The Community for Technology Leaders
DARPA Information Survivability Conference and Exposition, (2003)
Washington, DC
Apr. 22, 2003 to Apr. 24, 2003
ISSN: 2003102155
ISBN: 0-7695-1897-4
TABLE OF CONTENTS
Composable High Assurance Trusted Systems (CHATS)

Open-Source PKI on SELinux A Technology Description (Abstract)

Shelby Evans , BBN Technologies
Aswin Almeida , BBN Technologies
Edward Bubnis , BBN Technologies
Peter Fischer , BBN Technologies
Elizabeth Meighan , BBN Technologies
pp. 4

Demonstration of COSAK static analysis tools (Abstract)

Vassilis Prevelakis , Drexel University
Dan DaCosta , Drexel University
Christopher Dahn , Drexel University
Spiros Mancoridis , Drexel University
pp. 7

MYSEA Technology Demonstration (Abstract)

George Dinolt , Naval Postgraduate School
Paul Clark , Naval Postgraduate School
David Shifflett , Naval Postgraduate School
Cynthia Irvine , Naval Postgraduate School
Timothy Levin , Naval Postgraduate School
pp. 10

The TrustedBSD MAC Framework (Abstract)

Chris Vance , Network Associates Laboratories
Brian Feldman , Network Associates Laboratories
Robert Watson , Network Associates Laboratories
Adam Migus , Network Associates Laboratories
pp. 13
Cyber Panel

Visualization as an Aid for Assessing the Mission Impact of Information Security Breaches (Abstract)

Stephen Salas , Secure Decisions, a Division of Applied Visions, Inc.
Anita D?Amico , Secure Decisions, a Division of Applied Visions, Inc.
pp. 18

A Controller-Based Autonomic Defense System (Abstract)

Sam Carter , ALPHATECH, Inc
Gregory Frazier , ALPHATECH, Inc
Tiffany Frazier , ALPHATECH, Inc
Derek Armstrong , ALPHATECH, Inc
pp. 21

System Health and Intrusion Monitoring: Technology Description (Abstract)

Calvin Ko , Network Associates Laboratories
pp. 27

An Integrated Cyber Panel System (Abstract)

Laura S. Tinnel , Teknowledge Corporation
O. Sami Saydjari , Cyber Defense Agency
Joshua W. Haines , MIT Lincoln Laboratory
pp. 32
Dynamic Coalitions (DC)

Integrated Security Services for Dynamic Coalitions (Abstract)

Anuja Sonalker , University of Maryland
Radostina Koleva , University of Maryland
Emilian Dinu , University of Maryland
Himanshu Khurana , University of Maryland
Rakeshbabu Bobba , University of Maryland
Serban Gavrila , University of Maryland
Virgil Gligor , University of Maryland
John Baras , University of Maryland
pp. 38

Key Management for Secure Multicast Group Communication in Mobile Networks (Abstract)

Michel Dalal , Nevelex Corporation
Thomas Kostas , Northrop Grumman Corporation
Diane Kiwior , Northrop Grumman Corporation
Gowri Rajappan , Nevelex Corporation
pp. 41

Federated Security Management for Dynamic Coalitions (PDF)

Sandeep Bhatt , Telcordia Technologies
S. Raj Rajagopalan , Telcordia Technologies
Prasad Rao , Telcordia Technologies
pp. 47

TrustBuilder: Negotiating Trust in Dynamic Coalitions (Abstract)

Evan Child , Brigham Young University
Jared Jacobson , Brigham Young University
Ryan Jarvis , Brigham Young University
Kent E. Seamons , Brigham Young University
Tore Sundelin , Brigham Young University
Jason Holt , Brigham Young University
Lina Yu , Brigham Young University
Adam Hess , Brigham Young University
Bryan Smith , Brigham Young University
Michael Halcrow , Brigham Young University
Thomas Chan , Brigham Young University
Aaron Patty , Brigham Young University
pp. 49

A Toolkit For Building Secure, Fault-Tolerant Virtual Private Networks Technology Description (Abstract)

Vikram Kaul , Telcordia Technologies
Thanh Cheng , Telcordia Technologies
Kirthika Parmeswaran , Telcordia Technologies
Brian Coan , Telcordia Technologies
Sanjai Narain , Telcordia Technologies
William Stephens , Telcordia Technologies
pp. 55

Distributed Data Authenication (System Demonstration) (PDF)

Michael T. Goodrich , University of California, Irvine
Christian D. Straub , Brown University
Michael Shin , Brown University
Roberto Tamassia , Brown University
pp. 58

