CCS 2005
Conference ProgramTuesday November 8, 2005
Welcoming Remarks by General Chair and Program Chair
Keynote - Homeland Security: Cyber
Security R&D Initiatives
Session I: Formal Analysis of Crypto
Protocols A Modular Correctness Proof of IEEE 802.11i and TLSChanghua He, Mukund Sundararajan, Anupam Datta, Ante Derek, and John C.
Mitchell Deciding security of protocols against off-line guessing attacks Mathieu Baudet
Secrecy Types for a Simulatable Cryptographic LibraryPeeter Laud
Session II: Trust Management Prevent Attribute Information Leakage in Automated Trust Negotiation Keith Irwin and Ting Yu
Automated Trust Negotiation Using Cryptographic CredentialsJiangtao Li, Ninghui Li, and William H. Winsborough
Secure Collaboration in Mediator-Free EnvironmentsMohamed Shehab, Elisa Bertino, and Arif Ghafoor
Session III: Privacy and Anonymity Applications of Secure Electronic Voting to Automated Privacy-Preserving TroubleshootingQiang Huang, David Jao, and Helen Wang
Tracking Anonymous Peer-to-Peer VoIP Calls on the InternetXinyuan Wang, Shiping Chen, and Sushil Jajodia
Untraceable RFID Tags via Insubvertible EncryptionGiuseppe Ateniese, Jan Camenisch, and Breno de Medeiros
Obfuscated Databases and Group Privacy Arvind Narayanan and Vitaly Shmatikov
Wednesday November 9, 2005
Session IV: Authentication New Approaches for Deniable AuthenticationMario Di Raimondo and Rosario Gennaro
On authenticated computing and RSA-based authenticationJean-Pierre Seifert
Aggregated Path Authentication for Efficient BGP Security Meiyuan Zhao, Sean Smith, and David Nicol
Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations Onur AciiÇmez, Werner Schindler, and Çetin Kaya KoÇ
Session V: Access Control CPOL: High-Performance Policy EvaluationKevin Borders, Xin Zhao, and Atul Prakash
Understanding and developing role-based administrative modelsJason Crampton
PeerAccess: A Logic for Distributed AuthorizationMarianne Winslett, Charles Zhang, and Piero Andrea Bonatti
Session VI: Key Management , Key
Exchange, and Pseudo-Random Generation Modeling Insider Attacks on Group Key-Exchange ProtocolsJonathan Katz and Ji Sun Shin
Dynamic and Efficient Key Management for Access HierarchiesMikhail Atallah, Keith Frikken, and Marina Blanton
An architecture for robust pseudo-random generation and Applications to /dev/randomBoaz Barak and Shai Halevi
Session VII: Intrusion Detection and
Prevention Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting ServersZhenkai Liang and R. Sekar
Automatic Diagnosis and Response to Memory Corruption Vulnerabilities?Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, and Chris Bookholt
On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm ExploitsJedidiah R. Crandall, Zhendong Su, S. Felix Wu, and Frederic T. Chong
Countering DoS Attacks With Stateless Multipath Overlays Angelos Stavrou and Angelos D. Keromytis
Thursday November 10, 2005
Session VIII: Security for Diffuse
Computing A Framework for Concrete Reputation-Systems with Applications to History-Based Access ControlKarl Krukow, Mogens Nielsen, and Vladimiro Sassone
Anomaly Detection as a Reputation System for Online AuctioningShai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon Giffin,
Nicholas Kidd, Louis Kruger, and Hao Wang
On the Cost-Ineffectiveness of Redundancy in Commercial P2P ComputingMatthew Yurkewych, Brian N. Levine, and Arnold L. Rosenberg
Securing Publish-Subscribe Overlay Services with EventGuardMudhakar Srivatsa and Ling Liu
Session IX: Cryptography Password Authenticated Key Exchange Using Hidden Smooth SubgroupsCraig Gentry, Philip MacKenzie, and Zulfikar Ramzan
Proxy Re-Signatures: New Definitions, Algorithms, and ApplicationsGiuseppe Ateniese and Susan Hohenberger
Direct Chosen Ciphertext Security from Identity-Based TechniquesXavier Boyen, Qixiang Mei, and Brent Waters
Session X: Automated Analysis Automatic Placement of Authorization Hooks in the Linux Security Modules FrameworkVinod Ganapathy, Trent Jaeger, and Somesh Jha
Control-Flow Integrity: Principles, Implementations, and Applications
Martin Abadi, Mihai Budiu, Ulfar Erlingsson, and Jay Ligatti
Preventing Format-String Attacks via Automatic and Efficient Dynamic CheckingMichael F. Ringenburg and Dan Grossman
Session XI: Attacking passwords and
bringing down the network Fast Dictionary Attacks on Human-Memorable Passwords Using Time-Space TradeoffArvind Narayanan and Vitaly Shmatikov
Keyboard Acoustic Emanations Revisited Li Zhuang, Feng Zhou, and J. D. Tygar
Misbehaving TCP Receivers Can Cause Internet-Wide Congestion Collapse Rob Sherwood, Bobby Bhattacharjee, and Ryan Braud
Exploiting Open Functionality in SMS-Capable Cellular NetworksPatrick Traynor, William Enck, Tom La Porta, and Patrick McDaniel
|
|
|