ETH Zürich
RegColl: Centralized Registry Framework for Infrastructure System Management
Brent ByungHoon Kang, Vikram Sharma, and Pratik Thanki, University of North Carolina at Charlotte
Herding Cats: Managing a Mobile UNIX Platform
Maarten Thibaut and Wout Mertens, Cisco Systems, Inc.
|
Wednesday
4:00 p.m.5:30 p.m.
|
INVITED TALKS I San Diego
Session Chair: Adam Moskowitz, Menlo Computing
Under 200: Applying IS Best Practices to Small Companies
Strata Rose Chalup, Virtual.Net Inc.
Listen in MP3 format
View the presentation slides
A small company that evolved, rather than planned, its IT infrastructure
presents an environment which can be greatly refined by application of
time-honored LISA best practices, but that also presents some distinct
challenges: overloaded and under-staffed IT departments, grossly heterogeneous
computing platforms, startup deadline pressure (zero downtime!), and the
biggie, "We're too small to waste time on stuff like that!"
Please join us for a discussion of the challenges, and rewards, of applying
best practices in the chaotic world of the small company.
|
Wednesday
4:00 p.m.5:30 p.m.
|
INVITED TALKS II Golden West
Session Chair: Tom Perrine, Sony Computer Entertainment America
What's a PKI, Why Would I Want One, and How Should it Be Designed?
Radia Perlman, Sun Microsystems Laboratories
Listen in MP3 format
This talk explains what a PKI-based system is, and
how it compares in functionality with a system like Kerberos.
It also covers some crypto, to demystify the notions of public key
and secret key cryptography and allow you to impress a date. Then it
describes various ways people think of deploying a PKI that have issues
in terms of building in monopolies, being insecure, and/or being
unmanageable, and proposes a method that will avoid all these problems.
It describes the issues involved in all the pieces, such as how
to get securely certified, how to do revocation, how to know the public
key of the certifying authority, and how a human might know its own
public key.
|
Wednesday
4:00 p.m.5:30 p.m.
|
HIT THE GROUND RUNNING TRACK Royal Palms Salon 5
Session Chair: David N. Blank-Edelman, Northeastern University CCIS
Find out everything you need to know to get started on AFS, backups, cfengine, storage networking, and VoIP. Click here for more information and to view slides of selected presentations.
|
|
Technical Sessions: Wednesday, December
7 | Thursday, December 8 | Friday, December 9
|
|
Thursday, December 8, 2005 |
Thursday
9:00 a.m.10:30 a.m.
|
REFEREED PAPERS California
Networking
Session Chair: Rudi van Drunen, Leiden Cytology and Pathology Labs
Open Network Administrator (ONA)A Web-based Network Management Tool
Bruce Campbell and Robyn Landers, University of Waterloo
An Open Source Solution for Testing NAT'd and Nested iptables Firewalls
Robert Marmorstein and Phil Kearns, The College of William and Mary
Towards Network Awareness
Evan Hughes and Anil Somayaji, Carleton University
|
Thursday
9:00 a.m.10:30 a.m.
|
INVITED TALKS I San Diego
Session Chair: Luke Kanies, Reductive Labs, LLC
Modern Trends in UNIX and Linux Infrastructure Management
Andrew Cowie, Operational Dynamics
Listen in MP3 format
One of the biggest trends in the industry today is a divergence in
the approaches to deploying and managing complex infrastructure:
horizontal vs. vertical scaling, server consolidation vs. increasing
complexity, and blade servers vs. virtualization. Everyone claims that
their solution is the best, but for which problem?
We'll also talk about the proliferation of Web interfaces,
architecture alternatives to the conventional e-commerce platform, and the debate
between congruent and convergent configuration management.
Finally, we'll look to the future and consider the hype surrounding grid
computing and what impact it will have on the theory and practice of
infrastructure architecture.
|
Thursday
9:00 a.m.10:30 a.m.
|
INVITED TALKS II Golden West
Session Chair: William LeFebvre, Independent Consultant
Incident Command for IT: What We Can Learn from the Fire Department
Brent Chapman, Great Circle Associates, Inc.
