Check out the new USENIX Web site.
2001 USENIX Annual Technical Conference, June 25-30, 2001, Boston, MA
Conference Home At a Glance Register/Hotel Tutorials Tech Sessions FREENIX Exhibition Organizers Activities/BoFs

Technical Sessions: Thurs., June 28 | Fri., June 29 | Sat., June 30 | All in one file | FREENIX only

Refereed Paper Proceedings: General Session | Freenix Track

NEW SCHEDULE FORMAT: The Technical Sessions are Thursday - Saturday this year and include:

Check out the current Guru is In Schedule!
THURSDAY, JUNE 28, 2001    Friday | Saturday
9:00 am - 10:30 am   (Salon E/F)

Opening Remarks, Awards, and Keynote

Photo of Frye Keynote Address: Linux: A Strategic Disruptive Force
Daniel D. Frye, Director of IBM Linux Technology Center

In much the same way that the Internet is a disruptive technology that has changed the way people live and work, Linux is a disruptive technology that will change the way people run their businesses. Linux is paving the way for e-business much like the Internet did, having as much impact as did electricity, phones, and faxes. Linux will make Internet business applications ubiquitous. No one vendor will be able to lock customers into buying specific hardware that runs specific applications. Software developers will be able to dramatically accelerate market access for the applications they write as they will readily run on any type of hardware. Moreover, increasing reliance on de facto standards produced by open source will fundamentally change the relationship between IT customers and IT suppliers.

10:30 am - 11:00 am   Break
11:00 am - 12:30 pm

Salon F

Operating Systems
Session Chair: Margo Seltzer, Harvard University

Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor
Jeremy Sugerman, Ganesh Venkitachalam, and Beng-Hong Lim, VMware Inc.

Magazines and Vmem: Extending the Slab Allocator to Many CPUs and Arbitrary Resources
Jeff Bonwick, Sun Microsystems, and Jonathan Adams, California Institute of Technology

Measuring Thin-Client Performance Using Slow-Motion Benchmarking
S. Jae Yang, Jason Nieh, and Naomi Novik, Columbia University

Salon E

Making the Internet Mobile: Lessons from the Wireless Application Protocol (WAP)
Sandeep Singhal, ReefEdge Inc.

Wireless operators around the world are deploying mobile Internet services based on the Wireless Application Protocol, a new suite of protocols and content formats tailored to the limited bandwidth, screen sizes, and input capabilities found in mobile devices. This talk will describe how the WAP protocols and content formats meet the challenge of extending the Internet to mobile devices and will place them in context with other emerging technologies. The talk will conclude with a discussion of the future of WAP.

Salon G

Mac Security
Session Chair: Dan Geer, @stake, Inc.

LOMAC: MAC You Can Live With
Timothy Fraser, NAI Labs

TrustedBSD: Adding Trusted Operating System Features to FreeBSD
Robert N. M. Watson, FreeBSD Project, NAI Labs

Integrating Flexible Support for Security Policies into the Linux Operating System
Peter Loscocco, NSA, and Stephen Smalley, NAI Labs

12:30 pm - 2:00 pm   Lunch (on your own)
2:00 pm - 3:30 pm

Salon F

Session Chair: Dan Wallach, Rice University

An Architecture for Secure Generation and Verification of Electronic Coupons
Rahul Garg, Parul Mittal, Vikas Agarwal, and Natwar Modani, IBM India Research Lab

Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML
Don Davis, Shym Technology

Unifying File System Protection
Christopher A. Stein, Harvard University; John H. Howard, Sun Microsystems; and Margo I. Seltzer, Harvard University

Salon E

Evolution of the Internet Core and Edge: IP Wireless Networking
Jim Bound, Nokia Networks, and Charles E. Perkins, Nokia Research Center

We discuss IP wireless and mobile computing, which are likely to once again revolutionize the Internet. The Internet core infrastructure and edge architecture will be affected, including adaptations to IP itself. New features and services will be installed to support billions of IP mobile nodes carried by home users, embedded devices, and professionals. Finally, we describe the evolution and integration of these new technologies into the existing Internet.

Salon G

Session Chair: Erez Zadok SUNY at Stony Brook

A Practical Scripting Environment for Mobile Devices
Brian Ward, University of Chicago

Nickle: Language Principles and Pragmatics
Bart Massey, Portland State University, and Keith Packard, SuSE Inc.

