Papers by Program Order / Volume I: |
Composable High Assurance Trusted Systems (CHATS) |
Design and Implementation of the TrustedBSD MAC Framework / R. Watson ; B. Feldman ; A. Migus ; C. Vance |
Defcon Capture the Flag: Defending Vulnerable Code from Intense Attack / C. Cowan ; S. Arnold ; S. Beattie ; C. Wright ; J. Viega |
Cyber Panel |
Finding the Vocabulary of Program Behavior Data for Anomaly Detection / C. Michael |
Detecting Spoofed Packets / S. Templeton ; K. Levitt |
Modeling Multistep Cyber Attacks for Scenario Recognition / S. Cheung ; U. Lindqvist ; M. Fong |
Cooperative Response Strategies for Large Scale Attack Mitigation / D. Nojiri ; J. Rowe |
Dynamic Coalitions (DC) |
Dynamic Authorization and Intrusion Response in Distributed Systems / T. Ryutov ; C. Neuman ; D. Kim |
The STRONGMAN Architecture / A. Keromytis ; S. Ioannidis ; M. Greenwald ; J. Smithy |
Dynamic PKI and Secure Tuplespaces for Distributed Coalitions / T. Smith ; G. Byrd ; X. Wu ; H. Xin ; K. Thangavelu ; R. Wang ; A. Shah |
RT: A Role-Based Trust-Management Framework / N. Li ; J. Mitchell |
Scaling Secure Group Communication Systems: Beyond Peer-to-Peer / Y. Amir ; C. Nita-Rotaru ; J. Stanton ; G. Tsudik |
MuCAPSL / J. Millen ; G. Denker |
Leader Election Algorithms for Wireless Ad Hoc Networks / S. Vasudevan ; B. DeCleene ; N. Immerman ; J. Kurose ; D. Towsley |
Fault Tolerant Networking (FTN) |
COSSACK: Coordinated Suppression of Simultaneous Attacks / C. Papadopoulos ; R. Lindell ; J. Mehringer ; A. Hussain ; R. Govindan |
NetBouncer: Client-Legitimacy-Based High-Performance DDoS Filtering / R. Thomas ; B. Mark ; T. Johnson ; J. Croall |
Analyzing Interaction between Distributed Denial of Service Attacks and Mitigation Technologies / W. Blackert ; D. Gregg ; A. Castner ; E. Kyle ; R. Hom ; R. Jokerst |
Design and Analysis of an IP-Layer Anonymizing Infrastructure / H. Kung ; C. Cheng ; K. Tan ; S. Bradner |
Prophylactic, Treatment and Containment Techniques for Ensuring Active Network Security / S. Murphy ; A. Hayatnagarkar ; S. Krishnaswamy ; W. Morrison |
Understanding BGP Behavior through a Study of DoD Prefixes / X. Zhao ; D. Massey ; S. Wu ; M. Lad ; D. Pei ; L. Wang ; L. Zhang |
Efficient Alarm Management in Optical Networks / S. Stanic ; S. Subramaniam ; H. Choi ; G. Sahin |
Interactions Between TCP and the IEEE 802.11 MAC Protocol / R. Jiang ; V. Gupta ; C. Ravishankar |
Statistical Approaches to DDoS Attack Detection and Response / L. Feinstein ; D. Schnackenberg ; R. Balupari ; D. Kindred |
Organic and Survivable Information Systems (OASIS) |
Towards a Rigorous Definition of Information System Survivability / J. Knight ; E. Strunk ; K. Sullivan |
Intrusion Tolerance via Network Layer Controls / D. O'Brien ; R. Smith ; T. Kappel ; C. Bitzer |
Operational Experimentation (OPX) |
Lessons Learned in Using Live Red Teams in IA Experiments / D. Levin |
Surveillance Detection in High Bandwidth Environments / S. Robertson ; E. Siegel ; M. Miller ; S. Stolfo |
Detecting Novel Scans through Pattern Anomaly Detection / A. Valdes |
Author Index |
DARPA Information Survivability Conference and Exposition--DISCEX 2003 / Volume II: |
Foreword |
Acknowledgments |
Demonstration Abstracts / Part I: |
Open-Source PKI on SELinux--A Technology Description / E. Bubnis ; S. Evans ; P. Fischer ; E. Meighan ; A. Almeida |
