Check out the new USENIX Web site.
TECHNICAL SESSIONS: Wednesday, December 7 | Thursday, December 8 | Friday, December 9

Wednesday, December 7, 2005
 

Wednesday
8:45 a.m.–
10:30 a.m.

Opening Remarks, Awards, Keynote
Town & Country

Qi Lu Keynote Address
Scaling Search Beyond the Public Web

Qi Lu, Vice President of Engineering, Yahoo! Inc.

MP3 IconListen in MP3 format

What's next in "search"? Scaling, fault tolerance, and storage management become a lot more exciting when we go from the colossal scale of Yahoo! to the challenges of searching not just the public Web, but your desktop, email, bookmarks, and other repositories of information such as your online communities. This talk introduces Yahoo!'s personal and social search initiative, and focuses on technology infrastructure that can store, index, and search user and community content on a massive scale. Specific topics also include storage management, fault tolerance, metrics, and real-time monitoring.

Dr. Qi Lu is a VP of Engineering of Yahoo! Inc., responsible for the technology development of Yahoo!'s Search and Marketplace businesses unit, which includes the company's search, e-commerce, and local listings of businesses and products. Prior to joining Yahoo! in 1998, Dr. Lu was a Research Staff Member at IBM Almaden Research Center. Before that, Dr. Lu worked at Carnegie Mellon University as a Research Associate, and at Fudan University in China as a faculty member. He holds 20 U.S. patents, and received his B.S. and M.S. in computer science from Fudan University and his Ph.D. in computer science from Carnegie Mellon University.

More information on the speaker can be found here.

Wednesday, 10:30 a.m.–11:00 a.m.   Break
 

Wednesday
11:00 a.m.–
12:30 p.m.

REFEREED PAPERS
California

Vulnerabilities
Session Chair: John "Rowan" Littell, Earlham College

GULP: A Unified Logging Architecture for Authentication Data
Matt Selsky and Daniel Medina, Columbia University

Awarded Best Student Paper!
Toward an Automated Vulnerability Comparison of Open Source IMAP Servers
Chaos Golubitsky, Carnegie Mellon University

Fast User-Mode Rootkit Scanner for the Enterprise
Yi-Min Wang and Doug Beck, Microsoft Research

 

Wednesday
11:00 a.m.–
12:30 p.m.

INVITED TALKS I
San Diego

Session Chair: Lee Damon, University of Washington

Computing on Amateur Satellites
Bdale Garbee, HP Open Source & Linux CTO

MP3 IconListen in MP3 format

Less than five years after the launch of Sputnik in late 1957, the first satellite built entirely by amateur radio operators was in orbit. Since then, more than fifty amateur satellites of increasing sophistication have been successfully delivered to Earth orbit.

The environment of space imposes interesting constraints, as does an all-volunteer ground station network. This talk will discuss the evolution of computing systems aboard amateur satellites from OSCAR 1 to the future, including a satellite intended for Mars orbit.

 

Wednesday
11:00 a.m.–
12:30 p.m.

INVITED TALKS II
Golden West
Session Chair: David N. Blank-Edelman, Northeastern University CCIS

TALK POSTPONED
This talk has been rescheduled for Thursday, December 8, 1:00 p.m.–2:00 p.m.
It will take place in the San Diego room. You're welcome to pick up lunch and bring it to the talk.

Network Black Ops: Extracting Unexpected Functionality from Existing Networks
Dan Kaminsky, DoxPara Research

MP3 IconListen in MP3 format

View the presentation slides

There is the set of functionality we expect from our network. There's the set of functionality your network is capable of. These two sets are not identical. This talk will explore security risks you may not even be aware your network is exposed to and will demonstrate new techniques for managing those risks. Mechanisms will be discussed for:

  • Establishing video-capable tunnels over DNS (and detecting such tunnels)
  • Evading intrusion detection systems by exploiting IP's lack of statelessness
  • Reliably auditing Internet-scale networks
  • Visualizing complex network activity
 

Wednesday
11:00 a.m.–
12:30 p.m.

GURU IS IN SESSIONS
Royal Palms Salon 1/2

Session Chair: Elizabeth Zwicky, Acuitus

Backups
W. Curtis Preston, Glasshouse

W. Curtis Preston is the VP of Data Protection for Glasshouse, a storage consulting firm focused on bridging the gap between the business and storage products. Curtis has twelve years of experience in designing storage systems for many environments, both large and small. As a recognized expert in the field, Curtis has advised the major product vendors regarding product features and implementation methods. Curtis is the administrator of the NetBackup and NetWorker FAQs and answers the "Ask The Experts" backup forum on SearchStorage.com. He is also the author of O'Reilly's UNIX Backup & Recovery and Using SANs & NAS, the co-author of the SAGE Short Topics booklet Backups and Recovery, and a contributing editor to Storage Magazine.

