The Community for Technology Leaders
DARPA Information Survivability Conference and Exposition, (2000)
Hilton Head, South Carolina
Jan. 25, 2000 to Jan. 27, 2000
ISBN: 0-7695-0490-6
TABLE OF CONTENTS
Survivability of Large-Scale Systems

Infrastructure for Intrusion Detection and Response (Abstract)

Dan Schnackenberg , Boeing Phantom Works
Kelly Djahandari , Network Associates, Inc.
Dan Sterne , Network Associates, Inc.
pp. 1003

Evaluating Intrusion Detection Systems: The 1998 DARPA Off-line Intrusion Detection Evaluation (Abstract)

Richard P. Lippmann , Massachusetts Institute of Technology
David J. Fried , Massachusetts Institute of Technology
Isaac Graf , Massachusetts Institute of Technology
Joshua W. Haines , Massachusetts Institute of Technology
Kristopher R. Kendall , Massachusetts Institute of Technology
David McClung , Massachusetts Institute of Technology
Dan Weber , Massachusetts Institute of Technology
Seth E. Webster , Massachusetts Institute of Technology
Dan Wyschogrod , Massachusetts Institute of Technology
Robert K. Cunningham , Massachusetts Institute of Technology
Marc A. Zissman , Massachusetts Institute of Technology
pp. 1012

The Common Intrusion Specification Language: A Retrospective (Abstract)

Brian Tung , University of Southern California
pp. 1036

The STAT Tool Suite (Abstract)

Giovanni Vigna , University of California at Santa Barbara
Steve T. Eckmann , University of California at Santa Barbara
Richard A. Kemmerer , University of California at Santa Barbara
pp. 1046

System or Security Managers Adaptive Response Tool (Abstract)

Scott Musman , Integrated Management Services Inc.
Pat Flesher , Integrated Management Services Inc.
pp. 1056

Design and Implementation of a Scalable Intrusion Detection System for the Protection of Network Infrastructure (Abstract)

Y.F. Jou , MCNC
F. Gong , MCNC
C. Sargor , MCNC
X. Wu , MCNC
S.F. Wu , North Carolina State University
H.C. Chang , North Carolina State University
F. Wang , North Carolina State University
pp. 1069

Building Survivable Systems: An Integrated Approach Based on Intrusion Detection and Damage Containment (Abstract)

T. Bowen , Telcordia Technologies
D. Chee , Telcordia Technologies
M. Segal , Telcordia Technologies
R. Sekar , State University of New York at Stony Brook
T. Shanbhag , State University of New York at Stony Brook
P. Uppuluri , State University of New York at Stony Brook
pp. 1084

Design and Implementation of A Real-Time Decentralized Source Identification System for Untrusted IP Packets (Abstract)

H.Y. Chang , North Carolina State University
P. Chen , North Carolina State University
A. Hayatnagarkar R. Narayan , North Carolina State University
P. Sheth , North Carolina State University
N. Vo , North Carolina State University
C.L. Wu S.F. Wu , North Carolina State University
L. Zhang , North Carolina State University
X. Zhang , North Carolina State University
F. Gong , MCNC
F. Jou , MCNC
C. Sargor , MCNC
X. Wu , MCNC
pp. 1100

Red Teaming of Advanced Information Assurance Concepts (Abstract)

Bradley Wood , Sandia National Laboratories
Ruth Duggan , Sandia National Laboratories
pp. 1112

Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade (Abstract)

Crispin Cowan , Oregon Graduate Institute of Science & Technology
Perry Wagle , Oregon Graduate Institute of Science & Technology
Calton Pu , Oregon Graduate Institute of Science & Technology
Steve Beattie , Oregon Graduate Institute of Science & Technology
Jonathan Walpole , Oregon Graduate Institute of Science & Technology
pp. 1119

Cost-Based Modeling for Fraud and Intrusion Detection: Results from the JAM Project (Abstract)

Salvatore J. Stolfo , Columbia University
Wei Fan , Columbia University
Wenke Lee , North Carolina State University
Philip K. Chan , Florida Institute of Technology
pp. 1130

Survivability through Market-Based Adaptivity: The Marx Project (Abstract)

Joseph E. Eggleston , University of Michigan
Sugih Jamin , University of Michigan
Terence P. Kelly , University of Michigan
Jeffrey K. MacKie-Mason , University of Michigan
William E. Walsh , University of Michigan
Michael P. Wellman , University of Michigan
pp. 1145

Survivability Architectures: Issues and Approaches (Abstract)

John C. Knight , University of Virginia
Kevin J. Sullivan , University of Virginia
Matthew C. Elder , University of Virginia
Chenxi Wang , University of Virginia
pp. 1157

Representation and Evaluation of Security Policies for Distributed System Services (Abstract)

Tatyana Ryutov , University of Southern California
Clifford Neuman , University of Southern California
pp. 1172