Listen in MP3 format
View the presentation slides
Have you ever wondered how fire departments organize themselves on
the fly to deal with a major incident? How they quickly and
effectively coordinate the efforts of multiple agencies? How they
evolve the organization as the incident changes in scope, scale,
or focus? They accomplish all this by using the Incident Command
System (ICS), a standardized organizational structure and
set of operating principles adopted by most emergency agencies
nationwide. In this talk, Brent will introduce the concepts and
principles of ICS, and discuss how these can be applied to IT events,
such as security incidents and service outages.
|
Thursday
9:00 a.m.10:30 a.m.
|
GURU IS IN SESSIONS I
Royal Palms Salon 1/2
Session Chair: Lee Damon, University of Washington
Spam
Doug Hughes, Global Crossing
Doug Hughes takes care of the ISP and relay mail servers for an international telecommunications provider and spends far too much time figuring out how to stop the servers from being overwhelmed with spam. He talked about some of the techniques used at last year's spam mini-symposium at LISA.
|
Thursday
9:00 a.m.10:30 a.m.
|
GURU IS IN SESSIONS II
Royal Palms Salon 6
Session Chair: David Williamson, Tellme Networks
AFS
Esther Filderman, The OpenAFS Project
Esther Filderman has been working with AFS since its toddlerhood and has been working to bring AFS content to LISA conferences since 1999. She is currently Senior Systems Mangler and AFS administrator for the Pittsburgh Supercomputing Center.
|
Thursday, 10:30
a.m.11:00 a.m. Break
|
Thursday
11:00 a.m.12:30 p.m.
|
REFEREED PAPERS California
Theory
Session Chair: Luke Kanies, Reductive Labs, LLC
Awarded Best Paper!
Toward a Cost Model for System Administration
Alva L. Couch, Ning Wu, and Hengky Susanto, Tufts University
Voluntary Cooperation in Pervasive Computing Services
Mark Burgess and Kyrre Begnum, Oslo University College
Network Configuration Management via Model Finding
Sanjai Narain, Telcordia Technologies, Inc.
|
Thursday
11:00 a.m.12:30 p.m.
|
INVITED TALKS I San Diego
Session Chair: Elizabeth Zwicky, Acuitus
Automatic PC Desktop Management with Virtualization Technology
Monica Lam, Stanford University/SkyBlue Technologies
Listen in MP3 format
This talk describes a management architecture that allows IT
departments to regain control of distributed PC desktops.
Software configurations, which include an operating system
and applications, are managed centrally by system administrators.
The latest versions of these configurations are automatically cached
and executed locally on the PCs. By using virtualization technology,
the OS-independent, networked management layer is isolated from
the vulnerabilities of PC software and the same software configuration
can be run on a variety of kinds of hardware. This approach trades off some
performance and customizability for better control and ease of management.
|
Thursday
11:00 a.m.12:30 p.m.
|
INVITED TALKS II Golden West
Session Chair: Adam S. Moskowitz, Menlo Computing
What's the Worst That Could Happen?
Peyton Engel, Berbee Information Networks Corporation
Listen in MP3 format
View the presentation slides
Understanding the potential impact of a security incident is
crucial, whether at design time, or when responding to an actual
event. Buzzwords like "inverted security" and "deperimeterization"
have haunted security jargon for years, but don't help us guess how
many systems an attack has compromised, or justify making a change
in user account management. Using real-world examples of password
trust relationships, we'll identify ways that diligent security
efforts are often undermined, explain how to spot some potentially
critical problems on our own networks, and better understand the
practical application of concepts that often seem too abstract to
be useful.
|
Thursday
11:00 a.m.12:30 p.m.
