The Community for Technology Leaders
DARPA Information Survivability Conference and Exposition, (2003)
Washington, DC
Apr. 22, 2003 to Apr. 24, 2003
ISSN: 2003102155
ISBN: 0-7695-1897-4
TABLE OF CONTENTS
Composable High Assurance Trusted Systems (CHATS)

Open-Source PKI on SELinux A Technology Description (Abstract)

Edward Bubnis , BBN Technologies
Shelby Evans , BBN Technologies
Peter Fischer , BBN Technologies
Elizabeth Meighan , BBN Technologies
Aswin Almeida , BBN Technologies
pp. 4

Demonstration of COSAK static analysis tools (Abstract)

Dan DaCosta , Drexel University
Christopher Dahn , Drexel University
Spiros Mancoridis , Drexel University
Vassilis Prevelakis , Drexel University
pp. 7

MYSEA Technology Demonstration (Abstract)

Cynthia Irvine , Naval Postgraduate School
David Shifflett , Naval Postgraduate School
Paul Clark , Naval Postgraduate School
Timothy Levin , Naval Postgraduate School
George Dinolt , Naval Postgraduate School
pp. 10

The TrustedBSD MAC Framework (Abstract)

Robert Watson , Network Associates Laboratories
Brian Feldman , Network Associates Laboratories
Adam Migus , Network Associates Laboratories
Chris Vance , Network Associates Laboratories
pp. 13
Cyber Panel

Visualization as an Aid for Assessing the Mission Impact of Information Security Breaches (Abstract)

Anita D?Amico , Secure Decisions, a Division of Applied Visions, Inc.
Stephen Salas , Secure Decisions, a Division of Applied Visions, Inc.
pp. 18

A Controller-Based Autonomic Defense System (Abstract)

Derek Armstrong , ALPHATECH, Inc
Sam Carter , ALPHATECH, Inc
Gregory Frazier , ALPHATECH, Inc
Tiffany Frazier , ALPHATECH, Inc
pp. 21

System Health and Intrusion Monitoring: Technology Description (Abstract)

Calvin Ko , Network Associates Laboratories
pp. 27

An Integrated Cyber Panel System (Abstract)

Laura S. Tinnel , Teknowledge Corporation
O. Sami Saydjari , Cyber Defense Agency
Joshua W. Haines , MIT Lincoln Laboratory
pp. 32
Dynamic Coalitions (DC)

Integrated Security Services for Dynamic Coalitions (Abstract)

Himanshu Khurana , University of Maryland
Serban Gavrila , University of Maryland
Rakeshbabu Bobba , University of Maryland
Radostina Koleva , University of Maryland
Anuja Sonalker , University of Maryland
Emilian Dinu , University of Maryland
Virgil Gligor , University of Maryland
John Baras , University of Maryland
pp. 38

Key Management for Secure Multicast Group Communication in Mobile Networks (Abstract)

Thomas Kostas , Northrop Grumman Corporation
Diane Kiwior , Northrop Grumman Corporation
Gowri Rajappan , Nevelex Corporation
Michel Dalal , Nevelex Corporation
pp. 41

Federated Security Management for Dynamic Coalitions (PDF)

Sandeep Bhatt , Telcordia Technologies
S. Raj Rajagopalan , Telcordia Technologies
Prasad Rao , Telcordia Technologies
pp. 47

TrustBuilder: Negotiating Trust in Dynamic Coalitions (Abstract)

Kent E. Seamons , Brigham Young University
Thomas Chan , Brigham Young University
Evan Child , Brigham Young University
Michael Halcrow , Brigham Young University
Adam Hess , Brigham Young University
Jason Holt , Brigham Young University
Jared Jacobson , Brigham Young University
Ryan Jarvis , Brigham Young University
Aaron Patty , Brigham Young University
Bryan Smith , Brigham Young University
Tore Sundelin , Brigham Young University
Lina Yu , Brigham Young University
pp. 49

A Toolkit For Building Secure, Fault-Tolerant Virtual Private Networks Technology Description (Abstract)

William Stephens , Telcordia Technologies
Brian Coan , Telcordia Technologies
Sanjai Narain , Telcordia Technologies
Vikram Kaul , Telcordia Technologies
Kirthika Parmeswaran , Telcordia Technologies
Thanh Cheng , Telcordia Technologies
pp. 55

Distributed Data Authenication (System Demonstration) (PDF)

Michael T. Goodrich , University of California, Irvine
Michael Shin , Brown University
Christian D. Straub , Brown University
Roberto Tamassia , Brown University
pp. 58

