The Community for Technology Leaders
Computer Security Applications Conference, Annual (2003)
Las Vegas, Nevada
Dec. 8, 2003 to Dec. 12, 2003
ISSN: 1063-9527
ISBN: 0-7692-2041-3
TABLE OF CONTENTS

Reviewers (PDF)

pp. xviii
Distinguished Practitioner
Track A: Intrusion Detection I

null (PDF)

pp. null

Bayesian Event Classification for Intrusion Detection (Abstract)

Christopher Kruegel , University of California, Santa Barbara
Fredrik Valeur , University of California, Santa Barbara
William Robertson , University of California, Santa Barbara
Darren Mutz , University of California, Santa Barbara
pp. 14

Intrusion Detection: A Bioinformatics Approach (Abstract)

Joel Branch , Rensselaer Polytechnic Institute
Scott Coull , Rensselaer Polytechnic Institute
Eric Breimer , Siena College
Boleslaw Szymanski , Rensselaer Polytechnic Institute
pp. 24

A Stateful Intrusion Detection System for World-Wide Web Servers (Abstract)

Vishal Kher , University of California, Santa Barbara
Giovanni Vigna , University of California, Santa Barbara
Richard A. Kemmerer , University of California, Santa Barbara
William Robertson , University of California, Santa Barbara
pp. 34
Track B: Network Security

null (PDF)

pp. null

Behavioral Authentication of Server Flows (Abstract)

Catherine Rosenberg , Purdue University
Carla E. Brodley , Purdue University
James P. Early , Purdue University
pp. 46

A Multi-View Tool for Checking the Security Semantics of Router Configurations (Abstract)

Holger Peine , Fraunhofer Institute for Experimental Software Engineering, Germany
Reinhard Schwarz , Fraunhofer Institute for Experimental Software Engineering, Germany
pp. 56

S-ARP: a Secure Address Resolution Protocol (Abstract)

E. Rosti , Universit? degli Studi di Milano, Italy
A. Ornaghi , Universit? degli Studi di Milano, Italy
D. Bruschi , Universit? degli Studi di Milano, Italy
pp. 66
Track A: Defensive Information Warfare

null (PDF)

pp. null

Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs (Abstract)

Brian O'Berry , George Mason University
Steven Noel , George Mason University
Sushil Jajodia , George Mason University
Michael Jacobs , George Mason University
pp. 86

An IP Traceback Technique against Denial-of-Service Attacks (Abstract)

Zhaole Chen , the Chinese University of Hong Kong
Moon-Chuen Lee , the Chinese University of Hong Kong
pp. 96
Track B: Forum

Forum Session: Security for Wireless Sensor Networks (PDF)

Daniel Coffin , BBN Technologies
David Carman , Network Associates Laboratories
Vipin Swarup , The MITRE Corp.
Bruno Dutertre , SRI International
Ronald Watro , BBN Technologies
pp. 106
Track A: Applied Cryptography

null (PDF)

pp. null

An Intrusion-Tolerant Password Authentication System (Abstract)

Hua Lin , Wachovia Corporation, Rockville, MD
M. Hossain Heydari , James Madison University, Harrisonburg, VA
Xunhua Wang , James Madison University, Harrisonburg, VA
pp. 110
Track B: Recovery and Forensics

null (PDF)

pp. null

Multi-Version Attack Recovery for Workflow Systems (Abstract)

Wanyu Zang , Pennsylvania State University
Peng Liu , Pennsylvania State University
Meng Yu , Pennsylvania State University
pp. 142

Automatic Reassembly of Document Fragments via Context Based Statistical Models (Abstract)

Kulesh Shanmugasundaram , Polytechnic University, Brooklyn, NY
Nasir Memon , Polytechnic University, Brooklyn, NY
pp. 152

Automated Analysis for Digital Forensic Science: Semantic Integrity Checking (Abstract)

Karl Levitt , University of California, Davis
Tye Stallard , University of California, Davis
pp. 160
Works in Progress

null (PDF)

pp. null
Invited Essayist Plenary

null (PDF)

pp. null

Honeypots: Catching the Insider Threat (Abstract)

Lance Spitzner , Honeypot Technologies Inc
pp. 170
Track A: Software Safety and Program Correctness

null (PDF)

pp. null

Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs (Abstract)

V. N. Venkatakrishnan , Stony Brook University, NY
Zhenkai Liang , Stony Brook University, NY
R. Sekar , Stony Brook University, NY
pp. 182

How to unwittingly sign non-repudiable documents with Java applications (Abstract)

D. Fabris , Universit? degli Studi di Milano, Italy
D. Bruschi , Universit? degli Studi di Milano, Italy
V. Glave , Universit? degli Studi di Milano, Italy
E. Rosti , Universit? degli Studi di Milano, Italy
pp. 192

Making Secure TCP Connections Resistant to Server Failures (Abstract)

