The Community for Technology Leaders
2003 Symposium on Security and Privacy, 2003. (2003)
Berkeley, CA
May 11, 2003 to May 14, 2003
ISSN: 1540-7993
ISBN: 0-7695-1940-7

Program Committee (PDF)

pp. viii
Session: Anonymity

Mixminion: Design of a Type III Anonymous Remailer Protocol (Abstract)

George Danezis , University of Cambridge
Roger Dingledine , The Free Haven Project
Nick Mathewson , The Free Haven Project
pp. 2

Probabilistic Treatment of MIXes to Hamper Traffic Analysis (Abstract)

Dakshi Agrawal , IBM Watson Research Center
Dogan Kesdogan , Aachen University of Technology
Stefan Penz , Aachen University of Technology
pp. 16

Defending Anonymous Communications Against Passive Logging Attacks (Abstract)

Matthew Wright , University of Massachusetts
Micah Adler , University of Massachusetts
Brian N. Levine , University of Massachusetts
Clay Shields , Georgetown University
pp. 28
Session: IDS

Active Mapping: Resisting NIDS Evasion without Altering Traffic (Abstract)

Umesh Shankar , University of California at Berkeley
Vern Paxson , ICSI Center for Internet Research and Lawrence Berkeley National Laboratory
pp. 44

Anomaly Detection Using Call Stack Information (Abstract)

Henry Hanping Feng , University of Massachusetts
Oleg M. Kolesnikov , Georgia Institute of Technology
Prahlad Fogla , Georgia Institute of Technology
Wenke Lee , Georgia Institute of Technology
Weibo Gong , University of Massachusetts
pp. 62
Session: OS

Defending Against Denial-of-Service Attacks with Puzzle Auctions (Abstract)

XiaoFeng Wang , Carnegie Mellon University
Michael K. Reiter , Carnegie Mellon University
pp. 78

Pi: A Path Identification Mechanism to Defend against DDoS Attacks (Abstract)

Abraham Yaar , Carnegie Mellon University
Adrian Perrig , Carnegie Mellon University
Dawn Song , Carnegie Mellon University
pp. 93
Session: Formal Methods

A Unified Scheme for Resource Protection in Automated Trust Negotiation (Abstract)

Ting Yu , University of Illinois at Urbana-Champaign
Marianne Winslett , University of Illinois at Urbana-Champaign
pp. 110

Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management (Abstract)

Ninghui Li , Stanford University
William H. Winsborough , Network Associates Laboratories
John C. Mitchell , Stanford University
pp. 123

Intransitive Non-Interference for Cryptographic Purposes (Abstract)

Michael Backes , IBM Zurich Research Laboratory
Birgit Pfitzmann , IBM Zurich Research Laboratory
pp. 140
Session: Hardware

Using Memory Errors to Attack a Virtual Machine (Abstract)

Sudhakar Govindavajhala , Princeton University
Andrew W. Appel , Princeton University
pp. 154

Specifying and Verifying Hardware for Tamper-Resistant Software (Abstract)

David Lie , Stanford University
John Mitchell , Stanford University
Chandramohan A. Thekkath , Stanford University
Mark Horowitz , Stanford University
pp. 166
Session: Hardware & Crypto

Secret Handshakes from Pairing-Based Key Agreements (Abstract)

Dirk Balfanz , Palo Alto Research Center
Glenn Durfee , Palo Alto Research Center
Narendar Shankar , University of Maryland
Diana Smetters , Palo Alto Research Center
Jessica Staddon , Palo Alto Research Center
Hao-Chi Wong , Palo Alto Research Center
pp. 180

Random Key Predistribution Schemes for Sensor Networks (Abstract)

Haowen Chan , Carnegie Mellon University
Adrian Perrig , Carnegie Mellon University
Dawn Song , Carnegie Mellon University
pp. 197
Session: Distributed Systems

Hardening Functions for Large Scale Distributed Computations (Abstract)

Doug Szajda , University of Richmond
Barry Lawson , University of Richmond
Jason Owen , University of Richmond
pp. 216

A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards (Abstract)

Noam Kogan , Tel Aviv University
Yuval Shavitt , Tel Aviv University
Avishai Wool , Tel Aviv University
pp. 225

Using Replication and Partitioning to Build Secure Distributed Systems (Abstract)

Lantian Zheng , Cornell University
Stephen Chong , Cornell University
Andrew C. Myers , Cornell University
Steve Zdancewic , University of Pennsylvania
pp. 236

Vulnerabilities in Synchronous IPC Designs (Abstract)

Jonathan S. Shapiro , Johns Hopkins University
pp. 251

Garbage Collector Memory Accounting in Language-Based Systems (Abstract)

David W. Price , Rice University
Algis Rudys , Rice University
Dan S. Wallach , Rice University
pp. 263

Author's Index (PDF)

pp. 275
93 ms
(Ver 3.3 (11022016))