Workshop Program |
Registration
| Hotel Information
All workshop sessions will take place in the Cypress room at the Hyatt Regency Santa Clara unless otherwise noted.
Monday, June 18, 2007
|
9:30 a.m.10:30 a.m. |
|
Keynote Address
20 Years of Crap on the Internet
William Cheswick, AT&T LabsResearch
Though the Internet background radiation is fairly intense these days, you could get a good packet
sunburn twenty years ago if you were in the right place. These non-useful packets were
port scans, network probes, and the death screams of machines succumbing to attacks on
their address-based authentication.
Now, unwanted network traffic is a lot more sophisticated, but I think it's fair to say that most
of it was foreseeable. What isn't clear is how one can get rid of it.
Bill Cheswick logged into his first computer in 1968. Seven years later, he was graduated from Lehigh University with a degree resembling Computer Science.
Cheswick has worked on (and against) operating system security for over 35 years.
Ches joined Bell Labs in 1987, where he became postmaster and firewall administrator. In 1990 he published a paper on firewall design that coined the word "proxy" in its current meaning. He followed this with "An Evening With Berferd," and then the publication of Firewalls and Internet Security: Repelling the Wily Hacker, co-authored with Steve Bellovin. In 1998, Ches starting the Internet Mapping Project with Hal Burch. This work became to core technology of a Bell Labs spin-off, Lumeta Corporation.
He joined AT&T Research in April 2007.
|
10:30 a.m.11:00 a.m. Break |
|
11:00 a.m.noon |
|
Papers Session
BotTorrent: Misusing BitTorrent to Launch DDoS Attacks
Karim El Defrawy, Minas Gjoka, and Athina Markopoulou,
University of California, Irvine
Read the paper in PDF
Boundary Detection and Containment of Local Worm Infections
Diego Zamboni, James Riordan, and Milton Yates, IBM Zurich Research Laboratory
Read the paper in PDF
|
|
noon1:30 p.m. Workshop Luncheon, Ballroom E/F, Santa Clara Convention Center |
|
1:30 p.m.3:00 p.m. |
|
Papers Session
Analyzing Network and Content Characteristics of Spim Using Honeypots
Aarjav J. Trivedi, Paul Q. Judge, and Sven Krasser, Secure Computing Corporation
Read the paper in PDF
A New Service for Increasing the Effectiveness of Network Address Blacklists
Jian Zhang and Phillip Porras, SRI International; Johannes Ullrich, SANS Technology Institute
Read the paper in PDF
Accountability as a Service
Adam Bender, Neil Spring, Dave Levin, and Bobby Bhattacharjee,
University of Maryland, College Park
Read the paper in PDF | HTML
|
3:00 p.m.3:30 p.m. Break |
|
3:30 p.m.5:00 p.m. |
|
Panel: Why Unwanted Traffic Is a Hard Problem; What New Tools Are Needed?
Panelists: David Cheriton, Professor, Stanford University; Barry Greene, Senior Consultant, Cisco Systems; Craig Labovitz, Director, Network Architecture, Arbor Networks, Inc.
|
|
|