To become a USENIX Member, please see our Membership Information.
9th USENIX Security Symposium
August 14-17, 2000
Denver, Colorado, USA
REFEREED PAPERS
Wednesday, August 16
OS Security
Session Chair: Dan Wallach, Rice University
MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications
Anurag Acharya and Mandar Raje, University of California at Santa Barbar
A Secure JaveTM Virtual Machine
Leendert van Doorn, IBM T.J. Watson Research Center
Encrypting Virtual Memory
Niels Provos, University of Michigan
Déjà Vu A User Study: Using Images for Authentication
Rachna Dhamija and Adrian Perrig, University of California at Berkeley
Deomocracy
Session Chair: Ian Goldberg, University of California at Berkeley
Publius: A Robust, Tamper-Evident, Censorship-Resistant Web Publishing System
Marc Waldman, New York University; and Aviel D. Rubin and Lorrie Faith Cranor, AT&T Labs Research
Probabilistic Counting of Large Digital Signature Collections
Markus G. Kuhn, University of Cambridge, U.K.
Can Pseudonymity Really Guarantee Privacy?
Josyula R. Rao and Pankaj Rohatgi, IBM T.J. Watson Research Center
Hardware
Session Chair: Markus Kuhn, University of Cambridge, U.K.
An Open-Source Cryptographic Coprocessor
Peter Gutmann, University of Auckland, New Zealand
Secure Coprocessor Integration with Kerberos V5
Naomaru Itoi, University of Michigan
Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor
John Scott Robin, U.S. Air Force; and Cynthia E. Irvine, Naval Postgraduate School
Thursday, August 17
Intrusion Detection
Session Chair: Wietse Venema, IBM T.J. Watson Research Center
Detecting and Countering System Intrusions Using Software Wrappers
Calvin Ko, Timothy Fraser, Lee Badger, and Douglas Kilpatrick, NAI Labs
Detecting Backdoors
Yin Zhang, Cornell University; and Vern Paxson, AT&T Center for Internet Research at ICSI
Detecting Stepping Stones
Yin Zhang, Cornell University; and Vern Paxson, AT&T Center for Internet Research at ICSI
Automated Response Using System-Call Delays
Anil Somayaji, University of New Mexico; and Stephanie Forrest, Santa Fe Institute
Network Protection
Session Chair: Tara Whalen, Communications Research Centre, Canada
CenterTrack: An IP Overlay Network for Tracking DoS Floods
Robert Stone, UUNET Technologies, Inc.
A Multi-Layer IPsec Protocol
Yongguang Zhang and Bikramjit Singh, HRL Laboratories, LLC
Defeating TCP/IP Stack Fingerprinting
Matthew Smart, G. Robert Malan, and Farnam Jahanian, University of Michigan
E-Mail
Session Chair: Elizabeth Zwicky, Counterpane Internet Security
A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols
Jonathan Katz, Columbia University; and Bruce Schneier, Counterpane Internet Security, Inc.
PGP in Constrained Wireless Devices
Michael Brown and Donny Cheung, University of Waterloo, Canada; Darrel Hankerson, Auburn University; Julio Lopez Hernandez, State University of Campinas, Brazil, and University of Valle, Colombia; and Michael Kirkup and Alfred Menezes, University of Waterloo, Canada
Shibboleth: Private Mailing List Manager
Matt Curtin, Interhack Corporation