Check out the new USENIX Web site. 梦见眼镜蛇是什么预兆| 牙龈无缘无故出血是什么原因| 手腕比喻什么| 舌苔白色是什么原因| 紫外线过敏什么症状| 夏字五行属什么| 锦州有什么大学| 逃之夭夭是什么意思| 啰嗦是什么意思| 长结节是什么原因造成的| 烟酒不沾的人什么性格| 天天喝啤酒对身体有什么危害| 女生排卵期有什么症状| 支气管炎是什么| 用膳是什么意思| 放纵什么意思| 天使长什么样| 血管瘤是什么引起的| 什么烟最好抽| 翻身是什么意思| 白天不懂夜的黑是什么意思| 秽是什么意思| 清明节什么时候| 鲁冰花是什么花| 脑梗用什么药| 结肠炎吃什么食物好| 闭经是什么意思| 77是什么意思| 水瓶座男生喜欢什么样的女生| mmhg是什么单位| 甘油三酯吃什么药| 亚麻跌是什么意思| 桃李满天下的桃李是什么意思| 伤残鉴定什么时候做| 圆脸适合剪什么发型| 人生最重要的是什么| 头晕应该挂什么科| 石斛是什么东西| 什么情况下吃奥司他韦| 贫血不能吃什么| 34是什么意思| 书的五行属性是什么| 眼睛干涩有异物感用什么眼药水| pure什么意思| 梦见蟒蛇是什么意思| 秋天穿什么衣服| 脑血栓什么症状| 海东青是什么鸟| 股骨径是指胎儿什么| egm是什么意思| 打喷嚏流清鼻涕吃什么药| 单核细胞高是什么原因| 粉丝是什么意思| 人体缺甲是什么症状| ojbk 是什么意思| 蚊子最怕什么味道| 急性扁桃体炎什么原因导致的| 什么是物理防晒| 应该说什么| 颈椎挂什么科| 被舔下面是什么感觉| 舌头起泡什么原因| 87年属于什么生肖| 阳虚什么症状| 运钞车是什么车| 四面弹是什么面料| prp是什么| 神经衰弱是什么病| 出尔反尔是什么意思| 终结者是什么意思| 六个坚持是什么| imax电影是什么意思| 右脸麻木是什么原因| 胰腺在人体起什么作用| 嘴角开裂是什么原因| 桃花眼是什么意思| 飞机加什么油| 一月是什么月| 司马光和司马迁是什么关系| 生肖狗和什么生肖相冲| 麝香对孕妇有什么危害性| 阴虚火旺吃什么食物| 香茅是什么东西| 飞蚊症用什么滴眼液| 什么生日的人有佛缘| 大拇指旁边的手指叫什么| 什么人不能喝蜂蜜| hm什么牌子| 猪筒骨配什么炖汤好| 什么叫主动脉硬化| cn是什么意思啊| 生米煮成熟饭是什么意思| 曼月乐是什么| 刮痧用的油是什么油| 腰椎间盘突出吃什么好| 蛋白质是什么意思| 呋喃硫胺片治什么病| 甲醛是什么东西| 既寿永昌什么意思| 搀扶什么意思| 吃什么补蛋白质最快| 保拉纳啤酒什么档次| 小腿发黑是什么原因| 仓鼠是什么动物| 打喷嚏流鼻涕属于什么感冒| 12月7号什么星座| 胰腺管扩张是什么原因| 211和985什么意思| 骑马挥杆是什么牌子| 列装是什么意思| 汤圆和元宵有什么区别| au750是什么材质| 醋泡脚有什么好处和坏处| 乌鸦反哺是什么意思| 一直呕吐是什么原因| 西安香烟有什么牌子| 例假一个月来两次是什么原因| 富字五行属什么| 廾是什么意思| 为什么耳屎是湿的| iphone的i是什么意思| 妈祖是什么意思| 刘备是什么样的人| 红枣有什么功效| 司法警察是做什么的| 没有子宫会有什么影响| 什么是地包天牙齿| ysl是什么品牌| 黄连膏有什么功效和作用| 73年属牛的是什么命| 伤官是什么意思| a1微球蛋白偏高说明什么意思| 