The Design and Implementation of the NetBSD rc.d System
Luke Mewburn, Wasabi Systems, Inc.

3:30 pm - 4:00 pm   Break
4:00 pm - 5:30 pm

Salon F

Storage I
Session Chair: Greg Ganger, Carnegie Mellon Univ.

The Multi-Queue Replacement Algorithm for Second Level Buffer Caches
Yuanyuan Zhou and James Philbin, NEC Research Institute; and Kai Li, Princeton University

Design and Implementation of a Predictive File Prefetching Algorithm
Thomas M. Kroeger, Nokia Clustered IP Solutions, and Darrell D. E. Long, University of California, Santa Cruz

Extending Heterogeneity to RAID Level 5
T. Cortes and J. Laborta, Universitat Politècnica de Catalunya

Salon E

Security Aspects of Napster and Gnutella
Steven M. Bellovin, AT&T Labs--Research

Napster and Gnutella have attracted a great deal of attention because of their implications for (and conflicts with) copyright law, but they have much broader implications for network security. I recently analyzed both protocols, focusing on issues such as possible new attacks, traceability of behavior, and privacy. Both raise interesting questions, especially Gnutella.

Salon G

User Space
Session Chair: Alan Nemeth, Compaq

User-Level Checkpointing for LinuxThreads Programs
William R. Dieter and James E. Lumpp, Jr., University of Kentucky

Building an Open-source Solaris-compatible Threads Library
John Wood, Compaq Computer UK Ltd

Are Mallocs Free of Fragmentation?
Aniruddha Bohra, Rutgers University, and Eran Gabber, Lucent Technologies–Bell Labs

FRIDAY, JUNE 29, 2001    Thursday | Saturday
9:00 am - 10:30 am

Salon E

Security for E-Voting in Public Elections
Avi Rubin, AT&T Labs--Research

In this talk I will discuss the security considerations for remote electronic voting in public elections. In particular, I'll examine the feasibility of running national federal elections over the Internet. The focus of this talk is on the limitations of the current deployed infrastructure in terms of the security of the hosts and the Internet itself. I will conclude that at present, our infrastructure is inadequate for remote Internet voting.

Salon G

User Environment
Session Chair: Ken Coar, The Apache Software Foundation/IBM

Sandboxing Applications
Vassilis Prevelakis, University of Pennsylvania, and Diomidis Spinellis, Athens University

Building a Secure Web Browser
Sotiris Ioannidis, University of Pennsylvania, and Steven M. Bellovin, AT&T Labs–Research

Citrus Project: True Multilingual Support for BSD Operating Systems
Jun-ichiro itojun Hagino, Internet Initiative Japan Inc.

10:30 am - 11:00 am   Break
11:00 am - 12:30 pm

Salon F

Session Chair: Yoonho Park, ReefEdge, Inc.

Reverse-Engineering Instruction Encodings
Wilson Hsieh, University of Utah; Dawson Engler, Stanford University; and Godmar Back, University of Utah

An Embedded Error Recovery and Debugging Mechanism for Scripting Language Extensions
David M. Beazley, University of Chicago

Interactive Simultaneous Editing of Multiple Text Regions
Robert C. Miller and Brad A. Myers, Carnegie Mellon University

Salon E

Online Privacy: Promise or Peril?
Lorrie Faith Cranor, AT&T Labs--Research

This talk will discuss the privacy concerns raised by online data-collection practices, as well as the efforts to address these concerns through laws, self-regulation, and technology. The talk will focus on the emerging Platform for Privacy Preferences (P3P) standard. P3P-enabled Web sites make statements about how they handle user data available in a machine-readable (XML) format. P3P-enabled browsers can "read" these statements automatically and compare them to the user's privacy preferences.

Salon G

Session Chair: Drew Gallatin, Duke/FreeBSD

KQueue–A Generic and Scalable Event Notification Facility
Jonathan Lemon, FreeBSD Project

Improving the FreeBSD SMP Implementation
Greg Lehey, IBM LTC Ozlabs

Page Replacement in Linux 2.4 Memory Management
Rik van Riel, Conectiva Inc.

12:30 pm - 2:00 pm   Lunch in the Exhibit Hall (free pizza and sodas!)
2:00 pm - 3:30 pm

Salon F

Web Servers
Session Chair: Mohit Aron, Zambeel Inc.

