Wednesday, January 28 - Thursday, January 29 Symposium Speakers | |
Technical Program Wednesday, January 28, 1998 | |
---|---|
9:00am - 10:30am |
Opening Remarks Avi Rubin, AT&T Labs - Research |
|
Keynote Address: Security Lessons From All Over Bill Cheswick, Lucent Technologies, Bell Labs From a security viewpoint, there is little new about the Internet. The same security rules apply to the Internet, castles, walls, and even the immune system. We will explore a number of security lessons from many sources.
Bill Cheswick logged into his first computer in 1969 and has worked on operating system security for more than 25 years. Since joining Bell Laboratories in 1987, he has worked on network security, PC viruses, mailers, the Plan 9 operating system, and kernel hacking. With Steve Bellovin, he co-authored the first full book on Internet security, Firewalls and Internet Security, Repelling the Wily Hacker. Cliff Stoll has called Ches "one of the seven avatars of the Internet." Ches's current work includes various Internet munitions, a new edition of the book, and maybe a way to hunt down anonymous denial-of-service attacks. |
10:30am - 11:00am Break
| ||
11:00am - Noon | ||
REFEREED PAPERS TRACK
Architecture Session Chair: Steve Bellovin, AT&T Labs - Research
A Comparison of Methods for Implementing Adaptive Security Policies
The CRISIS Wide Area Security Architecture
|
INVITED TALKS TRACK
The Security Product Market: Trends and Influences Marcus Ranum, Network Flight Recorder, Inc. The computer security products market is expected to grow from a $100m/year market in 1995 to a $1b/year market by the year 2000. Such a magnitude in growth will trigger major changes in the industry. I will outline the main factors influencing different aspects of the security products market, and describe how those factors are likely to direct product and technology trends.
| |
Noon - 1:30pm Lunch (on your own)
| ||
1:30pm - 3:30pm | ||
REFEREED PAPERS TRACK
Intrusion Detection Session Chair: Mike Reiter, AT&T Labs - Research
Bro: A System for Detecting Network Intruders in Real-Time
Cryptographic Support for Secure Logs on Untrusted Machines
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
Data Mining Approaches for Intrusion Detection
|
INVITED TALKS TRACK
Panel: Computer Security and Legal Liability Moderator: Steve Bellovin, AT&T Labs - Research Because of buggy, vendor-supplied software, someone breaks into your site and causes damage. Who is liable? You? The hacker? The vendor? Some real live lawyers will try to answer this question. Panelists: Ed Cavazos, Interliant Corporation Others to be announced.
| |
3:30pm - 4:00pm Break
| ||
4:00pm - 5:30pm | ||
REFEREED PAPERS TRACK
Network Security Session Chair: Dave Balenson, Trusted Information Systems
Securing Classical IP Over ATM Networks
A Java Beans Component Architecture for Cryptographic Protocols
Secure Videoconferencing
|
INVITED TALKS TRACK
Factoring: Facts and Fables Arjen K. Lenstra, Citibank, N.A. In theory, the security of most Public Key Cryptosystems is based on the assumption that a number theoretical problem (such as integer factorization or computing discrete logarithms) is hard. In practice, when using Public Key Cryptosystems to secure Internet traffic for instance, the situation is not so clear. In this talk I will discuss various security assumptions and I will show how our credulity may lead to interesting business opportunities.
|
Wednesday, January 28 - Thursday, January 29 Symposium Speakers |
| ||
|
Symposium Index Events Calendar USENIX home |