Check out the new USENIX Web site. Security '98 Symposium
 
Wednesday, January 28 - Thursday, January 29    Symposium Speakers

Technical Program   Wednesday, January 28, 1998
 
 9:00am - 10:30am
 
Opening Remarks
Avi Rubin, AT&T Labs - Research
 
 
Keynote Address: Security Lessons From All Over
Bill Cheswick, Lucent Technologies, Bell Labs
From a security viewpoint, there is little new about the Internet. The same security rules apply to the Internet, castles, walls, and even the immune system. We will explore a number of security lessons from many sources.

Bill Cheswick logged into his first computer in 1969 and has worked on operating system security for more than 25 years. Since joining Bell Laboratories in 1987, he has worked on network security, PC viruses, mailers, the Plan 9 operating system, and kernel hacking. With Steve Bellovin, he co-authored the first full book on Internet security, Firewalls and Internet Security, Repelling the Wily Hacker. Cliff Stoll has called Ches "one of the seven avatars of the Internet." Ches's current work includes various Internet munitions, a new edition of the book, and maybe a way to hunt down anonymous denial-of-service attacks.

 

10:30am - 11:00am     Break


11:00am - Noon
REFEREED PAPERS TRACK
Architecture
Session Chair: Steve Bellovin, AT&T Labs - Research

A Comparison of Methods for Implementing Adaptive Security Policies
Brian Loe and Michael Carney, Secure Computing Corporation

The CRISIS Wide Area Security Architecture
Eshwar Belani, Amin Vahdat, Thomas E. Anderson, Michael Dahlin, University of California at Berkeley

  INVITED TALKS TRACK
The Security Product Market: Trends and Influences
Marcus Ranum, Network Flight Recorder, Inc.

The computer security products market is expected to grow from a $100m/year market in 1995 to a $1b/year market by the year 2000. Such a magnitude in growth will trigger major changes in the industry. I will outline the main factors influencing different aspects of the security products market, and describe how those factors are likely to direct product and technology trends.


Noon - 1:30pm     Lunch (on your own)


1:30pm - 3:30pm
REFEREED PAPERS TRACK
Intrusion Detection
Session Chair: Mike Reiter, AT&T Labs - Research

Bro: A System for Detecting Network Intruders in Real-Time
Vern Paxson, Lawrence Berkeley National Laboratory

Cryptographic Support for Secure Logs on Untrusted Machines
Bruce Schneier and John Kelsey, Counterpane Systems

StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
Crispan Cowan, Oregon Graduate Institute

Data Mining Approaches for Intrusion Detection
Wenke Lee and Salvatore J. Stolfo, Columbia University

  INVITED TALKS TRACK
Panel: Computer Security and Legal Liability
Moderator: Steve Bellovin, AT&T Labs - Research

Because of buggy, vendor-supplied software, someone breaks into your site and causes damage. Who is liable? You? The hacker? The vendor? Some real live lawyers will try to answer this question.

Panelists: Ed Cavazos, Interliant Corporation Others to be announced.


3:30pm - 4:00pm     Break


4:00pm - 5:30pm
REFEREED PAPERS TRACK
Network Security
Session Chair: Dave Balenson, Trusted Information Systems

Securing Classical IP Over ATM Networks
Carsten Benecke and Uwe Ellermann, Universitaet Hamburg, Fachbereich Informatik

A Java Beans Component Architecture for Cryptographic Protocols
Pekka Nikander and Arto Karila, Helsinki University of Technology

Secure Videoconferencing
Peter Honeyman, Andy Adamson, Kevin Coffman, Janani Janakiraman, Rob Jerdonek, and Jim Rees, CITI, University of Michigan

  INVITED TALKS TRACK
Factoring: Facts and Fables
Arjen K. Lenstra, Citibank, N.A.

In theory, the security of most Public Key Cryptosystems is based on the assumption that a number theoretical problem (such as integer factorization or computing discrete logarithms) is hard. In practice, when using Public Key Cryptosystems to secure Internet traffic for instance, the situation is not so clear. In this talk I will discuss various security assumptions and I will show how our credulity may lead to interesting business opportunities.

Wednesday, January 28 - Thursday, January 29    Symposium Speakers
 


Symposium at-a-Glance - Tutorials - Technical Program - Registration -
About Symposium Speakers - Symposium Info - Hotel & Travel Info - Security 98 brochure HOME
Symposium Index
Events Calendar
USENIX home