Automated Trust Negotiation Technology with Attribute-based Access Control (Abstract)

Williams H. Winsborough , Network Associates Laboratories
Jay Jacobs , Network Associates Laboratories
pp. 60
Fault Tolerant Networks (FTN)

The Wackamole Approach to Fault Tolerant Networks Demo (PDF)

Yair Amir , Johns Hopkins University
Ryan Caudy , Johns Hopkins University
Ashima Munjal , Johns Hopkins University
Theo Schlossnagle , Johns Hopkins University
Ciprian Tutu , Johns Hopkins University
pp. 64

Distributed Denial of Service Defense Attack Tradeoff Analysis (DDOS-DATA) (PDF)

W. J. Blackert , The Johns Hopkins University
D. M. Gregg , The Johns Hopkins University
A. K. Castner , The Johns Hopkins University
R. L. Hom , The Johns Hopkins University
R. M. Jokerst , The Johns Hopkins University
E. M. Kyle , The Johns Hopkins University
pp. 66

NCAC: Network Congestion Analyzer and Controller (Abstract)

Hyeong-Ah Choi , The George Washington University
Suresh Subramaniam , The George Washington University
Hongsik Choi , The George Washington University
pp. 68

DDoS Tolerant Networks (Abstract)

Laura Feinstein , The Boeing Company
Dan Schnackenberg , The Boeing Company
Ravindra Balupari , Network Associates Laboratories
Darrell Kindred , Network Associates Laboratories
pp. 73

Guaranteed Internet Stack Utilization (GINSU) Building Blocks (PDF)

Roger Knobbe , Network Associates Laboratories
Andrew Purtell , Network Associates Laboratories
pp. 76

ANON: An IP-Layer Anonymizing Infrastructure (Abstract)

Chen-Mou Cheng , Harvard University
H.T. Kung , Harvard University
Koan-Sin Tan , Harvard University
Scott Bradner , Harvard University
pp. 78

Distributed Embedded Firewalls with Virtual Private Groups (Abstract)

Tom Markham , Secure Computing Corporation
Lynn Meredith , Secure Computing Corporation
Charlie Payne , Secure Computing Corporation
pp. 81

Fault-Tolerant Mesh of Trust Applied to DNS Security (Abstract)

Wes Griffin , Network Assoicates Labs
Russ Mundy , Network Assoicates Labs
Sam Weiler , Network Assoicates Labs
Dan Massey , USC/ISI
Naheed Vora , USC/ISI
pp. 84

Demonstration of Fault Tolerance for CORBA Applications (Abstract)

Louise Moser , University of California, Santa Barbara and Eternal Systems, Inc.
Michael Melliar-Smith , University of California, Santa Barbara and Eternal Systems, Inc.
pp. 87

Dynamic Trust-based Resource Allocation (PDF)

Todd Hughes , Lockheed Martin Advanced Technology Laboratories
Mike Junod , Lockheed Martin Advanced Technology Laboratories
Andy Muckelbauer , Lockheed Martin Advanced Technology Laboratories
pp. 90

Active Network Fault Response (Abstract)

Sandra Murphy , Network Associates Laboratories
Abhijit Hayatnagarkar , Network Associates Laboratories
Suresh Krishnaswamy , Network Associates Laboratories
Wayne Morrison , Network Associates Laboratories
Robert Watson , Network Associates Laboratories
pp. 91

COSSACK: Coordinated Suppression of Simultaneous Attacks (Abstract)

Christos Papadopoulos , Information Sciences Institute (ISI)
Robert Lindell , Information Sciences Institute (ISI)
John Mehringer , Information Sciences Institute (ISI)
Alefiya Hussain , Information Sciences Institute (ISI)
Ramesh Govindan , Information Sciences Institute (ISI)
pp. 94

TECHNIQUES FOR INTRUSION-RESISTANT AD HOC ROUTING ALGORITHMS (TIARA) (Abstract)

R. Ramanujan , Architecture Technology Corporation
S. Kudige , Architecture Technology Corporation
T. Nguyen , Architecture Technology Corporation
pp. 98

DefCOM: Defensive Cooperative Overlay Mesh (PDF)

Max Robinson , University of California Los Angeles
Jelena Mirkovic , University of California Los Angeles
Scott Michel , University of California Los Angeles
Matthew Schnaider , University of California Los Angeles
Peter Reiher , University of California Los Angeles
pp. 101

Improving Failure Responsiveness in Jini Leasing (Abstract)