Demonstration of COSAK Static Analysis Tools / D. DaCosta ; C. Dahn ; S. Mancoridis ; V. Prevelakis |
MYSEA Technology Demonstration / C. Irvine ; D. Shifflett ; P. Clark ; T. Levin ; G. Dinolt |
The TrustedBSD MAC Framework |
Visualization as an Aid for Assessing the Mission Impact of Information Security Breaches / A. D'Amico ; S. Salas |
A Controller-Based Autonomic Defense System / D. Armstrong ; S. Carter ; G. Frazier ; T. Frazier |
Scyllarus Intrusion Detection Report Correlator and Analyzer / W. Heimerdinger |
System Health and Intrusion Monitoring: Technology Description / C. Ko |
CIRCADIA Demonstration: Active Adaptive Defense / D. Musliner |
An Integrated Cyber Panel System / L. Tinnel ; O. Saydjari ; J. Haines |
Intelligence Preparation of the Information Battlespace (IPIB) / J. Williams |
Integrated Security Services for Dynamic Coalitions / H. Khurana ; S. Gavrila ; R. Bobba ; R. Koleva ; A. Sonalker ; E. Dinu ; V. Gligor ; J. Baras |
Key Management for Secure Multicast Group Communication in Mobile Networks / T. Kostas ; D. Kiwior ; G. Rajappan ; M. Dalal |
Antigone: Policy-Based Secure Group Communication System and AmirD: Antigone-Based Secure File Mirroring System / J. Irrer ; A. Prakash ; P. McDaniel |
Federated Security Management for Dynamic Coalitions / S. Bhatt ; S. Rajagopalan ; P. Rao |
TrustBuilder: Negotiating Trust in Dynamic Coalitions / K. Seamons ; T. Chan ; E. Child ; M. Halcrow ; A. Hess ; J. Holt ; J. Jacobson ; R. Jarvis ; A. Patty ; B. Smith ; T. Sundelin ; L. Yu |
Yalta: A Dynamic PKI and Secure Tuplespaces for Distributed Coalitions |
A Toolkit for Building Secure, Fault-Tolerant Virtual Private Networks / W. Stephens ; B. Coan ; S. Narain ; V. Kaul ; K. Parmeswaran ; T. Cheng |
Distributed Data Authentication / M. Goodrich ; M. Shin ; C. Straub ; R. Tamassia |
Automated Trust Negotiation Technology with Attribute-Based Access Control / W. Winsborough ; J. Jacobs |
Fault Tolerant Networks (FTN) |
The Wackamole Approach to Fault Tolerant Networks / R. Caudy ; A. Munjal ; T. Schlossnagle ; C. Tutu |
Distributed Denial of Service Defense Attack Tradeoff Analysis (DDOS-DATA) |
NCAC: Network Congestion Analyzer and Controller |
DDoS Tolerant Networks |
Guaranteed Internet Stack Utilization (GINSU) Building Blocks / R. Knobbe ; A. Purtell |
ANON: An IP-Layer Anonymizing Infrastructure |
Distributed Embedded Firewalls with Virtual Private Groups / T. Markham ; L. Meredith ; C. Payne |
Fault-Tolerant Mesh of Trust Applied to DNS Security / W. Griffin ; R. Mundy ; S. Weiler ; N. Vora |
Demonstration of Fault Tolerance for CORBA Applications / L. Moser ; M. Melliar-Smith |
Dynamic Trust-Based Resource Allocation / T. Hughes ; M. Junod ; P. Muckelbauer |
Active Network Fault Response |
Scalable DDoS Protection Using Route-Based Filtering / K. Park |
Techniques for Intrusion-Resistant Ad Hoc Routing Algorithms (TIARA) / R. Ramanujan ; S. Kudige ; T. Nguyen |
DefCOM: Defensive Cooperative Overlay Mesh / M. Robinson ; J. Mirkovic ; S. Michel ; M. Schnaider ; P. Reiher |
Improving Failure Responsiveness in Jini Leasing / S. Rose ; K. Bowers ; S. Quirolgico ; K. Mills |
SPIE Demonstration: Single Packet Traceback / W. Strayer ; C. Jones ; F. Tchakountio ; A. Snoeren ; B. Schwartz ; R. Clements ; M. Condell ; C. Partridge |
Onion Routing for Resistance to Traffic Analysis / P. Syverson |