什么窃什么盗| 人中发红是什么原因| 钾低是什么原因造成的| 什么护肤品最好用| 内含是什么意思| 冰火两重天是什么意思| 眼睛散光是什么意思| 是什么原因导致肥胖| 拉肚子吃什么药最有效果| 婚检男性检查什么项目| 益母草有什么功效| 眼开大财主是什么生肖| 李白号称什么| 反流性食管炎是什么病| 第一顺位是什么意思| 什么人从来不看医生| 泌尿系统感染吃什么消炎药| 花花世界不必当真是什么歌| 益生菌有什么功效| 手上起小水泡是什么原因| 哎呀是什么意思| 空囊是什么意思| lena是什么意思| 向晚的意思是什么| 失去抚养权意味着什么| 经血发黑是什么原因| 剑玉是什么| 为什么肚子总是胀胀的| 角膜炎吃什么消炎药| 40岁适合什么工作| 木棉花的花语是什么| 什么体质容易长结石| 星期三左眼皮跳是什么预兆| 不显山不露水是什么意思| 三维和四维有什么区别| 512是什么节日| 六尘不染的生肖是什么| 形婚是什么意思啊| 澜字五行属什么| 午时左眼跳是什么兆头| 改良碱性土壤用什么| 同舟共济是什么意思| 分子是什么| 什么水晶招财| 在屋顶唱着你的歌是什么歌| 脱水是什么意思| 什么东西补血最快| 上海玉佛寺求什么最灵验| 属猪和什么属相最配| 大便羊粪状吃什么药| 梦见很多牛是什么兆头| 黑色碳素笔是什么笔| 额头上长痘痘是什么原因| 猴和什么属相相冲| 宝宝吃益生菌有什么好处和坏处| 刚生完宝宝的产妇吃什么好| 铂金是什么材质| 丹青是什么| 钢笔ef尖是什么意思| 大便出血吃什么药| 康复治疗学是做什么的| 瑶柱是什么| 捆是什么意思| 属鸡的适合干什么行业最赚钱| 崎岖是什么意思| 经期喝酒会有什么危害| 肺在什么位置图片| 为什么会甲状腺肿大| 中级职称是什么| 梦见纸人是什么意思| 三七粉什么时间喝好| 雪里红是什么| 青砖茶属于什么茶| 汗管瘤用什么药能去掉| 一厢情愿指什么生肖| 非萎缩性胃炎吃什么药效果好| 头孢治疗什么| 梅艳芳什么病| 生殖疱疹吃什么药不复发| 苏轼是什么派词人| 动物的耳朵有什么作用| 冰丝纤维是什么面料| 什么什么龙什么| 狗哭了代表什么预兆| 肾衰竭是什么症状| 站着说话不腰疼什么意思| 红房子是什么| 奥美拉唑和雷贝拉唑有什么区别| 补体c4偏低是什么意思| 什么什么迷人| 尿频繁是什么原因| 赞赏是什么意思| 左旋肉碱什么时候吃效果好| 欲什么意思| 虾和什么相克| 胃烧灼感是什么原因引起的| 狗狗打喷嚏流鼻涕怎么办吃什么药| 干眼症是什么| ab型和o型生的孩子是什么血型| 人生苦短是什么意思| 美国属于什么洲| 云南为什么叫云南| 违和感是什么意思| 排长是什么军衔| 御是什么意思| 儿童看包皮挂什么科| 胃疼喝什么粥| 4月8日是什么星座| 驾驶证b2能开什么车| 鼓上蚤是什么意思| 什么肉最好吃| 花青素有什么作用| 深圳为什么叫鹏城| 冬虫夏草有什么好处| 男生什么时候会有生理反应| 卓诗尼牌子是什么档次| 版图是什么意思| 白羊座是什么性格| 脂溢性脱发是什么意思| 荨麻疹去药店买什么药| 正视是什么意思| 半月板后角变性什么意思| 奥地利讲什么语言| 财神爷叫什么名字| 香港有什么好玩的| 中暑用什么药| 丑时是什么时候| 眼睛近视缺什么维生素| 口水臭是什么原因引起的| 肾功能不全吃什么药| 一什么山| 吃什么会放屁| 百度
TECHNICAL SESSIONS