Scott Rose , National Institute of Standards and Technology
Kevin Bowers , National Institute of Standards and Technology
Steve Quirolgico , National Institute of Standards and Technology
Kevin Mills , National Institute of Standards and Technology
pp. 103

SPIE Demonstration: Single Packet Traceback (Abstract)

W. Timothy Strayer , BBN Technologies
Christine E. Jones , BBN Technologies
Fabrice Tchakountio , BBN Technologies
Alex C. Snoeren , BBN Technologies
Beverly Schwartz , BBN Technologies
Robert C. Clements , BBN Technologies
Matthew Condell , BBN Technologies
Craig Partridge , BBN Technologies
pp. 106

Onion Routing for Resistance to Traffic Analysis (Abstract)

Paul Syverson , Naval Research Laboratory
pp. 108

NetBouncer: Client-legitimacy-based High-performance DDoS Filtering (PDF)

Roshan Thomas , Network Associates Laboratories
Hong Zhu , Network Associates Laboratories
Tim Huck , Network Associates Laboratories
Tommy Johnson , Network Associates Laboratories
pp. 111

TetherNet Anti-NAT - Secure Internet Subnet Rental System (Abstract)

Joseph D. Touch , USC/Information Sciences Institute
Lars Eggert , USC/Information Sciences Institute
Yu-Shun Wang , USC/Information Sciences Institute
pp. 112
Organically Assured and Survivable Information Systems (OASIS)

Access Control on the Web Using Proof-carrying Authorization (Abstract)

Lujo Bauer , Princeton University
Michael A. Schneider , Princeton University
Edward W. Felten , Princeton University
Andrew W. Appel , Princeton University
pp. 117

Enterprise Wrappers for Information Assurance (Abstract)

Mark Feldman , Network Associates Laboratories
pp. 120

Willow System Demonstration (Abstract)

John C. Knight , University of Virginia
Jonathan Hill , University of Virginia
Philip Varner , University of Virginia
Premkumar Devanbu , University of California, Davis
Alexander L. Wolf , University of Colorado
Dennis Heimbigner , University of Colorado
pp. 123

Camouflage of Network Traffic to Resist Attack (CONTRA) (PDF)

William Weinstein , The Charles Stark Draper Laboratory, Inc.
Janet Lepanto , The Charles Stark Draper Laboratory, Inc.
pp. 126

Dependable Intrusion Tolerance: Technology Demo (Abstract)

Alfonso Valdes , SRI International
Magnus Almgren , SRI International
Steven Cheung , SRI International
Yves Deswarte , SRI International
Bruno Dutertre , SRI International
Joshua Levy , SRI International
Hassen Saïdi , SRI International
Victoria Stavridou , SRI International
Tomás E. Uribe , SRI International
pp. 128

ITDB: An Attack Self-Healing Database System Prototype (Abstract)

Peng Liu , The Pennsylvania State University
pp. 131

VPNshield: PROTECING VPN SERVICES FROM DENIAL-OF-SERVICE (DoS) ATTACKS (PDF)

R. Ramanujan , Architecture Technology Corporation
M. Kaddoura , Architecture Technology Corporation
J. Wu , Architecture Technology Corporation
C. Sanders , Architecture Technology Corporation
K. Millikin , Architecture Technology Corporation
pp. 138

On-Line Attack Prevention and Continual Recovery (Abstract)

J. Reynolds , Teknowledge Corporation
pp. 140

An Aspect-Oriented Security Framework (Abstract)

Viren Shah , Cigital Labs
Frank Hill , Cigital Labs
pp. 143

OmniVPN (PDF)

pp. 146

Intrusion Tolerant Distributed Object Systems: Project Summary (Abstract)

Gregg Tally , Network Associates Laboratories
Brent Whitmore , Network Associates Laboratories
David Sames , Network Associates Laboratories
Brian Matt , Network Associates Laboratories
Brian Niebuhr , Network Associates Laboratories
David Bakken , Washington State University
pp. 149

SPMA - Java Binary Enhancement Tool (PDF)

Tom Van Vleck , Network Associates Laboratories
Andrew Reisse , Network Associates Laboratories
pp. 152

SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services-A Technology Summary (Abstract)

Feiyi Wang , MCNC Research & Development Institute
Raghu Upppalli , MCNC Research & Development Institute
pp. 153
Operational Experimentation (OPX)
Composable High Assurance Trusted Systems (CHATS)

Modeling Security-Enhanced Linux Policy Specifications for Analysis (Abstract)

Myla Archer , Naval Research Laboratory
Elizabeth Leonard , Naval Research Laboratory
Matteo Pradella , Politecnico di Milano
pp. 164