Wednesday, 12:30 p.m.–2:00 p.m.   Lunch (on your own)
 

Wednesday
2:00 p.m.–3:30 p.m.

REFEREED PAPERS
California

Configuration Management Theory
Session Chair: Yi-Min Wang, Microsoft Research

Configuration Tools: Working Together
Paul Anderson and Edmund Smith, University of Edinburgh

A Case Study in Configuration Management Tool Deployment
Narayan Desai, Rick Bradshaw, Scott Matott, Sandra Bittner, Susan Coghlan, Rémy Evard, Cory Lueninghoener, Ti Leggett, John-Paul Navarro, Gene Rackow, Craig Stacey, and Tisha Stacey, Argonne National Laboratory

Awarded Best Student Paper!
Reducing Downtime Due to System Maintenance and Upgrades
Shaya Potter and Jason Nieh, Columbia University

 

Wednesday
2:00 p.m.–3:30 p.m.

INVITED TALKS I
San Diego

Session Chair: Adam Moskowitz, Menlo Computing

What Big Sites Can Learn from Little Sites
Tom Limoncelli, Cibernet Corp.

MP3 IconListen in MP3 format

View the presentation slides

Tom used to focus on IT at big sites. These past 4 years he's been at a lot of small sites. The problems weren't any easier and often were more interesting. What can we learn from small sites? First, the fundamentals become much more important at small sites. And what "the fundamentals" are becomes a lot clearer. Secondly, we learn that "we are all small sites." Join Tom on his tour of what he's been doing for the past 4 years, what beasts he's battled, and his thoughts on where we, as an industry, could be going.

 

Wednesday
2:00 p.m.–3:30 p.m.

INVITED TALKS II
Golden West
Session Chair: William LeFebvre, Independent Consultant

Building MIT's Stata Center: An IT Perspective
Garrett Wollman, Infrastructure Group, MIT Computer Science & Artificial Intelligence Laboratory

MP3 IconListen in MP3 format

View the presentation slides

Much has been written about doing large IT relocations in the context of growing commercial businesses, including a number of LISA papers. Making such a major move in a university research lab involves challenges typically not faced in the business world. This talk describes the context, challenges, and lessons from MIT CSAIL's move from its 40-year-old home in commercial office space to the $300 million Ray and Maria Stata Center. We hope to offer some advice for other institutional IT groups facing the challenge of relocating several hundred scientists.

 

Wednesday
2:00 p.m.–3:30 p.m.

GURU IS IN SESSIONS
Royal Palms Salon 1/2
Session Chair: David Williamson, Tellme Networks

LDAP
Howard Chu, Chief Architect, Symas Corp.

Howard Chu started formally supporting students at the U. of Michigan in 1986 and advanced to System Research Programmer with University-wide responsibilities. He moved on to the Jet Propulsion Lab at CalTech and then joined a start-up doing technology development for early computer telephony integration. Howard joined Locus Computing in 1995 and remained there through the acquisition by Platinum until he joined Symas in 1999 as a Founder. He has deep experience with system networking and security technologies. He started working with OpenLDAP in 1998 and has been one of the leading developers on the OpenLDAP core team since 1999.

Wednesday, 3:30 p.m.–4:00 p.m.   Break
 

Wednesday
4:00 p.m.–5:30 p.m.

REFEREED PAPERS
California

Configuration Management Practice
Session Chair: Yi-Min Wang, Microsoft Research

About the Integration of Mac OS X Devices into a Centrally Managed UNIX Environment
Anton Schultschik, ETH Zürich

RegColl: Centralized Registry Framework for Infrastructure System Management
Brent ByungHoon Kang, Vikram Sharma, and Pratik Thanki, University of North Carolina at Charlotte

Herding Cats: Managing a Mobile UNIX Platform
Maarten Thibaut and Wout Mertens, Cisco Systems, Inc.

 

Wednesday
4:00 p.m.–5:30 p.m.

INVITED TALKS I
San Diego
Session Chair: Adam Moskowitz, Menlo Computing

Under 200: Applying IS Best Practices to Small Companies
Strata Rose Chalup, Virtual.Net Inc.