|
GURU IS IN SESSIONS I Royal Palms Salon 1/2
Session Chair: Philip Kizer, Texas A&M University
Samba
Gerald Carter, Samba Team/Hewlett-Packard
Gerald Carter has been a member of the Samba Development Team since 1998. He has published articles in various Web-based magazines and teaches courses at conferences and in organizations. Currently employed by Hewlett-Packard as a Samba developer, Gerald has published books with SAMS Publishing and with O'Reilly Publishing.
|
Thursday
11:00 a.m.12:30 p.m.
|
GURU IS IN SESSIONS II Royal Palms Salon 6
Session Chair: Tom Perrine, Sony Computer Entertainment America
VoIP
Robert Sparks, Vice President, Research and Development, Estacado
Robert Sparks is responsible for managing Estacado's research activities and development of products and product components for new markets.
Robert joined Estacado after holding the role of CTO at Xten Networks. Robert has over 20 years' experience in the computer and communications industries. He held management and research positions at Dynamicsoft, Lucent, MCI, and Texas A&M University. In the past five years, Robert has focused on designing and developing SIP-based IP communications systems.
Robert is very active in standards and industry development. He coordinates the industry's premier interoperability event, the SIPIT. Robert chairs the IETF's SIMPLE working group, which defines extensions to SIP for Presence and Instant Messaging. He was a contributing editor to RFC 3261, which defines the SIP protocol, as well as the author of RFCs 3515 and 3892, which extend SIP to allow a rich set of call transfer capabilities.
Robert is a member of the board of directors of the SIP Forum. He is also on the board of directors and is President of the SIPfoundry.
|
Thursday
11:00 a.m.12:30 p.m.
|
HIT THE GROUND RUNNING TRACK Royal Palms Salon 5
Session Chair: Strata Rose Chalup, VirtualNet Consulting
Find out everything you need to know to get started on configuration management, DNS, Dtrace, identity management, and spam fighting. Click here for more information and to view slides of selected presentations.
|
Thursday, 12:30 p.m.2:00 p.m. Lunch (on your own) Special talk scheduled during lunch; see below.
|
Thursday
1:00 p.m.2:00 p.m.
|
SPECIAL RESCHEDULED INVITED TALKS II
Session Chair: David N. Blank-Edelman, Northeastern University CCIS
TALK RESCHEDULED
This talk was originally scheduled for Wednesday, and has been rescheduled for Thursday, December 8, 1:00 p.m.2:00 p.m. It will take place in the San Diego room. You're welcome to pick up lunch and bring it to the talk.
Network Black Ops: Extracting Unexpected Functionality from
Existing Networks
Dan Kaminsky, DoxPara Research
Listen in MP3 format
View the presentation slides
There is the set of functionality we expect from our network. There's
the set of functionality your network is capable of. These two sets
are not identical. This talk will explore security risks you may not
even be aware your network is exposed to and will demonstrate new
techniques for managing those risks. Mechanisms will be discussed for:
- Establishing video-capable tunnels over DNS (and detecting such
tunnels)
- Evading intrusion detection systems by exploiting IP's lack of
statelessness
- Reliably auditing Internet-scale networks
- Visualizing complex network activity
|
Thursday
2:00 p.m.3:30 p.m.
|
REFEREED PAPERS California
Network Visualization
Session Chair: John "Rowan" Littell, Earlham College
Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite
William Yurcik, NCSA
Interactive Traffic Analysis and Visualization with Wisconsin Netpy
Cristian Estan and Garret Magin, University of Wisconsin, Madison
NetViewer: A Network Traffic Visualization and Analysis Tool
Seong Soo Kim and A.L. Narasimha Reddy, Texas A&M University
|
Thursday
2:00 p.m.3:30 p.m.
|
INVITED TALKS I San Diego
Session Chair: David N. Blank-Edelman, Northeastern University CCIS
Internet Counter-Intelligence: Offense and Defense
Lance Cottrell, Anonymizer, Inc.
Listen in MP3 format
As Internet technology advances, online threats such as IP-based
blocking, IP-based cloaking, and information leakage grow exponentially.