Eternal: Fault Tolerance and Live Upgrades for Distributed Object Systems (Abstract)

L. E. Moser , University of California at Santa Barbara
P. M. Melliar-Smith , University of California at Santa Barbara
P. Narasimhan , University of California at Santa Barbara
L. A. Tewksbury , University of California at Santa Barbara
V. Kalogeraki , University of California at Santa Barbara
pp. 1184

Open Implementation Toolkit for Building Survivable Applications (Abstract)

Partha P. Pal , BBN Technologies
Joseph P. Loyall , BBN Technologies
Richard E. Schantz , BBN Technologies
John A. Zinky , BBN Technologies
pp. 1197

Diagnosis as an Integral Part of Multi-Agent Adaptability (Abstract)

Bryan Horling , University of Massachusetts
Victor Lesser , University of Massachusetts
Régis Vincent , University of Massachusetts
Ana Bazzan , University of Massachusetts
Ping Xuan , University of Massachusetts
pp. 1211

Model-Based Troubleshooting for Information Survivability (Abstract)

Howard Shrobe , Massachusetts Institute of Technology
pp. 1231

Software Survivability (Abstract)

David Wells , Object Services and Consulting, Inc.
Steve Ford , Object Services and Consulting, Inc.
David Langworthy , Object Services and Consulting, Inc.
Nancy Wells , Object Services and Consulting, Inc.
pp. 1241

The SecureGroup Group Communication System (Abstract)

L.E. Moser , University of California at Santa Barbara
P.M. Melliar-Smith , University of California at Santa Barbara
N. Narasimhan , University of California at Santa Barbara
pp. 1256

Applying Adaptation Spaces to Support Quality of Service and Survivability (Abstract)

Shawn Bowers , Oregon Graduate Institute
Lois Delcambre , Oregon Graduate Institute
David Maier , Oregon Graduate Institute
Crispin Cowan , Oregon Graduate Institute
Perry Wagle , Oregon Graduate Institute
Dylan McNamee , Oregon Graduate Institute
Anne-Fransoise Le Meur , Universitaire de Beaulieu
Heather Hinton , Ryerson Polytechnic Institute
pp. 1271
Wrappers and Composition

SASI Enforcement of Security Policies: A Retrospective (Abstract)

Úlfar Erlingsson , Cornell University
Fred B. Schneider , Cornell University
pp. 1287

Linux Kernel Loadable Wrappers (Abstract)

Terrance Mitchem , Secure Computing Corporation
Raymond Lu , Secure Computing Corporation
Richard O'Brien , Secure Computing Corporation
Kent Larson , Secure Computing Corporation
pp. 1296

Secure Access Wrapper: Mediating Security Between Heterogeneous Databases (Abstract)

S. Dawson , SRI International
P. Samarati , SRI International
S. de Capitani di Vimercati , SRI International
P. Lincoln , SRI International
G. Wiederhold , Stanford University
M. Bilello , Stanford University
J. Akella , Stanford University
Y. Tan , Stanford University
pp. 1308

Hardening COTS Software with Generic Software Wrappers (Abstract)

Timothy Fraser , Network Associates, Inc.
Lee Badger , Network Associates, Inc.
Mark Feldman , Network Associates, Inc.
pp. 1323

Software Fault Injection for Survivability (Abstract)

Jeffrey M. Voas , Reliable Software Technologies
Anup K. Ghosh , Reliable Software Technologies
pp. 1338

Techniques for Evaluating the Robustness of Windows NT Software (Abstract)

Matthew Schmid , Reliable Software Technologies
Anup Ghosh , Reliable Software Technologies
Frank Hill , Reliable Software Technologies
pp. 1347

Mediating Connectors: A Non-ByPassable Process Wrapping Technology (Abstract)

Robert M. Balzer , University of Southern California
Neil M. Goldman , University of Southern California
pp. 1361

Using Composition to Design Secure, Fault-Tolerant Systems (Abstract)

Duane Olawsky , Secure Computing Corporation
Charles Payne , Secure Computing Corporation
Tom Sundquist , Secure Computing Corporation
David Apostal , Secure Computing Corporation
Todd Fine , Secure Computing Corporation
pp. 1380

A Framework for Building Composable Replaceable Security Services (Abstract)

Rich Feiertag , Network Associates, Inc.
Timothy Redmond , Network Associates, Inc.
Sue Rho , Network Associates, Inc.
pp. 1391

Toward a Provably-Correct Implementation of the JVM Bytecode Verifier (Abstract)

Alessandro Coglio , Kestrel Institute
Allen Goldberg , Kestrel Institute
Zhenyu Qian , Kestrel Institute
pp. 1403

Enlisting Event Patterns for Cyber Battlefield Awareness (Abstract)

Louis Perrochon , Stanford University
Eunhei Jang , Stanford University
David C. Luckham , Stanford University
pp. 1411
99 ms
(Ver )