MP3 IconListen in MP3 format

View the presentation slides

A small company that evolved, rather than planned, its IT infrastructure presents an environment which can be greatly refined by application of time-honored LISA best practices, but that also presents some distinct challenges: overloaded and under-staffed IT departments, grossly heterogeneous computing platforms, startup deadline pressure (zero downtime!), and the biggie, "We're too small to waste time on stuff like that!"

Please join us for a discussion of the challenges, and rewards, of applying best practices in the chaotic world of the small company.

 

Wednesday
4:00 p.m.–5:30 p.m.

INVITED TALKS II
Golden West
Session Chair: Tom Perrine, Sony Computer Entertainment America

What's a PKI, Why Would I Want One, and How Should it Be Designed?
Radia Perlman, Sun Microsystems Laboratories

MP3 IconListen in MP3 format

This talk explains what a PKI-based system is, and how it compares in functionality with a system like Kerberos. It also covers some crypto, to demystify the notions of public key and secret key cryptography and allow you to impress a date. Then it describes various ways people think of deploying a PKI that have issues in terms of building in monopolies, being insecure, and/or being unmanageable, and proposes a method that will avoid all these problems. It describes the issues involved in all the pieces, such as how to get securely certified, how to do revocation, how to know the public key of the certifying authority, and how a human might know its own public key.

 

Wednesday
4:00 p.m.–5:30 p.m.

NEW! HIT THE GROUND RUNNING TRACK
Royal Palms Salon 5
Session Chair: David N. Blank-Edelman, Northeastern University CCIS

Find out everything you need to know to get started on AFS, backups, cfengine, storage networking, and VoIP. Click here for more information and to view slides of selected presentations.

Technical Sessions: Wednesday, December 7 | Thursday, December 8 | Friday, December 9
Thursday, December 8, 2005
 

Thursday
9:00 a.m.–10:30 a.m.

REFEREED PAPERS
California

Networking
Session Chair: Rudi van Drunen, Leiden Cytology and Pathology Labs

Open Network Administrator (ONA)—A Web-based Network Management Tool
Bruce Campbell and Robyn Landers, University of Waterloo

An Open Source Solution for Testing NAT'd and Nested iptables Firewalls
Robert Marmorstein and Phil Kearns, The College of William and Mary

Towards Network Awareness
Evan Hughes and Anil Somayaji, Carleton University

 

Thursday
9:00 a.m.–10:30 a.m.

INVITED TALKS I
San Diego

Session Chair: Luke Kanies, Reductive Labs, LLC

Modern Trends in UNIX and Linux Infrastructure Management
Andrew Cowie, Operational Dynamics

MP3 IconListen in MP3 format

One of the biggest trends in the industry today is a divergence in the approaches to deploying and managing complex infrastructure: horizontal vs. vertical scaling, server consolidation vs. increasing complexity, and blade servers vs. virtualization. Everyone claims that their solution is the best, but for which problem?

We'll also talk about the proliferation of Web interfaces, architecture alternatives to the conventional e-commerce platform, and the debate between congruent and convergent configuration management.

Finally, we'll look to the future and consider the hype surrounding grid computing and what impact it will have on the theory and practice of infrastructure architecture.

 

Thursday
9:00 a.m.–10:30 a.m.

INVITED TALKS II
Golden West
Session Chair: William LeFebvre, Independent Consultant

Incident Command for IT: What We Can Learn from the Fire Department
Brent Chapman, Great Circle Associates, Inc.

MP3 IconListen in MP3 format

View the presentation slides

Have you ever wondered how fire departments organize themselves on the fly to deal with a major incident? How they quickly and effectively coordinate the efforts of multiple agencies? How they evolve the organization as the incident changes in scope, scale, or focus? They accomplish all this by using the Incident Command System (ICS), a standardized organizational structure and set of operating principles adopted by most emergency agencies nationwide. In this talk, Brent will introduce the concepts and principles of ICS, and discuss how these can be applied to IT events, such as security incidents and service outages.

 

Thursday
9:00 a.m.–10:30 a.m.

GURU IS IN SESSIONS I
Royal Palms Salon 1/2
Session Chair: Lee Damon, University of Washington

Spam
Doug Hughes, Global Crossing

Doug Hughes takes care of the ISP and relay mail servers for an international telecommunications provider and spends far too much time figuring out how to stop the servers from being overwhelmed with spam. He talked about some of the techniques used at last year's spam mini-symposium at LISA.

 

Thursday
9:00 a.m.–10:30 a.m.