Wednesday, August 3 | Thursday, August 4 | Friday, August 5

9:00 a.m.–10:30 a.m. Wednesday
Opening Remarks, Awards, and Keynote

Keynote Address
Computer Security in the Real World

Butler W. Lampson, Microsoft and MIT

MP3 IconListen in MP3 format

After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to set up and a nuisance to run, so people judge from experience how little of it they can get away with. Since there's been little damage, people decide that they don't need much security. In addition, setting it up is so complicated that it's hardly ever done right. While we await a catastrophe, simpler setup is the most important step toward better security. In a distributed system with no central management like the Internet, security requires a clear story about who is trusted for each step in establishing it, and why. The basic tool for telling this story is the "speaks for" relation between principals that describes how authority is delegated, that is, who trusts whom. The idea is simple, and it explains what's going on in any system I know, although the many different ways of encoding this relation often make it hard to see the underlying order.

10:30 a.m.–11:00 a.m.   Break
11:00 a.m.–12:30 p.m. Wednesday
REFEREED PAPERS

Securing Real Systems
Session Chair: Adrian Perrig, Carnegie Mellon University

Awarded Best Student Paper!
Security Analysis of a Cryptographically-Enabled RFID Device
Steve Bono, Matthew Green, and Adam Stubblefield, Johns Hopkins University; Ari Juels, RSA Laboratories; Avi Rubin, Johns Hopkins University; Michael Szydlo, RSA Laboratories

Stronger Password Authentication Using Browser Extensions
Blake Ross, Collin Jackson, Nick Miyake, Dan Boneh, John C Mitchell, Stanford University

Cryptographic Voting Protocols: A Systems Perspective
Chris Karlof, Naveen Sastry, David Wagner, University of California, Berkeley

INVITED TALKS

Human-Computer Interaction Opportunities for Improving Security
Ben Shneiderman, University of Maryland

MP3 IconListen in MP3 format

Creating a more secure computing and communications environment requires cooperation among many disciplines. Human-computer interaction (HCI) researchers can contribute by participating in user interface design for system managers and every level of users. The standard HCI processes could clarify the currently confusing array of features that overwhelms many users and leads to errors or frustration. First steps would include clear task analysis and a hierarchical decomposition of objects and actions that enable users to develop a meaningful mental model tied to their needs, rather than the intricacies of system architecture. Then carefully chosen evaluation methods could assess interface designs during development and usage. A second HCI contribution might be tied to information visualization tools to enable system managers to better monitor activity, detect attacks, and trace attackers. Temporal pattern search, network traffic analysis, and hierarchical clustering tools are potential contributions.
   This talk includes a proposed graphic user interface, FORTS (File-sharing Onweb with Realistic Tailorable Security), for specifying and monitoring security/privacy status. This interface is meant to be multi-layered to allow users to choose the level of complexity and protection they need. Based on a fortress model, FORTS shows more secure areas deeper in the fort, and multiple gates to allow incoming/outgoing traffic with comprehensible activity logs.

12:30 p.m.–2:00 p.m.   Lunch (on your own)
2:00 p.m.-3:30 p.m. Wednesday
REFEREED PAPERS

Panel: National ID Cards
Moderator: Niels Provos, Google

Panelists: Drew Dean, SRI International; Carl Ellison, Microsoft; Daniel Weitzner, World Wide Web Consortium

INVITED TALKS

Homeland Security: Networking, Security, and Policy
Douglas Maughan, DHS, HSARPA

MP3 IconListen in MP3 format

This presentation will provide an overview of the recently created Department of Homeland Security, its Science and Technology Directorate, and some of the research initiatives started in the Department. Many of these initiatives provide examples where networking, security, and policy come together in interesting ways as the Department works with critical infrastructure providers to secure the nation's infrastructures. This presentation will explore these issues and provide an opportunity for an open discussion surrounding the various homeland security applications.

