NDSS Symposium 2000 Program
Session 1: Software Assurance
Chair: G. McGraw (Reliable Software Technologies, UNITED STATES)
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
D. Wagner, J. Foster, E. Brewer, and A. Aiken (UC Berkeley, UNITED STATES)
K. Jain and R. Sekar (Iowa State University, UNITED STATES)
Session 2: Group and Multicast Security
Chair: T. Hardjono (Bay Networks / Nortel, UNITED STATES)
Optimized Rekey for Group Communication Systems
O. Rodeh (Hebrew University of Jerusalem, ISRAEL), K. Birman (Cornell University, UNITED STATES) and D. Dolev (Hebrew University of Jerusalem, ISRAEL)
An IPSec-based Host Architecture for Secure Internet Multicast
R. Canetti, P. Cheng, F. Giraud, D. Pendarakis, J. Rao, P. Rohatgi, and D. Saha (IBM TJ Watson Research Center, UNITED STATES)
Session 3: Panel – The Economics of Security
Moderators: J. Ellis (Sun Microsystems, UNITED STATES), and G. McGraw (Reliable Software Technologies, UNITED STATES)
Panelists:
- N. Economidis (InsureTrust.com, UNITED STATES)
- N. Pasciullo (Jones, Gregg, Creehan & Gerace, LLP, UNITED STATES)
- F. C. Smith (Attorney, UNITED STATES)
- L. Wagner (ICSA.net, UNITED STATES) [Slides]
Session 4: Protocols I
Chair: M. Dacier (IBM Zurich Research Laboratory, SWITZERLAND)
A First Step Towards the Automatic Generation of Security Protocols
A. Perrig and D. Song (Carnegie Mellon University, UNITED STATES)
A Revocation, Validation and Authentication Protocol for SPKI Based Delegation Systems
Y. Kortesniemi, T. Hasu (Helsinki University of Technology, FINLAND) and J. Särs (Nixu Oy, FINLAND)
Secure Border Gateway Protocol (S-BGP) – Real World Performance and Deployment Issues
S. Kent, C. Lynn, J. Mikkelson, and K. Seo (BBN Technologies / GTE Internetworking, UNITED STATES)
Session 5: Protocols II
Chair: P. Van Oorschot (Entrust Technologies, CANADA)
Analysis of a Fair Exchange Protocol
V. Shmatikov and J. Mitchell (Stanford University, UNITED STATES)
Secure Password-Based Cipher Suite for TLS
P. Buhler, T. Eirich, and M. Waidner (IBM Zurich Research Laboratory, SWITZERLAND), and M. Steiner (Universität des Saarlandes, GERMANY)
H. Krawczyk (Technion, ISRAEL and IBM TJ Watson Research Center, UNITED STATES) and T. Rabin (IBM TJ Watson Research Center, UNITED STATES)
Session 6: Intrusion Detection
Chair: D. Maughan (DARPA/ITO, UNITED STATES)
A Lightweight Tool for Detecting Web Server Attacks
M. Almgren, H. Debar, and M. Dacier (IBM Zurich Research Laboratory, SWITZERLAND)
Building Adaptive and Agile Applications Using Intrusion Detection and Response
J. Loyall, P. Pal, R. Schantz, and F. Webber (BBN Technologies / GTE Internetworking, UNITED STATES)
Session 7: Distributed Systems
Chair: Virgil Gligor – (UMD College Park, UNITED STATES)
Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies
D. Shands, R. Yee, J. Jacobs (NAI Labs, Network Associates, UNITED STATES), and E. J. Sebes (Kroll-O’Gara/Information Services Group, UNITED STATES)
Security of Encrypted rlogin Connections Created With Kerberos IV
K. Hildrum (UC Berkeley, UNITED STATES)
Accountability and Control of Process Creation in Metasystems
M. Humphrey, F. Knabe, A. Ferrari, and A. Grimshaw (University of Virginia, UNITED STATES)
Session 8: Panel II — Red Teaming and Network Security
Moderator: Douglas Maughan (DARPA, UNITED STATES)
Panelists:
- B. Wood (Sandia National Labs, UNITED STATES)
- S. Saydjari (DARPA, UNITED STATES)
- M. Puldy (IBM)