TetherNet Anti-NAT--Secure Internet Subnet Rental System / H. Zhu ; T. Huck ; J. Touch ; L. Eggert ; Y. Wang |
Organically Assured and Survivable Information Systems (OASIS) |
Safe Email, Safe Office, and Safe Web Browser / R. Balzer |
Access Control on the Web Using Proof-Carrying Authorization / L. Bauer ; M. Schneider ; E. Felten ; A. Appel |
Enterprise Wrappers for Information Assurance / M. Feldman |
Willow System Demonstration / J. Hill ; P. Varner ; A. Wolf ; D. Heimbigner ; P. Devanbu |
Camouflage of Network Traffic to Resist Attack (CONTRA) / W. Weinstein ; J. Lepanto |
Dependable Intrusion Tolerance: Technology Demo / M. Almgren ; Y. Deswarte ; B. Dutertre ; J. Levy ; H. Saidi ; V. Stavridou ; T. Uribe |
ITDB: An Attack Self-Healing Database System Prototype / P. Liu |
Intrustion Tolerant Web Servers via Network Layer Controls |
Demonstrating Intrusion Tolerance with ITUA / P. Pal |
VPNshield: Protecting VPN Services from Denial-of-Service (DoS) Attacks / M. Kaddoura ; J. Wu ; C. Sanders ; K. Millikin |
On-Line Attack Prevention and Continual Recovery / J. Reynolds |
An Aspect-Oriented Security Solution / V. Shah ; F. Hill |
OmniVPN / J. Shukla |
Efficient Code Certification for Open Firmware / M. Stillerman ; D. Kozen |
Intrusion Tolerant Distributed Object Systems / G. Tally ; B. Whitmore ; D. Sames ; B. Matt ; B. Niebuhr ; D. Bakken |
SPMA--Java Binary Enhancement Tool / T. Van Vleck ; A. Reisse |
SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services / F. Wang ; R. Uppalli |
System Detection's Hawkeye Platform |
Research Summaries / Part II: |
Modeling Security-Enhanced Linux Policy Specifications for Analysis / M. Archer ; E. Leonard ; M. Pradella |
Open-Source PKI on SELinux |
Monterey Security Enhanced Architecture Project |
Achieving Principled Assuredly Trustworthy Composable Systems and Networks / P. Neumann |
Enhancing ReiserFS Security in Linux / H. Reiser |
LLSIM: Network Simulation for Correlation and Response Testing / S. Goulet ; R. Durst ; T. Champion |
System Health and Intrusion Monitoring (SHIM): Project Summary |
Predicting the Impact of Cyber-Attacks on BMC[subscript 3] Enterprises / J. Shaw |
A Framework for Automated Negotiation of Access Control Policies / V. Bharadwaj |
Recommendations in Using Group Key Management Algorithms / W. Chen ; L. Dondeti |
DyCER: A Lightweight Data Sharing System Using Replication / J. Kay ; S. Crocker |
A Flexible Architecture for Security Policy Enforcement |
Trust Negotiation in Dynamic Coalitions / M. Winslett ; T. Yu |
Efficient and Scalable Infrastructure Support for Dynamic Coalitions |
Automated Trust Negotiation in Attribute-Based Access Control |
A Summary of the Autonomic Distributed Firewalls (ADF) Project |
Traceback of Single IP Packets Using SPIE |
DynaBone: Dynamic Defense Using Multi-Layer Internet Overlays / G. Finn |
A Summary of Detection of Denial-of-QoS Attacks on DiffServ Networks / V. Mahadik ; D. Reeves |
Engineering a Distributed Intrusion Tolerant Database System Using COTS Components |
EMT/MET: Systems for Modeling and Detecting Errant Email / S. Hershkop ; K. Wang ; O. Nimeskern |
Papers by Program Order / Volume I: |
Composable High Assurance Trusted Systems (CHATS) |
Design and Implementation of the TrustedBSD MAC Framework / R. Watson ; B. Feldman ; A. Migus ; C. Vance |