Message from the Program Chairs |
Symposium Committee |
Program Committee |
Tamper-Resistance and Cryptography / Session 1: |
Cryptographic Security for Mobile Code / J. Algesheimer ; C. Cachin ; J. Camenisch ; G. Karjoth |
Networked Cryptographic Devices Resilient to Capture / P. MacKenzie ; M. Reiter |
Protection of Keys against Modification Attack / W. Fung ; M. Golin ; J. Gray |
Intrusion and Anomaly Detection I / Session 2: |
Data Mining Methods for Detection of New Malicious Executables / M. Schultz ; E. Eskin ; E. Zadok ; S. Stolfo |
Evaluation of Intrusion Detectors: A Decision Theory Approach / J. Gaffney ; J. Ulvila |
Information Flow / Session 3: |
On Confidentiality and Algorithms / J. Agat ; D. Sands |
Preserving Information Flow Properties under Refinement / H. Mantel |
Access Control and Trust Management / Session 4: |
Understanding Trust Management Systems / S. Weeks |
SD3: A Trust Management System with Certified Evaluation / T. Jim |
Formal Treatment of Certificate Revocation under Communal Access Control / X. Ao ; N. Minsky ; V. Ungureanu |
Intrusion and Anomaly Detection II / Session 5: |
Information-Theoretic Measures for Anomaly Detection / W. Lee ; D. Xiang |
A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors / R. Sekar ; M. Bendre ; D. Dhurjati ; P. Bollineni |
Intrusion Detection via Static Analysis / D. Wagner ; D. Dean |
Cryptographic Protocols I / Session 6: |
Performance of Public-Key-Enabled Kerberos Authentication in Large Networks / A. Harbitter ; D. Menasce |
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission / B. Pfitzmann ; M. Waidner |
What's Really Different / Session 7: |
Cryptographic Key Generation from Voice / F. Monrose ; Q. Li ; S. Wetzel |
A Trend Analysis of Exploitations / H. Browne ; W. Arbaugh ; J. McHugh ; W. Fithen |
Invited Talk |
Reverse Engineering: A Legal Right or Wrong? / Pamela Samuelson |
Cryptographic Protocols II / Session 8: |
Graph-Based Authentication of Digital Streams / S. Miner ; J. Staddon |
ELK, A New Protocol for Efficient Large-Group Key Distribution / A. Perrig ; D. Song ; J. Tygar |
Author Index |
Message from the Program Chairs |
Symposium Committee |
Program Committee |
Tamper-Resistance and Cryptography / Session 1: |
Cryptographic Security for Mobile Code / J. Algesheimer ; C. Cachin ; J. Camenisch ; G. Karjoth |
Networked Cryptographic Devices Resilient to Capture / P. MacKenzie ; M. Reiter |