Check out the new USENIX Web site.
Technical Sessions — Thursday, July 7, 2005

8:45 a.m.–9:00 a.m.
Welcome and Introduction (PDF)
Balachander Krishnamurthy, AT&T Labs—Research
9:00 a.m.–10:30 a.m.
DDoS and Worms
Session Chair: Vern Paxson, ICIR/ICSI

Using Routing and Tunneling to Combat DoS Attacks
Adam Greenhalgh, Mark Handley, and Felipe Huici, University College London

Reducing Unwanted Traffic in a Backbone Network
Kuai Xu and Zhi-Li Zhang, University of Minnesota; Supratik Bhattacharyya, Sprint ATL

Analyzing Cooperative Containment of Fast Scanning Worms
Jayanthkumar Kannan, Lakshminarayanan Subramanian, Ion Stoica, and Randy H. Katz, University of California, Berkeley

Discussion (PDF)
Discussant: Vern Paxson, ICIR/ICSI

10:30 a.m.–10:45 a.m.   Break
10:45 a.m.–11:45 a.m.
Spam-1
Session Chair: Paul Vixie, ISC

Push vs. Pull: Implications of Protocol Design on Controlling Unwanted Traffic
Zhenhai Duan and Kartik Gopalan, Florida State University; Yingfei Dong, University of Hawaii

Detecting Spam in VoIP Networks
Ram Dantu and Prakash Kolan, University of North Texas, Denton

11:45 a.m.–1:00 p.m.   Lunch on the terrace
1:00 p.m.–2:30 p.m.
Bots and Spoofed Sources
Session Chair: Chris Morrow, UUNET

The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets
Evan Cooke, University of Michigan; Farnam Jahanian, University of Michigan and Arbor Networks; Danny McPherson, Arbor Networks

An Architecture for Developing Behavioral History
Mark Allman, International Computer Science Institute; Ethan Blanton, Purdue University; Vern Paxson, International Computer Science Institute

The Spoofer Project: Inferring the Extent of Internet Source Address Filtering on the Internet
Robert Beverly and Steve Bauer, MIT

Discussion (PDF)
Discussant: Chris Morrow, UUNET

2:30 p.m.–2:45 p.m.   Break
2:45 p.m.–3:45 p.m.
Adaptive Defense Systems
Session Chair: Dina Katabi, MIT

Stress Testing Traffic to Infer Its Legitimacy
Nick Duffield and Balachander Krishnamurthy, AT&T Labs—Research

Adaptive Defense Against Various Network Attacks
Cliff C. Zou, University of Massachusetts; Nick Duffield, AT&T Labs—Research; Don Towsley and Weibo Gong, University of Massachusetts

Discussion (PDF)
Discussant: Dina Katabi, MIT

3:45 p.m.–4:00 p.m.   Break
4:00 p.m.–5:30 p.m.
Spam-2 and Encryption
Session Chair: Steve Bellovin, Columbia University

HoneySpam: Honeypots Fighting Spam at the Source
Mauro Andreolini, Alessandro Bulgarelli, Michele Colajanni, and Francesca Mazzoni, Università di Modena e Reggio Emilia

Improving Spam Detection Based on Structural Similarity
Luiz H. Gomes, Fernando D. O. Castro, Virgílio A. F. Almeida, Jussara M. Almeida, and Rodrigo B. Almeida, Universidade Federal de Minas Gerais; Luis M. A. Bettencourt, Los Alamos National Laboratory

Lightweight Encryption for Email
Ben Adida, Susan Hohenberger, and Ronald L. Rivest, MIT

?Need help? Use our Contacts page.

Last changed: 18 Aug. 2005 ch