3:30 p.m.–4:00 p.m.   Break
4:00 p.m.–5:30 p.m. Wednesday
REFEREED PAPERS

Diagnosing the Net
Session Chair: Angelos Keromytis, Columbia University

Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network
Ju Wang, Xin Liu, and Andrew A. Chien, University of California, San Diego

Robust TCP Stream Reassembly in the Presence of Adversaries
Sarang Dharmapurikar, Washington University; Vern Paxson, International Computer Science Institute, Berkeley

Countering Targeted File Attacks Using LocationGuard
Mudhakar Srivatsa and Ling Liu, Georgia Institute of Technology

INVITED TALKS

Electronic Voting in the United States: An Update
Avi Rubin, Johns Hopkins University

In July 2003, my research team published an analysis of Diebold's Accuvote TS and TSX voting machines, which were used in public elections all over the United States. We found serious security flaws in the machines, and a general lack of understanding of software and computer systems. Since then, the debate around electronic voting has intensified. In the two years since we published that report, I have become very involved in the issue at a national and local level, going so far as to become an election judge in Baltimore County. Maryland is one of the battleground states with respect to e-voting. In this talk, I will review the security issues around e-voting and voting procedures and will provide an update on where things stand in my state and at the federal level.

Wednesday, August 3 | Thursday, August 4 | Friday, August 5
9:00 a.m.–10:30 a.m. Thursday
REFEREED PAPERS

Managing Secure Networks
Session Chair: Adam Stubblefield, Johns Hopkins University

An Architecture for Generating Semantic Aware Signatures
Vinod Yegneswaran, Jonathon T. Giffin, Paul Barford, and Somesh Jha, University of Wisconsin, Madison

MulVAL: A Logic-based Network Security Analyzer
Xinming Ou, Sudhakar Govindavajhala, and Andrew W. Appel, Princeton University

Detecting Targeted Attacks Using Shadow Honeypots
K. G. Anagnostakis, University of Pennsylvania; S. Sidiroglou, Columbia University; P. Akritidis, K. Xinidis, and E. Markatos, Institute of Computer Science—FORTH; A. D. Keromytis, Columbia University

INVITED TALKS

Cybersecurity: Opportunity and Challenges
Pradeep K. Khosla, CyLab

This presentation will provide an overview of the research in CyLab. CyLab is a university-wide multidisciplinary research center with the goal of combining technology, business, and policy to impact industry. In addition, CyLab has a strategic interest in outreach and awareness for the masses. Toward achieving this goal, it is developing innovative games and curricula. This talk will provide an overview of some the research projects in CyLab and will also describe our strategy.

10:30 a.m.–11:00 a.m.   Break
11:00 a.m.–12:30 p.m. Thursday
REFEREED PAPERS

Panel: Sniffing Conference Networks: Is It Legal? Is It Right?
Panelists: Abe Singer, San Diego Supercomputer Center; Bill Cheswick, Lumeta Corp.; Paul Ohm, U.S. Department of Justice; Michael Scher, Security Technologist, Attorney, Anthropologist, Nexum, Inc.

It has become commonplace at some computer conferences, especially security conferences, for someone to "sniff" the network—monitor other users' communications. Often this is for the purpose of intercepting usernames and passwords transmitted in cleartext, sometimes publicly posting the information found. The person sniffing may or may not be officially affiliated with the conference, and the activity is often condoned or approved by the conference organizers (although not by USENIX), and many of the participants.

But is such activity legal? It may very well not be, or only under very limited circumstances. Who has standing to "permit" the activity, and who is liable for the results?

Aside from whether or not the activity is criminal, there is also the ethical issue. Is sniffing a conference network the "right thing to do"? What example does it set? What message does it send?

These issues have been highlighted by some heated complaints at recent USENIX conferences.

This panel will discuss these legal and ethical issues.

INVITED TALKS

Treacherous or Trusted Computing: Black Helicopters, an Increase in Assurance, or Both?
Bill Arbaugh, University of Maryland

A lively and mostly healthy debate has focused on the trusted computing initiatives of several prominent vendors. Both sides of this debate have made some relevant and some not so relevant claims—not to mention a little fear, uncertainty, and doubt (FUD). In this talk, I will present the history of trusted computing from before the "Orange Book" to what we might see tomorrow. Along the way, I'll try to sort out the real technical and policy issues from the FUD. In the end, my hope is that you can make an informed decision on whether these initiatives are treacherous or trusted.