GURU IS IN SESSIONS II
Royal Palms Salon 6
Session Chair: David Williamson, Tellme Networks

AFS
Esther Filderman, The OpenAFS Project

Esther Filderman has been working with AFS since its toddlerhood and has been working to bring AFS content to LISA conferences since 1999. She is currently Senior Systems Mangler and AFS administrator for the Pittsburgh Supercomputing Center.

Thursday, 10:30 a.m.–11:00 a.m.   Break
 

Thursday
11:00 a.m.–12:30 p.m.

REFEREED PAPERS
California

Theory
Session Chair: Luke Kanies, Reductive Labs, LLC

Awarded Best Paper!
Toward a Cost Model for System Administration
Alva L. Couch, Ning Wu, and Hengky Susanto, Tufts University

Voluntary Cooperation in Pervasive Computing Services
Mark Burgess and Kyrre Begnum, Oslo University College

Network Configuration Management via Model Finding
Sanjai Narain, Telcordia Technologies, Inc.

 

Thursday
11:00 a.m.–12:30 p.m.

INVITED TALKS I
San Diego

Session Chair: Elizabeth Zwicky, Acuitus

Automatic PC Desktop Management with Virtualization Technology
Monica Lam, Stanford University/SkyBlue Technologies

MP3 IconListen in MP3 format

This talk describes a management architecture that allows IT departments to regain control of distributed PC desktops. Software configurations, which include an operating system and applications, are managed centrally by system administrators. The latest versions of these configurations are automatically cached and executed locally on the PCs. By using virtualization technology, the OS-independent, networked management layer is isolated from the vulnerabilities of PC software and the same software configuration can be run on a variety of kinds of hardware. This approach trades off some performance and customizability for better control and ease of management.

 

Thursday
11:00 a.m.–12:30 p.m.

INVITED TALKS II
Golden West
Session Chair: Adam S. Moskowitz, Menlo Computing

What's the Worst That Could Happen?
Peyton Engel, Berbee Information Networks Corporation

MP3 IconListen in MP3 format

View the presentation slides

Understanding the potential impact of a security incident is crucial, whether at design time, or when responding to an actual event. Buzzwords like "inverted security" and "deperimeterization" have haunted security jargon for years, but don't help us guess how many systems an attack has compromised, or justify making a change in user account management. Using real-world examples of password trust relationships, we'll identify ways that diligent security efforts are often undermined, explain how to spot some potentially critical problems on our own networks, and better understand the practical application of concepts that often seem too abstract to be useful.

 

Thursday
11:00 a.m.–12:30 p.m.

GURU IS IN SESSIONS I
Royal Palms Salon 1/2
Session Chair: Philip Kizer, Texas A&M University

Samba
Gerald Carter, Samba Team/Hewlett-Packard

Gerald Carter has been a member of the Samba Development Team since 1998. He has published articles in various Web-based magazines and teaches courses at conferences and in organizations. Currently employed by Hewlett-Packard as a Samba developer, Gerald has published books with SAMS Publishing and with O'Reilly Publishing.

 

Thursday
11:00 a.m.–12:30 p.m.

GURU IS IN SESSIONS II
Royal Palms Salon 6
Session Chair: Tom Perrine, Sony Computer Entertainment America

VoIP
Robert Sparks, Vice President, Research and Development, Estacado

Robert Sparks is responsible for managing Estacado's research activities and development of products and product components for new markets.

Robert joined Estacado after holding the role of CTO at Xten Networks. Robert has over 20 years' experience in the computer and communications industries. He held management and research positions at Dynamicsoft, Lucent, MCI, and Texas A&M University. In the past five years, Robert has focused on designing and developing SIP-based IP communications systems.

Robert is very active in standards and industry development. He coordinates the industry's premier interoperability event, the SIPIT. Robert chairs the IETF's SIMPLE working group, which defines extensions to SIP for Presence and Instant Messaging. He was a contributing editor to RFC 3261, which defines the SIP protocol, as well as the author of RFCs 3515 and 3892, which extend SIP to allow a rich set of call transfer capabilities.

Robert is a member of the board of directors of the SIP Forum. He is also on the board of directors and is President of the SIPfoundry.

 

Thursday
11:00 a.m.–12:30 p.m.

NEW! HIT THE GROUND RUNNING TRACK
Royal Palms Salon 5
Session Chair: Strata Rose Chalup, VirtualNet Consulting

Find out everything you need to know to get started on configuration management, DNS, Dtrace, identity management, and spam fighting. Click here for more information and to view slides of selected presentations.

