Check out the new USENIX Web site.

Home About USENIX Events Membership Publications Students
9th USENIX Security Symposium 2000 Technical Pages    

To become a USENIX Member, please see our Membership Information.

9th USENIX Security Symposium
August 14-17, 2000
Denver, Colorado, USA


Wednesday, August 16

OS Security
Session Chair: Dan Wallach, Rice University

MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications
Anurag Acharya and Mandar Raje, University of California at Santa Barbar

A Secure JaveTM Virtual Machine
Leendert van Doorn, IBM T.J. Watson Research Center

Encrypting Virtual Memory
Niels Provos, University of Michigan

Déjà Vu — A User Study: Using Images for Authentication
Rachna Dhamija and Adrian Perrig, University of California at Berkeley

Session Chair: Ian Goldberg, University of California at Berkeley

Publius: A Robust, Tamper-Evident, Censorship-Resistant Web Publishing System
Marc Waldman, New York University; and Aviel D. Rubin and Lorrie Faith Cranor, AT&T Labs — Research

Probabilistic Counting of Large Digital Signature Collections
Markus G. Kuhn, University of Cambridge, U.K.

Can Pseudonymity Really Guarantee Privacy?
Josyula R. Rao and Pankaj Rohatgi, IBM T.J. Watson Research Center

Session Chair: Markus Kuhn, University of Cambridge, U.K.

An Open-Source Cryptographic Coprocessor
Peter Gutmann, University of Auckland, New Zealand

Secure Coprocessor Integration with Kerberos V5
Naomaru Itoi, University of Michigan

Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor
John Scott Robin, U.S. Air Force; and Cynthia E. Irvine, Naval Postgraduate School

Thursday, August 17

Intrusion Detection
Session Chair: Wietse Venema, IBM T.J. Watson Research Center

Detecting and Countering System Intrusions Using Software Wrappers
Calvin Ko, Timothy Fraser, Lee Badger, and Douglas Kilpatrick, NAI Labs

Detecting Backdoors
Yin Zhang, Cornell University; and Vern Paxson, AT&T Center for Internet Research at ICSI

Detecting Stepping Stones
Yin Zhang, Cornell University; and Vern Paxson, AT&T Center for Internet Research at ICSI

Automated Response Using System-Call Delays
Anil Somayaji, University of New Mexico; and Stephanie Forrest, Santa Fe Institute

Network Protection
Session Chair: Tara Whalen, Communications Research Centre, Canada

CenterTrack: An IP Overlay Network for Tracking DoS Floods
Robert Stone, UUNET Technologies, Inc.

A Multi-Layer IPsec Protocol
Yongguang Zhang and Bikramjit Singh, HRL Laboratories, LLC

Defeating TCP/IP Stack Fingerprinting
Matthew Smart, G. Robert Malan, and Farnam Jahanian, University of Michigan

Session Chair: Elizabeth Zwicky, Counterpane Internet Security

A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols
Jonathan Katz, Columbia University; and Bruce Schneier, Counterpane Internet Security, Inc.

PGP in Constrained Wireless Devices
Michael Brown and Donny Cheung, University of Waterloo, Canada; Darrel Hankerson, Auburn University; Julio Lopez Hernandez, State University of Campinas, Brazil, and University of Valle, Colombia; and Michael Kirkup and Alfred Menezes, University of Waterloo, Canada

Shibboleth: Private Mailing List Manager
Matt Curtin, Interhack Corporation

Last changed: 15 Feb. 2003 jel
Conference Index Home