12:30 p.m.–2:00 p.m.   Lunch (on your own)
2:00 p.m.–3:30 p.m. Thursday
REFEREED PAPERS

Attacks
Session Chair: R. Sekar, Stony Brook University

Where's the FEEB? The Effectiveness of Instruction Set Randomization
Ana Nora Sovarel, David Evans, and Nathanael Paul, University of Virginia

Automating Mimicry Attacks Using Static Binary Analysis
Christopher Kruegel and Engin Kirda, Technical University Vienna; Darren Mutz, William Robertson, and Giovanni Vigna, University of California, Santa Barbara

Non-Control-Data Attacks Are Realistic Threats
Shuo Chen, University of Illinois at Urbana-Champaign; Jun Xu and Emre C. Sezer, North Carolina State University

INVITED TALKS

How to Find Serious Bugs in Real Code
Dawson Engler, Stanford University

This talk will describe new dynamic bug-finding techniques that work well on real code, our experiences with both static and dynamic techniques, and several widely held myths in the bug-finding community.

3:30 p.m.–4:00 p.m.   Break
4:00 p.m.–5:30 p.m. Thursday
REFEREED PAPERS

Protecting the Network
Session Chair: Niels Provos, Google

Awarded Best Paper!
Mapping Internet Sensors with Probe Response Attacks
John Bethencourt, Jason Franklin, and Mary Vernon, University of Wisconsin, Madison

Vulnerabilities of Passive Internet Threat Monitors
Yoichi Shinoda, Japan Advanced Institute of Science and Technology; Ko Ikai, National Police Agency of Japan; Motomu Itoh, Japan Computer Emergency Response Team Coordination Center (JPCERT/CC)

On the Effectiveness of Distributed Worm Monitoring
Moheeb Abu Rajab, Fabian Monrose, and Andreas Terzis, Johns Hopkins University

INVITED TALKS

Open Problems with Certifying Compilation
Greg Morrisett, Harvard University

Proof-carrying code was introduced by Necula and Lee as a technique for minimizing trusted code: instead of monitoring or analyzing code to see if it is trustworthy, we require that the code comes with a machine-checkable, mathematical proof that the code respects a desired security policy. In practice, checking the proof is easy when compared to constructing one, so the framework shifts the hard work from the code consumer to the code producer. Unfortunately, it doesn't eliminate the hard problem: how does a code producer construct the proof?

Certifying compilers provide part of the answer: A certifying compiler takes as input high-level source code and a proof that the source code respects the policy, and then transforms the code and proof in parallel. In this fashion, it is able to automatically output the required proof at the machine-code level. For simple policies, such as memory-safety and type-safety, the proof can be automatically constructed at the source level, assuming we start with a type-safe source language.

Unfortunately,most of the code that needs to be trustworthy is written in type-unsafe languages such as C or C++, so we need some way to realize proofs for these languages. Furthermore, we need support for security policies that go well beyond type-safety. I will survey some of the research that has been done, and that needs to be done to achieve these goals, so that we may one day realize the full potential of proof-carrying code.

Wednesday, August 3 | Thursday, August 4 | Friday, August 5
8:30 a.m.–10:30 a.m. 9:00 a.m.–10:30 a.m.
REFEREED PAPERS

Defenses
Session Chair: Yoshi Khono, University of California, San Diego

Protecting Against Unexpected System Calls
C. M. Linn, M. Rajagopalan, S. Baker, C. Collberg, S. K. Debray, J. H. Hartman, University of Arizona

Efficient Techniques for Comprehensive Protection from Memory Error Exploits
Sandeep Bhatkar, R. Sekar, and Daniel C. DuVarney, Stony Brook University

Finding Security Vulnerabilities in Java Applications with Static Analysis
V. Benjamin Livshits and Monica S. Lam, Stanford University

OPUS: Online Patches and Updates for Security
Gautam Altekar, Ilya Bagrak, Paul Burstein, and Andrew Schultz, University of California, Berkeley

INVITED TALKS

What Are We Trying to Prove? On the Relevance of Certified Code to Computer Security
Peter Lee, Carnegie Mellon University

Since 1996 there has been tremendous progress in developing the idea of certified code, including both proof-carrying code (PCC) and typed assembly language (TAL). In a certified code framework, each program (which is usually in machine-code binary form) comes equipped with a certificate that "explains," both rigorously and in a manner that is easily validated, why it possesses a formally specified safety property. A substantial amount of the research work in this area has been directed towards the problem of how to make certified code a practical technology—what one might call "proof engineering." Thus, many of the advances have been in methods for representing the certificates in the most compact and efficiently checkable way. A considerable amount of effort has also gone into the development of prototype tools that explore how to handle realistic programs written in realistic languages.

