Check out the new USENIX Web site.
2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI '06)
SRUTI '06 Home | Workshop Program | Registration | Hotel Information

Thursday, July 6, 2006

5:30 p.m.–7:00 p.m.    Plaza (outdoor) Thursday
Welcome Reception
Friday, July 7, 2006

9:15 a.m.–10:15 a.m.     San Jose Room Friday
Invited Talk
Rob Thomas, Team Cymru

10:15 a.m.–10:45 a.m.    Break
10:45 a.m.–noon    San Jose Room Friday
Papers

The Rising Tide: DDoS from Defective Designs and Defaults
Richard Clayton, University of Cambridge, Computer Laboratory

Efficient and Secure Source Authentication with Packet Passports
Xin Liu and Xiaowei Yang, University of California, Irvine; David Wetherall and Thomas Anderson, University of Washington

Cookies Along Trust-Boundaries (CAT): Accurate and Deployable Flood Protection
Martin Casado, Stanford University; Aditya Akella, University of Wisconsin, Madison; Pei Cao, Stanford University; Niels Provos, Google; Scott Shenker, University of California, Berkeley, and ICSI

Noon–1:15 p.m.    Workshop Luncheon    Silver Creek Patio (outdoor)
1:15 p.m.–2:30 p.m.    San Jose Room Friday
Papers

Separating Wheat from the Chaff: A Deployable Approach to Counter Spam
Youngsang Shin, Minaxi Gupta, and Rob Henderson, Indiana University; Aaron Emigh, Radix Labs

Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting
Yi-Min Wang and Doug Beck, Microsoft Research, Redmond; Jeffrey Wang, PCRethinking.com; Chad Verbowski and Brad Daniels, Microsoft Research, Redmond

Tracking the Role of Adversaries in Measuring Unwanted Traffic
Mark Allman, ICSI; Paul Barford, University of Wisconsin; Balachander Krishnamurthy and Jia Wang, AT&T Labs—Research

2:30 p.m.–3:00 p.m.    Break
3:00 p.m.–4:15 p.m.    San Jose Room Friday
Papers

An Algorithm for Anomaly-based Botnet Detection
James R. Binkley and Suresh Singh, Portland State University

Revealing Botnet Membership Using DNSBL Counter-Intelligence
Anirudh Ramachandran, Nick Feamster, and David Dagon, Georgia Institute of Technology

Leveraging Good Intentions to Reduce Malicious Network Traffic
Marianne Shaw, University of Washington

4:15 p.m.–4:30 p.m.    Break
4:30 p.m.–5:30 p.m.    San Jose Room Friday
Panel: Real-World Experience

footer
?Need help? Use our Contacts page.

Last changed: 11 August 2006 ljc