An exposed IP address can put companies at risk of countless privacy and
security breaches. Discover how your competitors are able to utilize
your IP address to uncover your confidential information or feed you
inaccurate information while you conduct competitive intelligence. Learn
how to mitigate these threats, ensure data integrity, and safeguard your
confidential information. Discover how to gather and make best use of
the information leaked by your competitors.
|
Thursday
2:00 p.m.3:30 p.m.
|
INVITED TALKS II Golden West
Session Chair: William LeFebvre, Independent Consultant
Preventing Child Neglect in DNSSECbis Using Lookaside Validation (DLV)
Paul Vixie, Internet Systems Consortium, Inc. Listen in MP3 format
The DNSSECbis data model has key introduction follow the delegation
chain, thus requiring a zone's parent to become secure before a zone
itself can be secured. Ultimately this leads to non-deployability, since
the root zone will probably not be secured anytime soon. We describe an
early deployment aid for DNSSECbis whereby key introduction can be done
via cooperating third parties.
|
Thursday
2:00 p.m.3:30 p.m.
|
GURU IS IN SESSIONS Royal Palms Salon 1/2
Session Chair: Lee Damon, University of Washington
2:00 p.m.2:45 p.m. Project Management
Strata Rose Chalup, Virtual.Net Inc.
Strata Rose Chalup began as a fledgling sysadmin in 1983 and has been leading and managing complex IT projects for many years, serving in roles ranging from Project Manager to Director of Network Operations. She has written a number of articles on management and working with teams and has applied her management skills on various volunteer boards, including BayLISA and SAGE. Strata has a keen interest in network information systems and new publishing technologies and built a successful consulting practice around being an avid early adopter of new tools, starting with ncsa_httpd and C-based CGI libraries in 1993 and moving on to wikis, RSS readers, and blogging. Another MIT dropout, Strata founded VirtualNet Consulting in 1993.
2:45 p.m.3:30 p.m. Time Management
Tom Limoncelli, Cibernet Corp.
Tom Limoncelli, author of O'Reilly's Time Management for System Administrators and co-author of The Practice of System and Network Administration from Addison-Wesley, is Director of IT Services at Cibernet Corp. A sysadmin and network wonk since 1987, he has worked at Dean for America, Lumeta, Bell Labs/Lucent, Mentor Graphics, and Drew University. He is a frequent presenter at LISA conferences.
|
Thursday, 3:30
p.m.4:00 p.m. Break
|
Thursday
4:00 p.m.5:30 p.m.
|
Plenary Session Town & Country
Session Chair: Adam Moskowitz, Menlo Computing
Picking Locks with Cryptology
Matt Blaze, University of Pennsylvania
Listen in MP3 format
Computer security and cryptology take much of their basic philosophy
and language from the world of mechanical locks, and yet we often
ignore the possibility that physical security systems might suffer
from the same kinds of attacks that plague computers and networks.
This talk examines mechanical locks from a computer scientist's
viewpoint. We describe attacks for amplifying rights in mechanical
pin tumbler locks that are at least as serious as those that can occur
in computing systems. We end with future directions for research in
this area and the suggestion that mechanical locks are worthy objects
of our attention and scrutiny.
|
|
Technical Sessions: Wednesday, December
7 | Thursday, December 8 | Friday, December 9
|
|
Friday, December 9, 2005 |
Friday
9:00 a.m.10:30 a.m.
|
REFEREED PAPERS California
Tools
Session Chair: Luke Kanies, Reductive Labs, LLC
A1: Spreadsheet-based Scripting for Developing Web Tools
Eben M. Haber, Eser Kandogan, Allen Cypher, Paul P. Maglio, and Rob Barrett, IBM Almaden Research Center
Hostdb: The Best Damn host2DNS/DHCP Script Ever Written
Thomas Limoncelli, Cibernet Corp.