Thursday, 12:30 p.m.–2:00 p.m.   Lunch (on your own)   Special talk scheduled during lunch; see below.
 

Thursday
1:00 p.m.–2:00 p.m.

SPECIAL RESCHEDULED INVITED TALKS II

Session Chair: David N. Blank-Edelman, Northeastern University CCIS

TALK RESCHEDULED
This talk was originally scheduled for Wednesday, and has been rescheduled for Thursday, December 8, 1:00 p.m.–2:00 p.m.
It will take place in the San Diego room. You're welcome to pick up lunch and bring it to the talk.

Network Black Ops: Extracting Unexpected Functionality from Existing Networks
Dan Kaminsky, DoxPara Research

MP3 IconListen in MP3 format

View the presentation slides

There is the set of functionality we expect from our network. There's the set of functionality your network is capable of. These two sets are not identical. This talk will explore security risks you may not even be aware your network is exposed to and will demonstrate new techniques for managing those risks. Mechanisms will be discussed for:

  • Establishing video-capable tunnels over DNS (and detecting such tunnels)
  • Evading intrusion detection systems by exploiting IP's lack of statelessness
  • Reliably auditing Internet-scale networks
  • Visualizing complex network activity
 

Thursday
2:00 p.m.–3:30 p.m.

REFEREED PAPERS
California

Network Visualization
Session Chair: John "Rowan" Littell, Earlham College

Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite
William Yurcik, NCSA

Interactive Traffic Analysis and Visualization with Wisconsin Netpy
Cristian Estan and Garret Magin, University of Wisconsin, Madison

NetViewer: A Network Traffic Visualization and Analysis Tool
Seong Soo Kim and A.L. Narasimha Reddy, Texas A&M University

 

Thursday
2:00 p.m.–3:30 p.m.

INVITED TALKS I
San Diego
Session Chair: David N. Blank-Edelman, Northeastern University CCIS

Internet Counter-Intelligence: Offense and Defense
Lance Cottrell, Anonymizer, Inc.

MP3 IconListen in MP3 format

As Internet technology advances, online threats such as IP-based blocking, IP-based cloaking, and information leakage grow exponentially. An exposed IP address can put companies at risk of countless privacy and security breaches. Discover how your competitors are able to utilize your IP address to uncover your confidential information or feed you inaccurate information while you conduct competitive intelligence. Learn how to mitigate these threats, ensure data integrity, and safeguard your confidential information. Discover how to gather and make best use of the information leaked by your competitors.

 

Thursday
2:00 p.m.–3:30 p.m.

INVITED TALKS II
Golden West
Session Chair: William LeFebvre, Independent Consultant

Preventing Child Neglect in DNSSECbis Using Lookaside Validation (DLV)
Paul Vixie, Internet Systems Consortium, Inc.

MP3 IconListen in MP3 format

The DNSSECbis data model has key introduction follow the delegation chain, thus requiring a zone's parent to become secure before a zone itself can be secured. Ultimately this leads to non-deployability, since the root zone will probably not be secured anytime soon. We describe an early deployment aid for DNSSECbis whereby key introduction can be done via cooperating third parties.

 

Thursday
2:00 p.m.–3:30 p.m.

GURU IS IN SESSIONS
Royal Palms Salon 1/2
Session Chair: Lee Damon, University of Washington

2:00 p.m.–2:45 p.m.
Project Management

Strata Rose Chalup, Virtual.Net Inc.

Strata Rose Chalup began as a fledgling sysadmin in 1983 and has been leading and managing complex IT projects for many years, serving in roles ranging from Project Manager to Director of Network Operations. She has written a number of articles on management and working with teams and has applied her management skills on various volunteer boards, including BayLISA and SAGE. Strata has a keen interest in network information systems and new publishing technologies and built a successful consulting practice around being an avid early adopter of new tools, starting with ncsa_httpd and C-based CGI libraries in 1993 and moving on to wikis, RSS readers, and blogging. Another MIT dropout, Strata founded VirtualNet Consulting in 1993.

2:45 p.m.–3:30 p.m.
Time Management

Tom Limoncelli, Cibernet Corp.

Tom Limoncelli, author of O'Reilly's Time Management for System Administrators and co-author of The Practice of System and Network Administration from Addison-Wesley, is Director of IT Services at Cibernet Corp. A sysadmin and network wonk since 1987, he has worked at Dean for America, Lumeta, Bell Labs/Lucent, Mentor Graphics, and Drew University. He is a frequent presenter at LISA conferences.

