SECURITY '04 PRELIMINARY PROGRAM Current as of April 12, 2004 ---------------------------------------- Please check back for the final program ---------------------------------------- *** Monday, 9 August 2004: Tutorials *** Network Security Monitoring with Open Source Tools Tutor: Richard Bejtlich, TaoSecurity Intrusion Detection and Prevention Systems Tutor: Marcus Ranum, Trusecure Corp. Network Security Protocols: Theory and Current Standards Tutor: Radia Perlman, Sun Microsystems Network Security Profiles: Recognizing Protocol Threats, Intrusion Classes, and How Hackers Find Exploits Tutor: Brad C. Johnson, SystemExperts Corporation *** Tuesday, 10 August 2004: Tutorials *** Building a Software Security Capability: How to Foster Best Practices in Software Security Tutor:Gary McGraw, Cigital System Log Aggregation, Statistics, and Analysis Tutor: Marcus Ranum, Trusecure Corp. Network Security Assessments Workshop Tutor: David Rhoades, Maven Security Consulting Inc. Malicious Cryptography Tutor: Moti Yung, Columbia University *** Wednesday, 11 August 2004: Technical Sessions *** 9:00-10:30 a.m.: Welcome, Awards, and Keynote: Back to the Future William "Earl" Boebert, Sandia National Laboratory 11:00 a.m.-12:30 p.m. Invited Talks Track RFID: Security and Privacy for Five-Cent Computers Ari Juels, Principal Research Scientist, RSA Laboratories Refereed Papers Track Attack Containment Chair: Angelos Keromytis A Virtual Honeypot Framework Niels Provos, Google Inc Collapsar: A VM-Based Architecture for Network Attack Detention Center Xuxian Jiang and Dongyan Xu, Purdue University Very Fast Containment of Scanning Worms Nicholas Weaver, International Computer Science Institute; Stuart Staniford, Silicon Defense; Vern Paxson, International Computer Science Institute and Lawrence Berkeley National Laboratory 2:00 p.m.-3:30 p.m. Invited Talks Track Fighting Computer Virus Attacks Peter Szor, Chief Researcher, Symantec Corporation Refereed Papers Track Panel: Capture the Flag 4:00 p.m.-5:30 p.m. Invited Talks Track I Voted? How the Law Increasingly Restricts Independent Security Research Cindy Cohn, Legal Director, Electronic Frontier Foundation Refereed Papers Track Protecting Software I Chair: Sotiris Ioannidis TIED, LibsafePlus: Tools for Dynamic Buffer Overflow Protection Kumar Avijit, Prateek Gupta, and Deepak Gupta, IIT Kanpur Privtrans: Automatically Partitioning Programs for Privilege Separation David Brumley and Dawn Song, Carnegie Mellon University Avfs: An On-Access Anti-Virus File System Yevgeniy Miretskiy, Abhijith Das, Charles P. Wright, and Erez Zadok, Stony Brook University *** Thursday, 12 August 2004: Technical Sessions *** 9:00 a.m.-10:30 a.m. Invited Talks Track Military Strategy in CyberSpace Stuart Staniford, Nevis Networks Refereed Papers Track Protecting Software II Chair: Adrian Perrig Side Effects Are Not Sufficient to Authenticate Software Umesh Shankar, Monica Chew, and J.D. Tygar, UC Berkeley On Gray-Box Program Tracking for Anomaly Detection Debin Gao, Michael K. Reiter, and Dawn Song, Carnegie Mellon University Finding User/Kernel Pointer Bugs with Type Inference Rob Johnson and David Wagner, UC Berkeley 11:00 a.m.-12:30 p.m. Invited Talks Track TBA Refereed Papers Track The Human Interface Chair: Greg Rose Graphical Dictionaries and the Memorable Space of Graphical Passwords Julie Thorpe and Paul van Oorschot, Carleton University On User Choice in Graphical Password Schemes Darren Davis and Fabian Monrose, Johns Hopkins University; Michael K. Reiter, Carneige Mellon University Design of the EROS Trusted Window System Jonathan S. Shapiro, John Vanderburgh, and Eric Northup, Johns Hopkins University; David Chizmadia, Promia Inc. 2:00 p.m.-3:30 p.m. Invited Talks Track Exploiting Software Gary McGraw Refereed Papers Track Panel: Patch Management Moderator: Patrick McDaniel, AT&T Research Panelists: Crispin Cowan, Immunix; Bob Cowles, Stanford Linear Accelerator; Eric Schultz Much of the damage caused by contemporary viruses and worms is preventable. Administrators can minimize the effects of malicious code if they apply available software patches. Given the obvious payoff of applying patches in current operating systems, why are so many systems still vulnerable? This panel will explore the the complexities and dangers of patch management in current network environments. Panel members will describe their own experiences in dealing with patches and propose solutions for future of vulnerability patching. 4:00 p.m.-6:00 p.m. Invited Talks Track What Biology Can (and Can't) Teach Us About Security David Evans, University of Virginia Refereed Papers Track Security Engineering Chair: Carl Ellison Copilot, a Coprocessor-based Kernel Runtime Integrity Monitor Nick L. Petroni, Jr., Timothy Fraser, Jesus Molina, William A. Arbaugh, University of Maryland Fixing Races for Fun and Profit Drew Dean, SRI International; Alan Hu, University of British Columbia Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute Dirk Balfanz, Glenn Durfee, Rebecca E. Grinter, Diana K. Smetters, and Paul Stewart, PARC Design and Implementation of a TCG-based Integrity Measurement Architecture Reiner Sailer, Xiaolan Zhang, Hawthorne, NY), Trent Jaeger, and Leendert van Doorn, IBM T. J. Watson Research Center *** Friday, 13 August 2004: Technical Sessions *** 9:00 a.m.-10:30 a.m. Invited Talks Track Nuclear Weapons, Permissive Action Links, and the History of Public Key Cryptography Steve Bellovin Refereed Papers Track Forensics and Response Chair: Niels Provos Privacy-Preserving Sharing and Correlation of Security Alerts Patrick Lincoln, Phillip Porras, and Vitaly Shmatikov, SRI Static Disassembly of Obfuscated Binaries Christopher Kruegel, William Robertson, Fredrik Valeur, and Giovanni Vigna, UC Santa Barbara Autograph: Toward Automated, Distributed Worm Signature Detection Hyang-Ah Kim, Carnegie Mellon University, and Brad Karp, Intel Research and Carnegie Mellon University 11:00 a.m.-12:30 p.m. Invited Talks Track TBA Refereed Papers Track Data Privacy Chair: William Aiello Fairplay: A Secure Two-Party Computation System Dahlia Malkhi and Noam Nisan, Hebrew University; Benny Pinkas, HP Labs; Yaron Sella, Hebrew University Tor: The Second-Generation Onion Router Roger Dingledine and Nick Mathewson, The Free Haven Project; Paul Syverson, Naval Research Lab Understanding Data Lifetime via Whole System Simulation Jim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, and Mendel Rosenblum, Stanford University 2:00 p.m.-4:00 p.m. Work-in-Progress Reports Chair: Erez Zadok Closing Remarks