Check out the new USENIX Web site.
Workshop Program | Registration | Hotel Information

All workshop sessions will take place in the Cypress room at the Hyatt Regency Santa Clara unless otherwise noted.

Monday, June 18, 2007

9:30 a.m.–10:30 a.m.  
Keynote Address
20 Years of Crap on the Internet
William Cheswick, AT&T Labs—Research

Though the Internet background radiation is fairly intense these days, you could get a good packet sunburn twenty years ago if you were in the right place. These non-useful packets were port scans, network probes, and the death screams of machines succumbing to attacks on their address-based authentication.

Now, unwanted network traffic is a lot more sophisticated, but I think it's fair to say that most of it was foreseeable. What isn't clear is how one can get rid of it.

Bill Cheswick logged into his first computer in 1968. Seven years later, he was graduated from Lehigh University with a degree resembling Computer Science. Cheswick has worked on (and against) operating system security for over 35 years. Ches joined Bell Labs in 1987, where he became postmaster and firewall administrator. In 1990 he published a paper on firewall design that coined the word "proxy" in its current meaning. He followed this with "An Evening With Berferd," and then the publication of Firewalls and Internet Security: Repelling the Wily Hacker, co-authored with Steve Bellovin. In 1998, Ches starting the Internet Mapping Project with Hal Burch. This work became to core technology of a Bell Labs spin-off, Lumeta Corporation. He joined AT&T Research in April 2007.

10:30 a.m.–11:00 a.m.    Break
11:00 a.m.–noon  
Papers Session

BotTorrent: Misusing BitTorrent to Launch DDoS Attacks
Karim El Defrawy, Minas Gjoka, and Athina Markopoulou, University of California, Irvine
Read the paper in PDF

Boundary Detection and Containment of Local Worm Infections
Diego Zamboni, James Riordan, and Milton Yates, IBM Zurich Research Laboratory
Read the paper in PDF

noon–1:30 p.m.    Workshop Luncheon, Ballroom E/F, Santa Clara Convention Center
1:30 p.m.–3:00 p.m.  
Papers Session

Analyzing Network and Content Characteristics of Spim Using Honeypots
Aarjav J. Trivedi, Paul Q. Judge, and Sven Krasser, Secure Computing Corporation
Read the paper in PDF

A New Service for Increasing the Effectiveness of Network Address Blacklists
Jian Zhang and Phillip Porras, SRI International; Johannes Ullrich, SANS Technology Institute
Read the paper in PDF

Accountability as a Service
Adam Bender, Neil Spring, Dave Levin, and Bobby Bhattacharjee, University of Maryland, College Park
Read the paper in PDF | HTML

3:00 p.m.–3:30 p.m.    Break
3:30 p.m.–5:00 p.m.  
Panel: Why Unwanted Traffic Is a Hard Problem; What New Tools Are Needed?
Panelists: David Cheriton, Professor, Stanford University; Barry Greene, Senior Consultant, Cisco Systems; Craig Labovitz, Director, Network Architecture, Arbor Networks, Inc.

footer
?Need help? Use our Contacts page.

Last changed: 20 June 2007 ch