Thursday, 3:30 p.m.–4:00 p.m.   Break
 

Thursday
4:00 p.m.–5:30 p.m.

Plenary Session
Town & Country

Session Chair: Adam Moskowitz, Menlo Computing

Matt Blaze Picking Locks with Cryptology
Matt Blaze, University of Pennsylvania

MP3 IconListen in MP3 format

Computer security and cryptology take much of their basic philosophy and language from the world of mechanical locks, and yet we often ignore the possibility that physical security systems might suffer from the same kinds of attacks that plague computers and networks. This talk examines mechanical locks from a computer scientist's viewpoint. We describe attacks for amplifying rights in mechanical pin tumbler locks that are at least as serious as those that can occur in computing systems. We end with future directions for research in this area and the suggestion that mechanical locks are worthy objects of our attention and scrutiny.

Technical Sessions: Wednesday, December 7 | Thursday, December 8 | Friday, December 9
Friday, December 9, 2005
 

Friday
9:00 a.m.–10:30 a.m.

REFEREED PAPERS
California

Tools
Session Chair: Luke Kanies, Reductive Labs, LLC

A1: Spreadsheet-based Scripting for Developing Web Tools
Eben M. Haber, Eser Kandogan, Allen Cypher, Paul P. Maglio, and Rob Barrett, IBM Almaden Research Center

Hostdb: The Best Damn host2DNS/DHCP Script Ever Written
Thomas Limoncelli, Cibernet Corp.

Solaris Service Management Facility: Modern System Startup and Administration
Jonathan Adams, David Bustos, Stephen Hahn, David Powell, and Liane Praza, Sun Microsystems, Inc.

 

Friday
9:00 a.m.–10:30 a.m.

INVITED TALKS I
San Diego

Session Chair: Adam Moskowitz, Menlo Computing

How Sysadmins Can Protect Free Speech and Privacy on the Electronic Frontier
Kevin Bankston, Electronic Frontier Foundation

MP3 IconListen in MP3 format

View the presentation slides

The USA PATRIOT Act broadly expanded the government's power to wiretap or demand records about your users' communications, and now the Justice Department is quietly developing plans for mandatory data retention that could completely decimate online privacy (and your own bottom line). How can a sysadmin legally, morally, and technically balance the legitimate needs of law enforcement against the First Amendment right to speak and read anonymously? EFF lawyer Kevin Bankston will fill you in on the latest developments in Internet privacy law and explain how you may be the last best hope for free speech and privacy online.

 

Friday
9:00 a.m.–10:30 a.m.

INVITED TALKS II
Golden West
Session Chair: Rudi van Drunen, Leiden Cytology and Pathology Labs

Wireless Security
Michael H. Warfield, Internet Security Systems, Inc.

MP3 IconListen in MP3 format

This session is an overview of the current state of 802.11* wireless standards, security profiles, developments, and practices.

As hardware costs fall, wireless networks are proliferating rapidly. Many are badly configured and highly insecure, in spite of improvements in standards and default configurations. This talk on wireless security will be an update on the state of the art in 802.11[abgix] security and security practices. Included will be some recent developments in standards, security incidents, and developments in the field, as well as recommendations on securing wireless infrastructure.

 

Friday
9:00 a.m.–10:30 a.m.

GURU IS IN SESSIONS
Royal Palms Salon 1/2
Session Chair: Philip Kizer, Texas A&M University

9:00 a.m.–9:45 a.m.
Change Management

Gene Kim, Tripwire, Inc.

In addition to being a co-founder of the IT Process Institute, Gene Kim is also the CTO and co-founder of Tripwire, Inc. In 1992, he co-authored Tripwire while at Purdue University with Dr. Gene Spafford. Since 1999, his passion has been capturing and codifying how "best in class" organizations have IT operations, security, audit, management, and governance working together to solve common objectives. In 2004, he co-wrote the Visible Ops Handbook, codifying how to successfully transform IT organizations from "good to great."

Gene has served on the Advanced Technology Committee for the Institute of Internal Auditors since 2003. In 2003, he co-chaired two conferences with SANS and the Software Engineering Institute, and was named by InfoWorld as one of the "Four Up and Coming CTOs to Watch." Gene holds a M.S. in computer science from University of Arizona and a B.S. in computer sciences from Purdue University. Gene is certified on both IT management and audit processes, possessing both ITIL Foundations and CISA certifications.