In this talk, I will start with a brief overview of the current state of these and other current concepts in certified code. Then I will consider a very different but equally practical question: Just what is it that we are trying to prove, especially if we want to be relevant to computer security? Today, certified code systems do not prove the semantic equivalence between source and target programs. Nor do they prove the absence of most kinds of trojan horses, covert channels, or race conditions. While the safety properties provided by current certified code systems are, in fact, of central importance to computer security, I will argue that there are potentially great opportunities in investigating an expansion of the kinds of properties that these systems reason about.

10:30 a.m.–11:00 a.m.   Break
11:00 a.m.–12:30 p.m. Friday
REFEREED PAPERS

Building Secure Systems
Session Chair: Somesh Jha, University of Wisconsin, Madison

Fixing Races for Fun and Profit: How to Abuse atime
Nikita Borisov, Rob Johnson, Naveen Sastry, and David Wagner, University of California, Berkeley

Building an Application-aware IPsec Policy System
Heng Yin and Haining Wang, College of William and Mary

Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation
Jim Chow, Ben Pfaff, Tal Garfinkel, and Mendel Rosenblum, Stanford University

INVITED TALKS

Four Lightning Talks
Ben Laurie, The Bunker

I spend my life doing a dozen different things at once. So, rather than concentrate on one thing which might bore you, I would prefer to spark everyone's interest (at least occasionally) by talking about several of the things that have been distracting me recently. Included may or may not be: anonymous instant messaging, bolting capabilities onto existing languages, why packaging is bad for security, problems in DNSSEC and ruminations on writing an OpenPGP library. But since I'm writing this abstract in April and talking in August, there may be even more cool topics to discuss.

12:30 p.m.–2:00 p.m.   Lunch (on your own)
2:00 p.m.–3:30 p.m. Friday

Work-in-Progress Reports and Closing Remarks

?Need help? Use our Contacts page.

Last changed: 19 Oct. 2007 ac
什么人容易得心脏病 3月有什么节日 突然膝盖疼是什么原因 玉米排骨汤放什么调料 小针刀是什么
秦始皇叫什么 黑芝麻不能和什么一起吃 尿糖一个加号是什么意思 16岁能做什么工作 男人睡觉流口水是什么原因
蚊子不喜欢什么味道 湉是什么意思 反复发烧挂什么科 疝气嵌顿是什么意思 反驳是什么意思
羽毛球拍u是什么意思 二月二十五号是什么星座 成双成对是什么生肖 十五年是什么婚 医院总务科是干什么的
青霉素是什么xianpinbao.com 年轻人长老年斑是什么原因hcv7jop9ns7r.cn 朗字五行属什么xianpinbao.com 黄大仙是保佑什么的hcv8jop9ns7r.cn 辅酶q10的作用是什么hcv8jop5ns2r.cn
血管明显是什么原因hcv9jop4ns0r.cn 吃了螃蟹不能吃什么hcv8jop9ns7r.cn 9月25是什么星座hcv9jop1ns7r.cn 股癣用什么药最好hcv7jop5ns3r.cn 安全三原则是指什么hcv8jop8ns3r.cn
头发软是什么原因gysmod.com 什么的脸庞hcv7jop6ns9r.cn 纯露是什么hcv9jop8ns3r.cn 瑜五行属什么hcv9jop3ns0r.cn 炖牛腩放什么调料hcv8jop3ns3r.cn
瘘管是什么病hcv9jop8ns1r.cn 自缢痣是什么意思hcv9jop4ns0r.cn 五月初九是什么星座hcv8jop6ns6r.cn 左耳朵嗡嗡响是什么原因引起的gangsutong.com 压床是什么意思hcv8jop1ns1r.cn
百度