Solaris Service Management Facility: Modern System Startup and Administration
Jonathan Adams, David Bustos, Stephen Hahn, David Powell, and Liane Praza,
Sun Microsystems, Inc.
|
Friday
9:00 a.m.10:30 a.m.
|
INVITED TALKS I San Diego
Session Chair: Adam Moskowitz, Menlo Computing
How Sysadmins Can Protect Free Speech and Privacy on the Electronic
Frontier
Kevin Bankston, Electronic Frontier Foundation
Listen in MP3 format
View the presentation slides
The USA PATRIOT Act broadly expanded the government's power to wiretap
or demand records about your users' communications, and now the Justice
Department is quietly developing plans for mandatory data retention
that could completely decimate online privacy (and your own bottom
line). How can a sysadmin legally, morally, and technically balance the
legitimate needs of law enforcement against the First Amendment right
to speak and read anonymously? EFF lawyer Kevin Bankston will fill you
in on the latest developments in Internet privacy law and explain how
you may be the last best hope for free speech and privacy online.
|
Friday
9:00 a.m.10:30 a.m.
|
INVITED TALKS II Golden West
Session Chair: Rudi van Drunen, Leiden Cytology and Pathology Labs
Wireless Security
Michael H. Warfield, Internet Security Systems, Inc.
Listen in MP3 format
This session is an overview of the current state of 802.11* wireless
standards, security profiles, developments, and practices.
As hardware costs fall, wireless networks are proliferating rapidly.
Many are badly configured and highly insecure, in spite of improvements
in standards and default configurations. This talk on wireless security
will be an update on the state of the art in 802.11[abgix] security
and security practices. Included will be some recent developments
in standards, security incidents, and developments in the field, as well
as recommendations on securing wireless infrastructure.
|
Friday
9:00 a.m.10:30 a.m.
|
GURU IS IN SESSIONS
Royal Palms Salon 1/2
Session Chair: Philip Kizer, Texas A&M University
9:00 a.m.9:45 a.m. Change Management
Gene Kim, Tripwire, Inc.
In addition to being a co-founder of the IT Process Institute, Gene Kim is also the CTO and co-founder of Tripwire, Inc. In 1992, he co-authored Tripwire while at Purdue University with Dr. Gene Spafford. Since 1999, his passion has been capturing and codifying how "best in class" organizations have IT operations, security, audit, management, and governance working together to solve common objectives. In 2004, he co-wrote the Visible Ops Handbook, codifying how to successfully transform IT organizations from "good to great."
Gene has served on the Advanced Technology Committee for the Institute of Internal Auditors since 2003. In 2003, he co-chaired two conferences with SANS and the Software Engineering Institute, and was named by InfoWorld as one of the "Four Up and Coming CTOs to Watch." Gene holds a M.S. in computer science from University of Arizona and a B.S. in computer sciences from Purdue University. Gene is certified on both IT management and audit processes, possessing both ITIL Foundations and CISA certifications.
9:45 a.m.10:30 a.m. Security/Cryptography
Greg Rose, VP of Product Security, QUALCOMM Inc.
Greg Rose is a VP of Product Security for QUALCOMM Incorporated, where he works on cryptographic security and authentication for third-generation mobile phones and other technologies. He holds a number of patents for cryptographic methods and has successfully cryptanalyzed widely deployed ciphers. Greg was program chair of the 1996 and 2000 USENIX Security Symposia, and General Chair of Crypto 2003. Some of his papers and free software are available at https://www.qualcomm.com.au
|
10:30
a.m.11:00 a.m. Break
|
Friday
11:00 a.m.12:30 p.m.
|
REFEREED PAPERS California
Access Control
Session Chair: Tom Limoncelli, Cibernet Corp.