Automated Trust Negotiation Technology with Attribute-based Access Control (Abstract)

Williams H. Winsborough , Network Associates Laboratories
Jay Jacobs , Network Associates Laboratories
pp. 60
Fault Tolerant Networks (FTN)

The Wackamole Approach to Fault Tolerant Networks Demo (PDF)

Yair Amir , Johns Hopkins University
Ashima Munjal , Johns Hopkins University
Ciprian Tutu , Johns Hopkins University
Theo Schlossnagle , Johns Hopkins University
Ryan Caudy , Johns Hopkins University
pp. 64

Distributed Denial of Service Defense Attack Tradeoff Analysis (DDOS-DATA) (PDF)

R. M. Jokerst , The Johns Hopkins University
R. L. Hom , The Johns Hopkins University
W. J. Blackert , The Johns Hopkins University
A. K. Castner , The Johns Hopkins University
E. M. Kyle , The Johns Hopkins University
D. M. Gregg , The Johns Hopkins University
pp. 66

NCAC: Network Congestion Analyzer and Controller (Abstract)

Suresh Subramaniam , The George Washington University
Hongsik Choi , The George Washington University
Hyeong-Ah Choi , The George Washington University
pp. 68

DDoS Tolerant Networks (Abstract)

Ravindra Balupari , Network Associates Laboratories
Dan Schnackenberg , The Boeing Company
Laura Feinstein , The Boeing Company
Darrell Kindred , Network Associates Laboratories
pp. 73

Guaranteed Internet Stack Utilization (GINSU) Building Blocks (PDF)

Roger Knobbe , Network Associates Laboratories
Andrew Purtell , Network Associates Laboratories
pp. 76

ANON: An IP-Layer Anonymizing Infrastructure (Abstract)

Scott Bradner , Harvard University
Koan-Sin Tan , Harvard University
Chen-Mou Cheng , Harvard University
H.T. Kung , Harvard University
pp. 78

Distributed Embedded Firewalls with Virtual Private Groups (Abstract)

Tom Markham , Secure Computing Corporation
Lynn Meredith , Secure Computing Corporation
Charlie Payne , Secure Computing Corporation
pp. 81

Fault-Tolerant Mesh of Trust Applied to DNS Security (Abstract)

Wes Griffin , Network Assoicates Labs
Dan Massey , USC/ISI
Russ Mundy , Network Assoicates Labs
Naheed Vora , USC/ISI
Sam Weiler , Network Assoicates Labs
pp. 84

Demonstration of Fault Tolerance for CORBA Applications (Abstract)

Louise Moser , University of California, Santa Barbara and Eternal Systems, Inc.
Michael Melliar-Smith , University of California, Santa Barbara and Eternal Systems, Inc.
pp. 87

Dynamic Trust-based Resource Allocation (PDF)

Mike Junod , Lockheed Martin Advanced Technology Laboratories
Andy Muckelbauer , Lockheed Martin Advanced Technology Laboratories
Todd Hughes , Lockheed Martin Advanced Technology Laboratories
pp. 90

Active Network Fault Response (Abstract)

Wayne Morrison , Network Associates Laboratories
Suresh Krishnaswamy , Network Associates Laboratories
Robert Watson , Network Associates Laboratories
Abhijit Hayatnagarkar , Network Associates Laboratories
Sandra Murphy , Network Associates Laboratories
pp. 91

COSSACK: Coordinated Suppression of Simultaneous Attacks (Abstract)

Robert Lindell , Information Sciences Institute (ISI)
Alefiya Hussain , Information Sciences Institute (ISI)
John Mehringer , Information Sciences Institute (ISI)
Ramesh Govindan , Information Sciences Institute (ISI)
Christos Papadopoulos , Information Sciences Institute (ISI)
pp. 94

TECHNIQUES FOR INTRUSION-RESISTANT AD HOC ROUTING ALGORITHMS (TIARA) (Abstract)

R. Ramanujan , Architecture Technology Corporation
T. Nguyen , Architecture Technology Corporation
S. Kudige , Architecture Technology Corporation
pp. 98

DefCOM: Defensive Cooperative Overlay Mesh (PDF)

Peter Reiher , University of California Los Angeles
Matthew Schnaider , University of California Los Angeles
Scott Michel , University of California Los Angeles
Jelena Mirkovic , University of California Los Angeles
Max Robinson , University of California Los Angeles
pp. 101

Improving Failure Responsiveness in Jini Leasing (Abstract)

