Usenix Security 2004 Posters and WiPs
Notes:
- Presenter names appear in bold.
Posters
Schedule: Thursday, August 12, 2004, 6:30-7:30pm
-
Access Control Policy Configuration Support System for MAC-Enabled OS
Shunichi Konno, Yoichi Hirose, Jumpei Watase, Takemi Nisase, and
Mitsutaka Itoh, NTT Information Sharing Platform Laboratories, NTT
Corporation
-
Adaptive Input Filtering: An Approach for Immunizing Servers from Repetitive Attacks
Zhenkai Liang, R. Sekar, and Daniel C. DuVarney, Stony Brook University
-
A Backwards-Compatible Technique for Detection of All Memory Errors in C Programs
Wei Xu, R. Sekar, and Daniel C. DuVarney, Stony Brook University
-
How Mature are Clientless SSL VPN?
Tim Likarish, Eric Anholt, Biljana Risteska, Valentina Grigoreanu,
Jens Mache, Chris Stevens, Lewis & Clark College
-
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks
Jing Deng, Richard Han, and Shivakant Mishra, University of Colorado at Boulder
-
Internet Ballistics: Retrieving Forensic Data From Network Scans
Bryan J. Parno, Harvard University; and Tony Bartoletti,
Computer Incident Advisory Capability (CIAC) Lawrence Livermore National
Laboratory
-
Ensuring Fair Trust in Reputation Based Systems
Radu Sion, Purdue University
-
Reducing Malicious Traffic With IP Puzzles
Ed Kaiser, Wu-chang Feng, Wu-chi Feng, and Antoine Luu, Oregon
Health & Science University
Work-in-Progress Reports
Schedule: Friday the 13th, 2:00-4:00pm
-
CryptoGraphics: Secret Key Cryptography Using Graphics Cards
Debra L. Cook, John Ioannidis, and Angelos D. Keromytis, Columbia University;
and Jake Zurgen, 10K Interactive
-
The eXtensible Configuration and Checklist Document Format (XCCDF)
Christopher J. Calabrese, The Center for Internet Security
-
Strider GhostBuster: Why It's A Bad Idea For Stealth Software To Hide Files
Yi-Min Wang, Binh Vo, Roussi Roussev, Chad Verbowski, and Aaron Johnson, Microsoft Research
-
The Nizza Security Architecture
Michael Hohmuth and Hermann Härtig, Technische Universität Dresden
-
Improving the Resilience of Indirection-Based DDoS Protection Mechanisms Using Per-Packet Path Diversity
Angelos Stavrou and Angelos D. Keromytis, Columbia University
-
Kerf: Machine Learning to Aid Intrusion Analysts
Javed Aslam, Northeastern University; Sergey Bratus, David Kotz, and
Ron Peterson, Dartmouth College, Institute for Security Technology
Studies (ISTS); and Daniela Rus, MIT.
(WiP Presented by Sergey Bratus.)
-
Recovering from Faulty Device Drivers
Nathanael Paul and David Evans, University of Virginia
-
Secure and Robust loose time synchronization mechanism for Wireless Sensor Networks
Jing Deng, Richard Han, and Shivakant Mishra, University of Colorado at Boulder
-
Toward a Verified, Secure, General-Purpose Microkernel
Jonathan S. Shapiro, Eric Northup, M. Scott Doerrie, and Swaroop
Sridhar, John Hopkins University
(Last updated: 8/13/2004 11:20am PDT)