Towards a Deep-Packet-Filter Toolkit for Securing Legacy Resources
James Deverick and Phil Kearns, The College of William and Mary
Administering Access Control in Dynamic Coalitions
Rakesh Bobba, NCSA and University of Illinois at Urbana-Champaign; Serban Gavrila, VDG Inc.; Virgil Gligor, University of Maryland, College Park; Himanshu Khurana, NCSA and University of Illinois at Urbana-Champaign; Radostina Koleva, University of Maryland, College Park
Manage People, Not Userids
Jon Finke, Rensselaer Polytechnic Institute
|
Friday
11:00 a.m.12:30 p.m.
|
INVITED TALKS I San Diego
Session Chair: David N. Blank-Edelman, Northeastern University CCIS
Weblogs, Wikis, and RSS for System Administrators
Jonas Luster, Socialtext, Inc.
Listen in MP3 format
Success and minimum hassle for system administrators is
ultimately tied to having and providing timely and accurate
information. Recently, Weblogs, wikis, and RSS have matured to
become useful additions in the ongoing battle to keep everyone
and everything effectively informed and efficiently working.
Weblogs help to announce and explore projects, policy, and plans
between individuals in a group and amongst groups. They narrate a
flow. Wikis help to store and evolve documentation, solutions, and
designs. RSS ties these and other tools together by providing a
method to keep abreast of changes in Weblogs, wikis, issue
trackers, and many other systems.
|
Friday
11:00 a.m.12:30 p.m.
|
INVITED TALKS II Golden West
Session Chair: David Williamson, Tellme Networks
Using Your Body for Authentication: A Biometrics Guide for System
Administrators
Michael R. Crusoe
Listen in MP3 format
Is a face worth a thousand passwords? Have you ever wanted to add a
biometric factor to your user authentication but didn't know where to
start? This talk will provide a solid introduction to biometrics (the
automated recognition of individuals based on their behavioral and
biological characteristics) with a wide-ranging discussion of the
popular use cases, the five most common biometric modalities (face,
fingerprint, iris, hand, and voice), the current state of the biometrics
industry, and practical advice and tools for system administrators.
Learn about data management, privacy issues, liveness testing, and
current standards efforts.
|
Friday
11:00 a.m.12:30 p.m.
|
GURU IS IN SESSIONS I
Royal Palms Salon 1/2
Session Chair: Philip Kizer, Texas A&M University
Apache/OpenSSL/DNSSEC
Ben Laurie, The Bunker Secure Hosting
Ben Laurie is the Director of Security at The Bunker Secure Hosting. He is the author of Apache-SSL, as well as serving as an Apache core team and board member and an OpenSSL core team member.
|
Friday
11:00 a.m.12:30 p.m.
|
GURU IS IN SESSIONS II
Royal Palms Salon 6
Session Chair: Rudi van Drunen, Leiden Cytology and Pathology Labs
Mac OS X
Jordan Hubbard, Director of UNIX Technology, CoreOS, Apple Computer
Jordan Hubbard is the Director of UNIX Technology, CoreOS, at Apple Computer. He has been a software developer since the late 70's and is a longtime contributor to the open source community, from the earliest days of USENET's comp.sources.unix group, through MIT's X11 contributed software collection, to the FreeBSD Project, which he co-founded in 1993. These days, he focuses on the day-to-day development of Mac OS X and, more generally, on Apple's open source strategy and its relationship with traditional UNIX developers and administrators. His current pet count, for those who follow such things, is 10 cats and 4 dogs.
|
Friday, 12:30
p.m.2:00 p.m. Lunch (on your own)
|
Friday
2:00 p.m.3:30 p.m.
|
WORK-IN-PROGRESS REPORTS (WIPS) California
Session Chair: Esther Filderman, Pittsburgh Supercomputing Center
Short, pithy, and fun, Work-in-Progress reports introduce interesting new or ongoing work. If you have work you would like to share or a cool idea that's not quite ready for publication, send a one- or two-paragraph summary to
lisa05wips@usenix.org. We are particularly interested in presenting students' work. A schedule of presentations will be posted at the conference, and the speakers will be notified in advance. Work-in-Progress reports are five-minute presentations; the time limit will be strictly enforced.
|
Friday
2:00 p.m.3:30 p.m.
|
INVITED TALKS I San Diego
Session Chair: William LeFebvre, Independent Consultant
Silly Network Management Tricks
Terry Slattery, Netcordia, Inc.