Ramki Thurimella , University of Denver, CO
Hailin Wu , University of Denver, CO
Andrew Burt , University of Denver, CO
pp. 197
Track B: Classic Papers

null (PDF)

pp. null

PSOS Revisited (Abstract)

Peter G. Neumann , SRI International
Richard J. Feiertag , Cougaar Software, Inc.
pp. 208

A Failure to Learn from the Past (Abstract)

Eugene H. Spafford , Purdue University CERIAS
pp. 217
Track A: Event Correlation

null (PDF)

pp. null

Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS (Abstract)

Bingrui Foo , Purdue University
Saurabh Bagchi , Purdue University
Yongguo Mei , Purdue University
Yu-Sung Wu , Purdue University
pp. 234

Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS (Abstract)

Nathan Carey , Queensland University of Technology
Andrew Clark , Queensland University of Technology
George Mohay , Queensland University of Technology
pp. 245

Log Correlation for Intrusion Detection: A Proof of Concept (Abstract)

Yuanyuan Zhou , University of Illinois at Urbana-Champaign
Cristina Abad , University of Illinois at Urbana-Champaign; National Center for Supercomputing Applications (NCSA)
Jed Taylor , University of Illinois at Urbana-Champaign
William Yurcik , National Center for Supercomputing Applications (NCSA)
Cigdem Sengul , University of Illinois at Urbana-Champaign
Ken Rowe , Science Applications International Corporation (SAIC)
pp. 255
Track B: Security Engineering & Management

null (PDF)

pp. null

An Editor for Adaptive XML-Based Policy Management of IPsec (Abstract)

Cynthia E. Irvine , Naval Postgraduate School
Timothy E. Levin , Naval Postgraduate School
Raj Mohan , Indian Army
pp. 276

Security Design in Online Games (Abstract)

Jeff Yan , The Chinese University of Hong Kong
pp. 286
Track A: Enterprise Security

null (PDF)

pp. null

Scalable and Efficient PKI for Inter-Organizational Communication (Abstract)

Arne Ansper , Cybernetica, Tallinn, Estonia
Jan Willemson , Cybernetica, Tallinn, Estonia; Tartu University, Tartu, Estonia
Margus Freudenthal , Cybernetica, Tallinn, Estonia
Ahto Buldas , Cybernetica, Tallinn, Estonia; Tartu University, Tartu, Estonia; Tallinn Technical University
pp. 308
Track B: Forum
Track A: Operating System Security

null (PDF)

pp. null

Goalkeeper: Close-In Interface Protection (Abstract)

Stephen D. Wolthusen , Fraunhofer-IGD, Germany
pp. 334

Poly<sup>2</sup> Paradigm: A Secure Network Service Architecture (Abstract)

Rajeev Gopalakrishna , Purdue University
Keith Watson , Purdue University
Paul Williams , Purdue University
Scott Yost , Purdue University
Eugene H. Spafford , Purdue University
James Early , Purdue University
Eric Bryant , Purdue University
Gregory Roth , Purdue University
pp. 342

Defending Embedded Systems Against Buffer Overflow via Hardware/Software (Abstract)

Qingfeng Zhuge , University of Texas at Dallas
Yi He , University of Texas at Dallas
Zili Shao , University of Texas at Dallas
Edwin H.-M. Sha , University of Texas at Dallas
pp. 352
Track B: Intrusion Detection II

null (PDF)

pp. null

An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems (Abstract)

Giovanni Vigna , University of California, Santa Barbara
Darren Mutz , University of California, Santa Barbara
Richard Kemmerer , University of California, Santa Barbara
pp. 374

Synthesizing Test Data for Fraud Detection Systems (Abstract)

H?kan Kvarnstr? , Chalmers University of Technology
Erland Jonsson , Chalmers University of Technology
Emilie Lundin Barse , Chalmers University of Technology
pp. 384
Track A: Access Control

null (PDF)

pp. null

Differential Data Protection for Dynamic Distributed Applications (Abstract)

Fabian E. Bustamante , Northwestern University
Karsten Schwan , Georgia Institute of Technology
Patrick Widener , Georgia Institute of Technology
pp. 396

Usable Access Control for the World Wide Web (Abstract)

Dirk Balfanz , Palo Alto Research Center
pp. 406

Modelling Contexts in the Or-BAC Model (Abstract)

Alexandre Mi?ge , GET/ENST Bretagne, France
Fr?d?ric Cuppens , GET/ENST Bretagne, France
pp. 416
Track B: Panel

Miracle Cures and Toner Cartridges: Finding Solutions to the Spam Problem (PDF)

Daniel Faigin , The Aerospace Corporation
Matt Bishop , The University of California at Davis
Michael Clifford , The Aerospace Corporation
Tasneem Brutch , Kaiser Permanente
pp. 428

Author Index (PDF)

pp. 430
89 ms
(Ver )