The Community for Technology Leaders
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001 (2001)
Oakland, California
May 14, 2001 to May 16, 2001
ISSN: 1540-7993
ISBN: 0-7695-1046-9
Session 1: Tamper-Resistance and Cryptography

Cryptographic Security for Mobile Code (Abstract)

Joy Algesheimer , IBM Research
Christian Cachin , IBM Research
Jan Camenisch , IBM Research
Gunter Karjoth , IBM Research
pp. 0002

Networked Cryptographic Devices Resilient to Capture (Abstract)

Philip MacKenzie , Bell Labs, Lucent Technologies
Michael K. Reiter , Bell Labs, Lucent Technologies
pp. 0012
Session 2: Intrusion and Anomaly Detection I

Data Mining Methods for Detection of New Malicious Executables (Abstract)

Matthew G. Schultz , Columbia University
Eleazar Eskin , Columbia University
Erez Zadok , State University of New York at Stony Brook
Salvatore J. Stolfo , Columbia University
pp. 0038

Evaluation of Intrusion Detectors: A Decision Theory Approach (Abstract)

John E. Gaffney Jr , Lockheed Martin
Jacob W. Ulvila , Decision Science Associates, Inc.
pp. 0050
Session 3: Information Flow

On Confidentiality and Algorithms (Abstract)

Johan Agat , Gatespace AB
David Sands , Chalmers
pp. 0064

Preserving Information Flow Properties under Refinement (Abstract)

Heiko Mantel , German Research Center for Artificial Intelligence (DFKI)
pp. 0078
Session 4: Access Control and Trust Management

Understanding Trust Management Systems (Abstract)

Stephen Weeks , InterTrust Technologies Corporation
pp. 0094

Formal Treatment of Certificate Revocation Under Communal Access Control (Abstract)

Xuhui Ao , Rutgers University
Naftaly H. Minsky , Rutgers University
Victoria Ungureanu , Rutgers University
pp. 0116
Session 5: Intrusion and Anomaly Detection II

Information-Theoretic Measures for Anomaly Detection (Abstract)

Wenke Lee , North Carolina State University
Dong Xiang , North Carolina State University
pp. 0130

A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors (Abstract)

R. Sekar , State University of New York
M. Bendre , State University of New York
D. Dhurjati , State University of New York
P. Bollineni , Iowa State Univeristy
pp. 0144

Intrusion Detection via Static Analysis (Abstract)

David Wagner , U.C. Berkeley
Drew Dean , Xerox PARC
pp. 0156
Session 6: Cryptographic Protocols I
Session 7: What's Really Different

Cryptographic Key Generation from Voice (Abstract)

Fabian Monrose , Bell Labs, Lucent Technologies
Michael K. Reiter , Bell Labs, Lucent Technologies
Qi Li , Bell Labs, Lucent Technologies
Susanne Wetzel , Bell Labs, Lucent Technologies
pp. 0202

A Trend Analysis of Exploitations (Abstract)

Hilary K. Browne , University of Maryland
William A. Arbaugh , University of Maryland
John McHugh , CERT Coordination Center, Software Engineering Institute
William L. Fithen , CERT Coordination Center, Software Engineering Institute
pp. 0214
Invited Talk
Session 8: Cryptographic Protocols II

ELK, a New Protocol for Efficient Large-Group Key Distribution (Abstract)

Adrian Perrig , University of California Berkeley
Dawn Song , University of California Berkeley
J.D. Tygar , University of California Berkeley
pp. 0247

Author Index (PDF)

pp. 0263
80 ms
(Ver 3.3 (11022016))