9:45 a.m.–10:30 a.m.
Security/Cryptography

Greg Rose, VP of Product Security, QUALCOMM Inc.

Greg Rose is a VP of Product Security for QUALCOMM Incorporated, where he works on cryptographic security and authentication for third-generation mobile phones and other technologies. He holds a number of patents for cryptographic methods and has successfully cryptanalyzed widely deployed ciphers. Greg was program chair of the 1996 and 2000 USENIX Security Symposia, and General Chair of Crypto 2003. Some of his papers and free software are available at https://www.qualcomm.com.au

10:30 a.m.–11:00 a.m.   Break
 

Friday
11:00 a.m.–12:30 p.m.

REFEREED PAPERS
California

Access Control
Session Chair: Tom Limoncelli, Cibernet Corp.

Towards a Deep-Packet-Filter Toolkit for Securing Legacy Resources
James Deverick and Phil Kearns, The College of William and Mary

Administering Access Control in Dynamic Coalitions
Rakesh Bobba, NCSA and University of Illinois at Urbana-Champaign; Serban Gavrila, VDG Inc.; Virgil Gligor, University of Maryland, College Park; Himanshu Khurana, NCSA and University of Illinois at Urbana-Champaign; Radostina Koleva, University of Maryland, College Park

Manage People, Not Userids
Jon Finke, Rensselaer Polytechnic Institute

 

Friday
11:00 a.m.–12:30 p.m.

INVITED TALKS I
San Diego

Session Chair: David N. Blank-Edelman, Northeastern University CCIS

Weblogs, Wikis, and RSS for System Administrators
Jonas Luster, Socialtext, Inc.

MP3 IconListen in MP3 format

Success and minimum hassle for system administrators is ultimately tied to having and providing timely and accurate information. Recently, Weblogs, wikis, and RSS have matured to become useful additions in the ongoing battle to keep everyone and everything effectively informed and efficiently working. Weblogs help to announce and explore projects, policy, and plans between individuals in a group and amongst groups. They narrate a flow. Wikis help to store and evolve documentation, solutions, and designs. RSS ties these and other tools together by providing a method to keep abreast of changes in Weblogs, wikis, issue trackers, and many other systems.

 

Friday
11:00 a.m.–12:30 p.m.

INVITED TALKS II
Golden West
Session Chair: David Williamson, Tellme Networks

Using Your Body for Authentication: A Biometrics Guide for System Administrators
Michael R. Crusoe

MP3 IconListen in MP3 format

Is a face worth a thousand passwords? Have you ever wanted to add a biometric factor to your user authentication but didn't know where to start? This talk will provide a solid introduction to biometrics (the automated recognition of individuals based on their behavioral and biological characteristics) with a wide-ranging discussion of the popular use cases, the five most common biometric modalities (face, fingerprint, iris, hand, and voice), the current state of the biometrics industry, and practical advice and tools for system administrators. Learn about data management, privacy issues, liveness testing, and current standards efforts.

 

Friday
11:00 a.m.–12:30 p.m.

GURU IS IN SESSIONS I
Royal Palms Salon 1/2
Session Chair: Philip Kizer, Texas A&M University

Apache/OpenSSL/DNSSEC
Ben Laurie, The Bunker Secure Hosting

Ben Laurie is the Director of Security at The Bunker Secure Hosting. He is the author of Apache-SSL, as well as serving as an Apache core team and board member and an OpenSSL core team member.

 

Friday
11:00 a.m.–12:30 p.m.

GURU IS IN SESSIONS II
Royal Palms Salon 6
Session Chair: Rudi van Drunen, Leiden Cytology and Pathology Labs

Mac OS X
Jordan Hubbard, Director of UNIX Technology, CoreOS, Apple Computer

Jordan Hubbard is the Director of UNIX Technology, CoreOS, at Apple Computer. He has been a software developer since the late 70's and is a longtime contributor to the open source community, from the earliest days of USENET's comp.sources.unix group, through MIT's X11 contributed software collection, to the FreeBSD Project, which he co-founded in 1993. These days, he focuses on the day-to-day development of Mac OS X and, more generally, on Apple's open source strategy and its relationship with traditional UNIX developers and administrators. His current pet count, for those who follow such things, is 10 cats and 4 dogs.

Friday, 12:30 p.m.–2:00 p.m.   Lunch (on your own)
 

Friday
2:00 p.m.–3:30 p.m.