High-Performance Memory-Based Web Servers: Kernel and User-Space Performance
Philippe Joubert, ReefEdge Inc.; Robert King, IBM Research; Richard Neves, ReefEdge Inc.; Mark Russinovich, Winternals Software; and John Tracey, IBM Research

Kernel Mechanisms for Service Differentiation in Overloaded Web Servers
Thiemo Voigt, Swedish Institute of Computer Science; Renu Tewari and Douglas Freimuth, IBM T.J. Watson Research Center; and Ashish Mehra, iScale Networks

Storage Management for Web Proxies
Elizabeth Shriver and Eran Gabber, Bell Labs; Lan Huang, SUNY Stony Brook; and Christopher A. Stein, Harvard University

Salon E

Getting to Grips with Secure DNS
Jim Reid, Nominum, Inc.

Secure DNS (DNSSEC) has been developed as a way of validating the data in the DNS and preventing spoofing attacks. The protocol uses public-key cryptography to digitally sign DNS traffic. This talk explains the new resource records that have been added to the DNS and how to use the tools in BIND9 that are provided for creating and maintaining signed zones. The practical and operational problems of deploying DNSSEC, notably key management, will also be discussed.

Salon G

Session Chair: Clem Cole, Paceline Systems Corp.

User-Level Extensibility in the Mona File System
Paul W. Schermerhorn, Robert J. Minerick, Peter Rijks, and Vincent W. Freeh, University of Notre Dame

Volume Managers in Linux
David Teigland and Heinz Mauelshagen, Sistina Software, Inc.

The Design and Implementation of a Transparent Cryptographic File System for UNIX
Giuseppe Cattaneo, Luigi Catuogno, Aniello Del Sorbo, and Pino Persiano, Università di Salerno

3:30 pm - 4:00 pm   Break
4:00 pm - 5:30 pm

Salon F

Work-in-Progress Reports
Session Chair: Greg Ganger, Carnegie Mellon University

Short, pithy, and fun, Work-in-Progress reports introduce interesting new or ongoing work. If you have work you would like to share or a cool idea that's not quite ready for publication, send a one- or two-paragraph summary to We are particularly interested in presenting students' work. A schedule of presentations will be posted at the conference, and the speakers will be notified in advance. Work-in-Progress reports are five-minute presentations; the time limit will be strictly enforced.

Salon E

Active Content: Really Neat Technology or Impending Disaster?
Charlie Kaufman, Iris Associates

From Java-enabled Web pages to self-extracting zip files, the world has become addicted to active content. This powerful technique improves data compression, CPU and network efficiency, and interactive user interfaces. The price? It's nearly impossible to make secure. This talk discusses surprising places we use active content, the security threats we are ignoring, and what we as individuals and as a community can do about it.

Salon G

Work-in-Progress Reports
Session Chair: Greg Ganger, Carnegie Mellon University

See the General Track (column 1) for a description of this shared session.

SATURDAY, JUNE 30, 2001    Thursday | Friday
9:00 am - 10:30 am

Salon F

Session Chair: Sheila Harnett, IBM Linux Technology Center

Pragmatic Nonblocking Synchronization for Real-Time Systems
Michael Hohmuth and Hermann Härtig, Dresden University of Technology

Scalability of Linux Event-Dispatch Mechanisms
Abhishek Chandra, University of Massachusetts, Amherst, and David Mosberger, HP Labs

Virtual-Time Round-Robin: An O(1) Proportional Share Scheduler
Jason Nieh, Chris Vaill, and Hua Zhong, Columbia University

Salon E

Myths, Missteps, and Folklore in Protocol Design
Radia Perlman, Sun Microsystems Laboratories

Network protocol design is not a nice, clean science, where what gets deployed is the best possible design. Instead, designs are influenced by issues such as politics, general confusion, and backward compatibility. Statements get repeated until it never occurs to anyone to question whether they're true. This talk discusses how some of the odder things we live with (e.g., bridges, SNAP encoding) came about, some common mistakes that have been made, and what really should matter when evaluating two competing designs. It's intended to make you question your assumptions.

Salon G

Session Chair: Garry Paxinos, Metro Link/XFree86

Design and Implementation of the X Rendering Extension
Keith Packard, XFree86 Core Team, SuSE Inc.

