Check out the new USENIX Web site.

Usenix Security 2004 Posters and WiPs

Notes:


Posters

Schedule: Thursday, August 12, 2004, 6:30-7:30pm

  1. Access Control Policy Configuration Support System for MAC-Enabled OS
    Shunichi Konno, Yoichi Hirose, Jumpei Watase, Takemi Nisase, and Mitsutaka Itoh, NTT Information Sharing Platform Laboratories, NTT Corporation
  2. Adaptive Input Filtering: An Approach for Immunizing Servers from Repetitive Attacks
    Zhenkai Liang, R. Sekar, and Daniel C. DuVarney, Stony Brook University
  3. A Backwards-Compatible Technique for Detection of All Memory Errors in C Programs
    Wei Xu, R. Sekar, and Daniel C. DuVarney, Stony Brook University
  4. How Mature are Clientless SSL VPN?
    Tim Likarish, Eric Anholt, Biljana Risteska, Valentina Grigoreanu, Jens Mache, Chris Stevens, Lewis & Clark College
  5. Defending Against Traffic Analysis Attacks in Wireless Sensor Networks
    Jing Deng, Richard Han, and Shivakant Mishra, University of Colorado at Boulder
  6. Internet Ballistics: Retrieving Forensic Data From Network Scans
    Bryan J. Parno, Harvard University; and Tony Bartoletti, Computer Incident Advisory Capability (CIAC) Lawrence Livermore National Laboratory
  7. Ensuring Fair Trust in Reputation Based Systems
    Radu Sion, Purdue University
  8. Reducing Malicious Traffic With IP Puzzles
    Ed Kaiser, Wu-chang Feng, Wu-chi Feng, and Antoine Luu, Oregon Health & Science University

Work-in-Progress Reports

Schedule: Friday the 13th, 2:00-4:00pm

  1. CryptoGraphics: Secret Key Cryptography Using Graphics Cards
    Debra L. Cook, John Ioannidis, and Angelos D. Keromytis, Columbia University; and Jake Zurgen, 10K Interactive
  2. The eXtensible Configuration and Checklist Document Format (XCCDF)
    Christopher J. Calabrese, The Center for Internet Security
  3. Strider GhostBuster: Why It's A Bad Idea For Stealth Software To Hide Files
    Yi-Min Wang, Binh Vo, Roussi Roussev, Chad Verbowski, and Aaron Johnson, Microsoft Research
  4. The Nizza Security Architecture
    Michael Hohmuth and Hermann Härtig, Technische Universität Dresden
  5. Improving the Resilience of Indirection-Based DDoS Protection Mechanisms Using Per-Packet Path Diversity
    Angelos Stavrou and Angelos D. Keromytis, Columbia University
  6. Kerf: Machine Learning to Aid Intrusion Analysts
    Javed Aslam, Northeastern University; Sergey Bratus, David Kotz, and Ron Peterson, Dartmouth College, Institute for Security Technology Studies (ISTS); and Daniela Rus, MIT.
    (WiP Presented by Sergey Bratus.)
  7. Recovering from Faulty Device Drivers
    Nathanael Paul and David Evans, University of Virginia
  8. Secure and Robust loose time synchronization mechanism for Wireless Sensor Networks
    Jing Deng, Richard Han, and Shivakant Mishra, University of Colorado at Boulder
  9. Toward a Verified, Secure, General-Purpose Microkernel
    Jonathan S. Shapiro, Eric Northup, M. Scott Doerrie, and Swaroop Sridhar, John Hopkins University

(Last updated: 8/13/2004 11:20am PDT)