Scott Rose , National Institute of Standards and Technology
Kevin Mills , National Institute of Standards and Technology
Steve Quirolgico , National Institute of Standards and Technology
Kevin Bowers , National Institute of Standards and Technology
pp. 103

SPIE Demonstration: Single Packet Traceback (Abstract)

W. Timothy Strayer , BBN Technologies
Christine E. Jones , BBN Technologies
Robert C. Clements , BBN Technologies
Alex C. Snoeren , BBN Technologies
Craig Partridge , BBN Technologies
Beverly Schwartz , BBN Technologies
Matthew Condell , BBN Technologies
Fabrice Tchakountio , BBN Technologies
pp. 106

Onion Routing for Resistance to Traffic Analysis (Abstract)

Paul Syverson , Naval Research Laboratory
pp. 108

NetBouncer: Client-legitimacy-based High-performance DDoS Filtering (PDF)

Hong Zhu , Network Associates Laboratories
Tommy Johnson , Network Associates Laboratories
Roshan Thomas , Network Associates Laboratories
Tim Huck , Network Associates Laboratories
pp. 111

TetherNet Anti-NAT - Secure Internet Subnet Rental System (Abstract)

Lars Eggert , USC/Information Sciences Institute
Joseph D. Touch , USC/Information Sciences Institute
Yu-Shun Wang , USC/Information Sciences Institute
pp. 112
Organically Assured and Survivable Information Systems (OASIS)

Access Control on the Web Using Proof-carrying Authorization (Abstract)

Lujo Bauer , Princeton University
Michael A. Schneider , Princeton University
Edward W. Felten , Princeton University
Andrew W. Appel , Princeton University
pp. 117

Enterprise Wrappers for Information Assurance (Abstract)

Mark Feldman , Network Associates Laboratories
pp. 120

Willow System Demonstration (Abstract)

Philip Varner , University of Virginia
Alexander L. Wolf , University of Colorado
Dennis Heimbigner , University of Colorado
Jonathan Hill , University of Virginia
Premkumar Devanbu , University of California, Davis
John C. Knight , University of Virginia
pp. 123

Camouflage of Network Traffic to Resist Attack (CONTRA) (PDF)

Janet Lepanto , The Charles Stark Draper Laboratory, Inc.
William Weinstein , The Charles Stark Draper Laboratory, Inc.
pp. 126

Dependable Intrusion Tolerance: Technology Demo (Abstract)

Bruno Dutertre , SRI International
Steven Cheung , SRI International
Yves Deswarte , SRI International
Victoria Stavridou , SRI International
Joshua Levy , SRI International
Alfonso Valdes , SRI International
Magnus Almgren , SRI International
Tomás E. Uribe , SRI International
Hassen Saïdi , SRI International
pp. 128

ITDB: An Attack Self-Healing Database System Prototype (Abstract)

Peng Liu , The Pennsylvania State University
pp. 131

VPNshield: PROTECING VPN SERVICES FROM DENIAL-OF-SERVICE (DoS) ATTACKS (PDF)

K. Millikin , Architecture Technology Corporation
R. Ramanujan , Architecture Technology Corporation
M. Kaddoura , Architecture Technology Corporation
J. Wu , Architecture Technology Corporation
C. Sanders , Architecture Technology Corporation
pp. 138

On-Line Attack Prevention and Continual Recovery (Abstract)

J. Reynolds , Teknowledge Corporation
pp. 140

An Aspect-Oriented Security Framework (Abstract)

Viren Shah , Cigital Labs
Frank Hill , Cigital Labs
pp. 143

OmniVPN (PDF)

pp. 146

Intrusion Tolerant Distributed Object Systems: Project Summary (Abstract)

Brent Whitmore , Network Associates Laboratories
Brian Matt , Network Associates Laboratories
Brian Niebuhr , Network Associates Laboratories
David Bakken , Washington State University
David Sames , Network Associates Laboratories
Gregg Tally , Network Associates Laboratories
pp. 149

SPMA - Java Binary Enhancement Tool (PDF)

Tom Van Vleck , Network Associates Laboratories
Andrew Reisse , Network Associates Laboratories
pp. 152

SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services-A Technology Summary (Abstract)

Raghu Upppalli , MCNC Research & Development Institute
Feiyi Wang , MCNC Research & Development Institute
pp. 153
Operational Experimentation (OPX)
Composable High Assurance Trusted Systems (CHATS)

Modeling Security-Enhanced Linux Policy Specifications for Analysis (Abstract)

Matteo Pradella , Politecnico di Milano
Myla Archer , Naval Research Laboratory
Elizabeth Leonard , Naval Research Laboratory
pp. 164