Scwm: An Extensible Constraint-Enabled Window Manager
Greg J. Badros,; Jeffrey Nichols, Carnegie Mellon University; and Alan Borning, University of Washington

The X Resize and Rotate
Extension –RandR

Jim Gettys, Compaq, and Keith Packard, XFree86 Core Team, SuSE Inc.

10:30 am - 11:00 am   Break
11:00 am - 12:30 pm

Salon F

Storage II
Session Chair: Carla Ellis, Duke University

A Toolkit for User-Level File Systems
David Mazières, NYU

Charm: An I/O-Driven Execution Strategy for High-Performance Transaction Processing
Lan Huang and Tzi-cker Chiueh, State University of New York at Stony Brook

Fast Indexing: Support for Size-Changing Algorithms in Stackable File Systems
Erez Zadok, SUNY Stony Brook; Johan M. Andersen, Ion Badulescu, and Jason Nieh, Columbia University

Salon E

Strangely Enough, It All Turns Out Well (Adventures in Venture-Backed Startups and Microsoft Acquisitions)

Stephen R. Walli, Microsoft Corp.

Building and running a software startup is an exciting and wild ride. Six founders started Softway Systems in September 1995. Before Microsoft acquired it, Softway had taken four rounds of venture capital, built itself to almost forty people, had some brilliant successes and painful failures, and come close to being acquired several times by some surprising players. This talk on the start-up experience describes what it took, what worked, and what failed, from bootstrap excitement to acquisition angst (and assimiliation).

Salon G

Securing Networks
Session Chair: Ted Faber, ISI/USC

MEF, Malicious Email Filter–A UNIX Mail Filter That Detects Malicious Windows Executables
Matthew G. Schultz and Eleazar Eskin, Columbia University; Erez Zadok, SUNY Stony Brook; and Manasi Bhattacharyya and Salvatore J. Stolfo, Columbia University

Cost Effective Security Small Businesses
Sean R. Brown, Applied Geographics, Inc.

Heimdal and Windows 2000 Kerberos–How to Get Them to Play Together
Assar Westerlund, Swedish Institute of Computer Science, and Johan Danielsson, Center for Parallel Computers, KTH

12:30 pm - 2:00 pm   Lunch (on your own)
2:00 pm - 3:30 pm

Salon F

Session Chair: Robert Miller, Carnegie Mellon University

Payload Caching: High-Speed Data Forwarding for Network Intermediaries
Kenneth Yocum and Jeffrey Chase, Duke University

A Waypoint Service Approach to Connect Heterogeneous Internet Address Spaces
T. S. Eugene Ng, Ion Stoica, and Hui Zhang, Carnegie Mellon University

Flexible Control of Parallelism in a Multiprocessor PC Router
Benjie Chen and Robert Morris, Massachusetts Institute of Technology

Salon E

The Future of Virtual Machines: A VMware Perspective
Ed Bugnion, VMware, Inc.

The virtual-machine concept goes back to 1960s mainframes. It has since been applied to executing legacy environments and to Java. Today, VMware products allow multiple complete operating systems, from Linux to Windows, to run concurrently on Intel computers. This talk shows how virtual machines, which offer compatibility, isolation, encapsulation, and mobility, can solve current problems from desktops to data centers, and how this return to virtual machines may affect hardware and operating system trends.

Salon G

Resource Management
Session Chair: Theodore Ts'o, VA Linux Systems

Predictable Management of System Resources
for Linux

Mansoor Alicherry, Bell Labs, and K. Gopinath, Indian Institute of Science

Scalable Linux Scheduling
Stephen Molloy and Peter Honeyman, CITI–University of Michigan

A Universal Dynamic Trace for Linux and Other Operating Systems
Richard J. Moore, IBM, Linux Technology Centre

3:30 pm - 4:00 pm   Break
4:00 pm - 5:00 pm   (Salon E)

Special Closing Session

Cynthia Breazeal , MIT Media Lab, and her robot, Kismet
Kismet, created through Breazeal's research at MIT Media Labs, is a robot that can duplicate human facial expressions.

5:15 pm - 6:45 pm   (Salon G)

Quiz Show with your host, Rob Kolstad

Back by popular demand, Rob Kolstad hosts this challenging test of wits for USENIX attendees. Watch contestants wither under the dual spotlights of difficult questions and special attention of the moderator.

?Need help? Use our Contacts page.
Last changed: 29 June 2001 jr
USENIX '01 Home
Events calendar