The Community for Technology Leaders
2010 International Workshop on Innovative Architecture for Future Generation High Performance (2005)
College Park, Maryland
Mar. 23, 2005 to Mar. 24, 2005
ISBN: 0-7695-2317-X
TABLE OF CONTENTS
Introduction

Program Committee (PDF)

pp. viii
Malware Defense

A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks (Abstract)

Frank Piessens , Katholieke Universiteit Leuven
Yves Younan , Katholieke Universiteit Leuven
Wouter Joosen , Katholieke Universiteit Leuven
pp. 3-20

Evaluation of Worm Containment Algorithms and Their Effect on Legitimate Traffic (Abstract)

Mohamed Abdelhafez , Georgia Institute of Technology
George F. Riley , Georgia Institute of Technology
pp. 33-42

Malware Defense Using Network Security Authentication (Abstract)

Errin W. Fulp , Wake Forest University
Joseph V. Antrosio , Wake Forest University
pp. 43-54
MANET Security

A General Cooperative Intrusion Detection Architecture for MANETs (Abstract)

J. Rowe , University of California at Davis
T. Bowen , Telcordia Technologies
P. Balasubramanyam , University of California at Davis
R. Balupari , McAfee Research
D. Carman , McAfee Research
R. Talpade , Telcordia Technologies
C-Y. Tseng , University of California at Davis
C. Ko , McAfee Research
B. Wilson , McAfee Research
K. Levitt , University of California at Davis
D. Sterne , McAfee Research
pp. 57-70

SAWAN: A Survivable Architecture for Wireless LANs (Abstract)

Mohit Virendra , State University of New York at Buffalo
Vishal Anand , State University of New York at Brockport
Vivek Kumar , State University of New York at Buffalo
Shambhu Upadhyaya , State University of New York at Buffalo
pp. 71-82
Intrusion Detection I

Meta IDS Environments: An Event Message Anomaly Detection Approach (Abstract)

Michael Bussmann , Research Establishment for Applied Science
Jens Tölle , Research Establishment for Applied Science
Sven Henkel , Research Establishment for Applied Science
Marko Jahnke , Research Establishment for Applied Science
pp. 85-94

An Alert Fusion Framework for Situation Awareness of Coordinated Multistage Attacks (Abstract)

Chintan Shah , State University of New York at Buffalo
Shambhu Upadhyaya , State University of New York at Buffalo
Sunu Mathew , State University of New York at Buffalo
pp. 95-104

Stellar: A Fusion System for Scenario Construction and Security Risk Assessment (Abstract)

Robert Cunningham , Massachussets Institute of Technology
Oliver Dain , Massachussets Institute of Technology
Stephen Boyer , Massachussets Institute of Technology
pp. 105-116
Modeling and Policies

Enforcing Messaging Security Policies (Abstract)

Stephen D. Wolthusen , Fraunhofer-IGD
Jaromir Likavec , Fraunhofer-IGD
pp. 131-138
Intrusion Detection II

The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness (Abstract)

William Yurcik , University of Illinois at Urbana-Champaign
Adam Slagell , University of Illinois at Urbana-Champaign
Xiaoxin Yin , University of Illinois at Urbana-Champaign
pp. 141-153

Forensic Analysis of File System Intrusions Using Improved Backtracking (Abstract)

Sriranjani Sitaraman , University of Texas at Dallas
S. Venkatesan , University of Texas at Dallas
pp. 154-163

Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion Detection Models (Abstract)

Susan M. Bridges , Mississippi State University
Rayford B. Vaughn , Mississippi State University
Zhen Liu , Mississippi State University
pp. 164-177
Author Index

Author Index (PDF)

pp. 179
95 ms
(Ver )