Open-Source PKI on SELinux (Abstract)

Aswin Almeida , BBN Technologies
Elizabeth Meighan , BBN Technologies
Edward Bubnis , BBN Technologies
Shelby Evans , BBN Technologies
Peter Fischer , BBN Technologies
pp. 170

Monterey Security Enhanced Architecture Project (Abstract)

Timothy Levin , Naval Postgraduate School
David Shifflett , Naval Postgraduate School
Paul Clark , Naval Postgraduate School
Cynthia Irvine , Naval Postgraduate School
George Dinolt , Naval Postgraduate School
pp. 176
Cyber Panel

Visualization as an Aid for Assessing the Mission Impact of Information Security Breaches (Abstract)

Anita D?Amico , Secure Decisions, a Division of Applied Visions, Inc.
Stephen Salas , Secure Decisions, a Division of Applied Visions, Inc.
pp. 190

LLSIM: Network Simulation for Correlation and Response Testing (Abstract)

Stephen A. Goulet , Massachusetts Institute of Techonology
Robert S. Durst , Skaion Corporation
Terrance G. Champion , Skaion Corporation
Joshua W. Haines , Massachusetts Institute of Techonology
pp. 196

System Health and Intrusion Monitoring (SHIM): Project Summary (Abstract)

Karl Levitt , University of California, Davis
Calvin Ko , Network Associates Laboratories
pp. 202
Dynamic Coalitions (DC)

A Framework for Automated Negotiation of Access Control Policies (Abstract)

Vijay G. Bharadwaj , University of Maryland
John S. Baras , University of Maryland
pp. 216

Recommendations in Using Group Key Management Algorithms (Abstract)

Weifeng Chen , University of Massachusetts
Lakshminath R. Dondeti , Strategic protocols group, Nortel Networks
pp. 222

A Flexible Architecture for Security Policy Enforcement (Abstract)

Patrick McDaniel , AT&T Labs - Research
Atul Prakash , University of Michigan
pp. 234

Trust Negotiation in Dynamic Coalitions (Abstract)

Lina Yu , Brigham Young University
Marianne Winslett , University of Illinois at Urbana-Champaign
Ting Yu , University of Illinois at Urbana-Champaign
Kent E. Seamons , Brigham Young University
Thomas Chan , Brigham Young University
Michael Halcrow , Brigham Young University
Jared Jacobson , Brigham Young University
Bryan Smith , Brigham Young University
Evan Child , Brigham Young University
Adam Hess , Brigham Young University
Ryan Jarvis , Brigham Young University
Jason Holt , Brigham Young University
Tore Sundelin , Brigham Young University
pp. 240

Efficient and Scalable Infrastructure Support for Dynamic Coalitions (Abstract)

Michael T. Goodrich , University of California, Irvine
Roberto Tamassia , Brown University
pp. 246

Automated Trust Negotiation in Attribute-based Access Control (Abstract)

Williams H. Winsborough , Network Associates Laboratories
Jay Jacobs , Network Associates Laboratories
pp. 252
Fault Tolerant Networks (FTN)

Traceback of Single IP Packets Using SPIE (Abstract)

Craig Partridge , BBN Technologies
Christine E. Jones , BBN Technologies
Fabrice Tchakountio , BBN Technologies
Alex C. Snoeren , BBN Technologies
W. Timothy Strayer , BBN Technologies
Robert C. Clements , BBN Technologies
Beverly Schwartz , BBN Technologies
Matthew Condell , BBN Technologies
pp. 266

DynaBone: Dynamic Defense Using Multi-layer Internet Overlays (Abstract)

Yu-Shun Wang , USC/Information Sciences Institute
Gregory G. Finn , USC/Information Sciences Institute
Joseph D. Touch , USC/Information Sciences Institute
Lars Eggert , USC/Information Sciences Institute
pp. 271

A Summary of Detection of Denial-of-QoS Attacks on DiffServ Networks (Abstract)

Vinay A. Mahadik , North Carolina State University
Xiaoyong Wu , MCNC-RDI
Douglas S. Reeves , North Carolina State University
pp. 277
Organically Assured and Survivable Information Systems (OASIS)

EMT/MET: Systems for Modeling and Detecting Errant Email (Abstract)

Olivier Nimeskern , Columbia University
Shlomo Hershkop , Columbia University
Salvatore J. Stolfo , Columbia University
Ke Wang , Columbia University
pp. 290

Author's Index (PDF)

pp. 297
90 ms
(Ver 3.1 (10032016))