Open-Source PKI on SELinux (Abstract)

Edward Bubnis , BBN Technologies
Shelby Evans , BBN Technologies
Peter Fischer , BBN Technologies
Elizabeth Meighan , BBN Technologies
Aswin Almeida , BBN Technologies
pp. 170

Monterey Security Enhanced Architecture Project (Abstract)

Cynthia Irvine , Naval Postgraduate School
David Shifflett , Naval Postgraduate School
Paul Clark , Naval Postgraduate School
Timothy Levin , Naval Postgraduate School
George Dinolt , Naval Postgraduate School
pp. 176
Cyber Panel

Visualization as an Aid for Assessing the Mission Impact of Information Security Breaches (Abstract)

Anita D?Amico , Secure Decisions, a Division of Applied Visions, Inc.
Stephen Salas , Secure Decisions, a Division of Applied Visions, Inc.
pp. 190

LLSIM: Network Simulation for Correlation and Response Testing (Abstract)

Joshua W. Haines , Massachusetts Institute of Techonology
Stephen A. Goulet , Massachusetts Institute of Techonology
Robert S. Durst , Skaion Corporation
Terrance G. Champion , Skaion Corporation
pp. 196

System Health and Intrusion Monitoring (SHIM): Project Summary (Abstract)

Calvin Ko , Network Associates Laboratories
Karl Levitt , University of California, Davis
pp. 202
Dynamic Coalitions (DC)

A Framework for Automated Negotiation of Access Control Policies (Abstract)

Vijay G. Bharadwaj , University of Maryland
John S. Baras , University of Maryland
pp. 216

Recommendations in Using Group Key Management Algorithms (Abstract)

Weifeng Chen , University of Massachusetts
Lakshminath R. Dondeti , Strategic protocols group, Nortel Networks
pp. 222

A Flexible Architecture for Security Policy Enforcement (Abstract)

Patrick McDaniel , AT&T Labs - Research
Atul Prakash , University of Michigan
pp. 234

Trust Negotiation in Dynamic Coalitions (Abstract)

Kent E. Seamons , Brigham Young University
Marianne Winslett , University of Illinois at Urbana-Champaign
Ting Yu , University of Illinois at Urbana-Champaign
Thomas Chan , Brigham Young University
Evan Child , Brigham Young University
Michael Halcrow , Brigham Young University
Adam Hess , Brigham Young University
Jason Holt , Brigham Young University
Jared Jacobson , Brigham Young University
Ryan Jarvis , Brigham Young University
Bryan Smith , Brigham Young University
Tore Sundelin , Brigham Young University
Lina Yu , Brigham Young University
pp. 240

Efficient and Scalable Infrastructure Support for Dynamic Coalitions (Abstract)

Michael T. Goodrich , University of California, Irvine
Roberto Tamassia , Brown University
pp. 246

Automated Trust Negotiation in Attribute-based Access Control (Abstract)

Williams H. Winsborough , Network Associates Laboratories
Jay Jacobs , Network Associates Laboratories
pp. 252
Fault Tolerant Networks (FTN)

Traceback of Single IP Packets Using SPIE (Abstract)

W. Timothy Strayer , BBN Technologies
Christine E. Jones , BBN Technologies
Fabrice Tchakountio , BBN Technologies
Alex C. Snoeren , BBN Technologies
Beverly Schwartz , BBN Technologies
Robert C. Clements , BBN Technologies
Matthew Condell , BBN Technologies
Craig Partridge , BBN Technologies
pp. 266

DynaBone: Dynamic Defense Using Multi-layer Internet Overlays (Abstract)

Joseph D. Touch , USC/Information Sciences Institute
Gregory G. Finn , USC/Information Sciences Institute
Yu-Shun Wang , USC/Information Sciences Institute
Lars Eggert , USC/Information Sciences Institute
pp. 271

A Summary of Detection of Denial-of-QoS Attacks on DiffServ Networks (Abstract)

Xiaoyong Wu , MCNC-RDI
Vinay A. Mahadik , North Carolina State University
Douglas S. Reeves , North Carolina State University
pp. 277
Organically Assured and Survivable Information Systems (OASIS)

EMT/MET: Systems for Modeling and Detecting Errant Email (Abstract)

Salvatore J. Stolfo , Columbia University
Shlomo Hershkop , Columbia University
Ke Wang , Columbia University
Olivier Nimeskern , Columbia University
pp. 290

Author's Index (PDF)

pp. 297
80 ms
(Ver 3.3 (11022016))