8:30 | Welcome and Introductions |
8:45 | Keynote, Hari Balakrishnan (Massachusetts Institute of Technology)
|
10:00 | Coffee Break
|
10:30 | L3A: A Protocol for Layer Three Accounting.
Alwyn Goodloe, Matthew Jacobs, Gaurav Shah (University of
Pennsylvania), Carl Gunter (University of Illinois, Urbana-Champaign)
|
10:50 | Mitigating DoS Attack Through Selective Bin Verification.
Micah Sherr, Michael Greenwald, Carl Gunter, Sanjeev Khanna,
Santosh Venkatesh (University of Illinois, Urbana-Champaign)
|
11:10 | On Design Tradeoffs between Security and Performance in
Wireless Group Communicating Systems.
Jin-Hee Cho and Ing-Ray Chen (Virginia Tech)
|
11:30 | Detecting and Filtering Instant Messaging Spam -- A Global
and also Personalized Approach.
Zhijun Liu, Weili Lin, Na Li, David Lee (The Ohio State University)
|
11:50 | Analysis of IPSec Overheads for VPN Servers.
Craig Shue, Youngsang Shin, Minaxi Gupta, Jong Youl Choi (Indiana
University, Bloomington)
|
12:10 | Lunch Break
|
1:30 | Practical Security for Disconnected Nodes.
Aaditeshwar Seth and Srinivasan Keshav (University of Waterloo)
|
1:50 | Achieving K-Anonymity in Mobile Ad Hoc Networks.
Xiaoxin Wu and Elisa Bertino (Purdue University)
|
2:10 | Phyllo: A Peer-to-Peer Overlay Security Framework.
William Heinbockel (MITRE) and Minseok Kwon (Rochester Institute of
Technology)
|
2:30 | Identity Theft Protection in Structured Overlays.
Lakshmi Ganesh and Ben Y. Zhao (UC Santa Barbara)
|
2:50 | Coffee Break
|
3:30 | An Effective Intrusion Detection Approach for OLSR MANET
Protocol.
M. Wang, L. Lamont (Communications Research Centre), P. Mason,
M. Gorlatova (DRDC)
|
3:50 | The Attackers' Influence on the Tactical Assessments
Produced by Standard Alert Correlation Systems.
Stephen Neville (University of Victoria)
|
4:10 | Policy Segmentation for Intelligent Firewall Testing.
Adel El-Atawy, Khaled Ibrahim, Hazem Hamed, Ehab Al-Shaer (DePaul
University)
|
4:30 | A Distributed Reputation Approach to Cooperative Internet
Routing Protection.
Harlan Yu, Jennifer Rexford, Edward Felten (Princeton University)
|
4:50-5:00 | Closing Remarks and Discussion
|