WORK-IN-PROGRESS REPORTS (WIPS)
California
Session Chair: Esther Filderman, Pittsburgh Supercomputing Center

Short, pithy, and fun, Work-in-Progress reports introduce interesting new or ongoing work. If you have work you would like to share or a cool idea that's not quite ready for publication, send a one- or two-paragraph summary to lisa05wips@usenix.org. We are particularly interested in presenting students' work. A schedule of presentations will be posted at the conference, and the speakers will be notified in advance. Work-in-Progress reports are five-minute presentations; the time limit will be strictly enforced.

 

Friday
2:00 p.m.–3:30 p.m.

INVITED TALKS I
San Diego

Session Chair: William LeFebvre, Independent Consultant

Silly Network Management Tricks
Terry Slattery, Netcordia, Inc.

MP3 IconListen in MP3 format

View the presentation slides

Network management systems have traditionally not delivered on their promise to help network administrators improve networks. There are a number of reasons why, most of them silly. In this somewhat humorous yet serious talk, I'll discuss specific network management approaches that have contributed to the failure of the network management tools that use them. On the serious side, I'll point out how to avoid the silliness and describe what works and why. Bring your own observations of silly network management tricks to liven the discussion during the question and answer session.

 

Friday
2:00 p.m.–3:30 p.m.

INVITED TALKS II
Golden West
Session Chair: Strata Rose Chalup, VirtualNet Consulting

TALK CANCELLED

Thinking Like an Attacker
Steve Bono, Independent Security Evaluators

Is it ethical to train people to break systems? It is certainly necessary. Without being able to think like an attacker it is difficult to design a secure system. Developers and system administrators alike must understand threat models and how their systems may be subverted, before it happens. Knowing why security systems fail, the most common mistakes made by system designers, and critically analyzing how to break your own system design are often overlooked and extraordinarily beneficial practices.

 

Friday
2:00 p.m.–3:30 p.m.

GURU IS IN SESSIONS I
Royal Palms Salon 1/2
Session Chair: Philip Kizer, Texas A&M University

Solaris 10: System/DTrace/Zones/SMF
Bryan Cantrill, Dan Price, and Liane Praza, Sun Microsystems, Inc.

 

Friday
2:00 p.m.–3:30 p.m.

GURU IS IN SESSIONS II
Royal Palms Salon 6
Session Chair: Tom Perrine, Sony Computer Entertainment America

Virtualization
John Arrasjid and John Gannon, VMware

John Y. Arrasjid has 20 years' experience in the computer science field. His experience includes work with companies such as AT&T, Amdahl, 3Dfx Interactive, Kubota Graphics, Roxio, and his own company, WebNexus Communications, where he developed consulting practices and built a cross platform IT team. John is currently a senior member of the VMware Professional Services Organization as a Consulting Architect. John has developed a number of service offerings focused on performance management, security, and disaster recovery and backup. John earned his Computer Science degree at SUNY Buffalo.

John Gannon has over ten years of experience architecting and implementing UNIX, Linux, and Windows infrastructures. John has worked in network engineering, operations, and professional services roles with various organizations including Sun Microsystems, University of Pennsylvania, Scient Corporation, and FOX Sports. John is currently responsible for delivering server consolidation, disaster recovery, and virtual infrastructure solutions to VMware's FORTUNE 500 clients. John received a BS degree in Computer Science Engineering from the University of Pennsylvania.

 

Friday
2:00 p.m.–3:30 p.m.

NEW! HIT THE GROUND RUNNING TRACK
Royal Palms Salon 5
Session Chair: Elizabeth Zwicky, Acuitus

Find out everything you need to know to get started on certificates, network security tools, NFSv4, Mac OS X, and time management. Click here for more information and to view slides of selected presentations.

Friday, 3:30 p.m.–3:45 p.m.   Break
 

Friday
3:45 p.m.–5:30 p.m.

LISA Game Show
Town & Country

Hosts: Rob Kolstad and Dan Klein, USENIX

MP3 IconListen in MP3 format

Once again, closing this year's conference is the LISA Game Show. Join us as attendees face off in a test of technical knowledge and cultural trivia. Want to play? Visit the Membership Booth on Thursday afternoon to pick up the qualifying questionnaire. Fill out and return it by Friday at noon. The top-scoring attendees will meet on-stage for the opportunity to become the reigning "Monarch of the Game Show." Don't miss out on the chance for LISA fame and glory. Oh, and did we mention the fabulous prizes?

?Need help? Use our Contacts page.

Last changed: 19 Oct. 2007 ac