Listen in MP3 format
View the presentation slides
Network management systems have traditionally not delivered on their
promise to help network administrators improve networks. There are a
number of reasons why, most of them silly. In this somewhat humorous
yet serious talk, I'll discuss specific network management approaches
that have contributed to the failure of the network management tools
that use them. On the serious side, I'll point out how to avoid the
silliness and describe what works and why. Bring your own observations of
silly network management tricks to liven the discussion during the
question and answer session.
|
Friday
2:00 p.m.3:30 p.m.
|
INVITED TALKS II Golden West
Session Chair: Strata Rose Chalup, VirtualNet Consulting
TALK CANCELLED
Thinking Like an Attacker
Steve Bono, Independent Security Evaluators
Is it ethical to train people to break systems? It is certainly
necessary. Without being able to think like an attacker it is difficult
to design a secure system. Developers and system
administrators alike must understand threat models and how their
systems may be subverted, before it happens. Knowing why security systems
fail, the most common mistakes made by system designers, and critically
analyzing how to break your own system design are often overlooked and
extraordinarily beneficial practices.
|
Friday
2:00 p.m.3:30 p.m.
|
GURU IS IN SESSIONS I
Royal Palms Salon 1/2
Session Chair: Philip Kizer, Texas A&M University
Solaris 10: System/DTrace/Zones/SMF
Bryan Cantrill, Dan Price, and Liane Praza, Sun Microsystems, Inc.
|
Friday
2:00 p.m.3:30 p.m.
|
GURU IS IN SESSIONS II
Royal Palms Salon 6
Session Chair: Tom Perrine, Sony Computer Entertainment America
Virtualization
John Arrasjid and
John Gannon, VMware
John Y. Arrasjid has 20 years' experience in the computer science field. His experience includes work with companies such as AT&T, Amdahl, 3Dfx Interactive, Kubota Graphics, Roxio, and his own company, WebNexus Communications, where he developed consulting practices and built a cross platform IT team.
John is currently a senior member of the VMware Professional Services Organization as a Consulting Architect. John has developed a number of service offerings focused on performance management, security, and disaster recovery and backup. John earned his Computer Science degree at SUNY Buffalo.
John Gannon has over ten years of experience architecting and implementing UNIX, Linux, and Windows infrastructures. John has worked in network engineering, operations, and professional services roles with various organizations including Sun Microsystems, University of Pennsylvania, Scient Corporation, and FOX Sports. John is currently responsible for delivering server consolidation, disaster recovery, and virtual infrastructure solutions to VMware's FORTUNE 500 clients. John received a BS degree in Computer Science Engineering from the University of Pennsylvania.
|
Friday
2:00 p.m.3:30 p.m.
|
HIT THE GROUND RUNNING TRACK Royal Palms Salon 5
Session Chair: Elizabeth Zwicky, Acuitus
Find out everything you need to know to get started on certificates, network security tools, NFSv4, Mac OS X, and time management. Click here for more information and to view slides of selected presentations.
|
Friday, 3:30 p.m.3:45 p.m. Break
|
Friday
3:45 p.m.5:30 p.m.
|
LISA Game Show Town & Country
Hosts: Rob Kolstad and Dan Klein, USENIX
Listen in MP3 format
Once again, closing this year's conference is the LISA Game Show. Join us as attendees face off in a test of technical knowledge and cultural trivia. Want to play? Visit the Membership Booth on Thursday afternoon to pick up the qualifying questionnaire. Fill out and return it by Friday at noon. The top-scoring attendees will meet on-stage for the opportunity to become the reigning "Monarch of the Game Show." Don't miss out on the chance for LISA fame and glory. Oh, and did we mention the fabulous prizes?
|
|
|