The Community for Technology Leaders
2012 IEEE Symposium on Security and Privacy (2003)
Berkeley, CA
May 11, 2003 to May 14, 2003
ISSN: 1540-7993
ISBN: 0-7695-1940-7
TABLE OF CONTENTS

Program Committee (PDF)

pp. viii
Session: Anonymity

Mixminion: Design of a Type III Anonymous Remailer Protocol (Abstract)

Nick Mathewson , The Free Haven Project
George Danezis , University of Cambridge
Roger Dingledine , The Free Haven Project
pp. 2

Probabilistic Treatment of MIXes to Hamper Traffic Analysis (Abstract)

Dakshi Agrawal , IBM Watson Research Center
Stefan Penz , Aachen University of Technology
Dogan Kesdogan , Aachen University of Technology
pp. 16

Defending Anonymous Communications Against Passive Logging Attacks (Abstract)

Brian N. Levine , University of Massachusetts
Micah Adler , University of Massachusetts
Matthew Wright , University of Massachusetts
Clay Shields , Georgetown University
pp. 28
Session: IDS

Active Mapping: Resisting NIDS Evasion without Altering Traffic (Abstract)

Vern Paxson , ICSI Center for Internet Research and Lawrence Berkeley National Laboratory
Umesh Shankar , University of California at Berkeley
pp. 44

Anomaly Detection Using Call Stack Information (Abstract)

Henry Hanping Feng , University of Massachusetts
Prahlad Fogla , Georgia Institute of Technology
Wenke Lee , Georgia Institute of Technology
Weibo Gong , University of Massachusetts
Oleg M. Kolesnikov , Georgia Institute of Technology
pp. 62
Session: OS

Defending Against Denial-of-Service Attacks with Puzzle Auctions (Abstract)

Michael K. Reiter , Carnegie Mellon University
XiaoFeng Wang , Carnegie Mellon University
pp. 78

Pi: A Path Identification Mechanism to Defend against DDoS Attacks (Abstract)

Abraham Yaar , Carnegie Mellon University
Dawn Song , Carnegie Mellon University
Adrian Perrig , Carnegie Mellon University
pp. 93
Session: Formal Methods

A Unified Scheme for Resource Protection in Automated Trust Negotiation (Abstract)

Marianne Winslett , University of Illinois at Urbana-Champaign
Ting Yu , University of Illinois at Urbana-Champaign
pp. 110

Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management (Abstract)

Ninghui Li , Stanford University
William H. Winsborough , Network Associates Laboratories
John C. Mitchell , Stanford University
pp. 123

Intransitive Non-Interference for Cryptographic Purposes (Abstract)

Michael Backes , IBM Zurich Research Laboratory
Birgit Pfitzmann , IBM Zurich Research Laboratory
pp. 140
Session: Hardware

Using Memory Errors to Attack a Virtual Machine (Abstract)

Andrew W. Appel , Princeton University
Sudhakar Govindavajhala , Princeton University
pp. 154

Specifying and Verifying Hardware for Tamper-Resistant Software (Abstract)

Mark Horowitz , Stanford University
David Lie , Stanford University
John Mitchell , Stanford University
Chandramohan A. Thekkath , Stanford University
pp. 166
Session: Hardware & Crypto

Secret Handshakes from Pairing-Based Key Agreements (Abstract)

Narendar Shankar , University of Maryland
Hao-Chi Wong , Palo Alto Research Center
Dirk Balfanz , Palo Alto Research Center
Diana Smetters , Palo Alto Research Center
Glenn Durfee , Palo Alto Research Center
Jessica Staddon , Palo Alto Research Center
pp. 180

Random Key Predistribution Schemes for Sensor Networks (Abstract)

Dawn Song , Carnegie Mellon University
Adrian Perrig , Carnegie Mellon University
Haowen Chan , Carnegie Mellon University
pp. 197
Session: Distributed Systems

Hardening Functions for Large Scale Distributed Computations (Abstract)

Jason Owen , University of Richmond
Doug Szajda , University of Richmond
Barry Lawson , University of Richmond
pp. 216

A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards (Abstract)

Yuval Shavitt , Tel Aviv University
Avishai Wool , Tel Aviv University
Noam Kogan , Tel Aviv University
pp. 225

Using Replication and Partitioning to Build Secure Distributed Systems (Abstract)

Andrew C. Myers , Cornell University
Lantian Zheng , Cornell University
Steve Zdancewic , University of Pennsylvania
Stephen Chong , Cornell University
pp. 236

Vulnerabilities in Synchronous IPC Designs (Abstract)

Jonathan S. Shapiro , Johns Hopkins University
pp. 251

Garbage Collector Memory Accounting in Language-Based Systems (Abstract)

Dan S. Wallach , Rice University
Algis Rudys , Rice University
David W. Price , Rice University
pp. 263

Author's Index (PDF)

pp. 275
89 ms
(Ver 3.1 (10032016))