[p2p-hackers] help

Mpallas Nikolaos nmpallas at ceid.upatras.gr
Thu Aug 5 21:45:59 UTC 2004



 Camel is a horse made up in a laboratory
 


On Thu, 5 Aug 2004 p2p-hackers-request at zgp.org wrote:

> Send p2p-hackers mailing list submissions to
> 	p2p-hackers at zgp.org
> 
> To subscribe or unsubscribe via the World Wide Web, visit
> 	http://zgp.org/mailman/listinfo/p2p-hackers
> or, via email, send a message with subject or body 'help' to
> 	p2p-hackers-request at zgp.org
> 
> You can reach the person managing the list at
> 	p2p-hackers-owner at zgp.org
> 
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of p2p-hackers digest..."
> 
> 
> Today's Topics:
> 
>    1. ESORICS 2004 Call for Participation - reminder
>       (Yves.Roudier at eurecom.fr)
>    2. RAID 2004 Call for Participation - reminder
>       (Yves.Roudier at eurecom.fr)
> 
> 
> ----------------------------------------------------------------------
> 
> Message: 1
> Date: Thu, 5 Aug 2004 15:23:48 +0200 (MEST)
> From: Yves.Roudier at eurecom.fr
> Subject: [p2p-hackers] ESORICS 2004 Call for Participation - reminder
> To: p2p-hackers at zgp.org
> Message-ID: <200408051323.i75DNmxI016559 at zinnia.eurecom.fr>
> 
>          [Apologies for multiple copies of this announcement]
> 
>                         CALL FOR PARTICIPATION
> 
>                              ESORICS 2004
>         9th European Symposium on Research in Computer Security
> 
>                Sponsored by SAP, @sec, and Rιgion PACA
> 
>       Institut Eurecom, Sophia Antipolis, French Riviera, France
>                         September 13-15, 2004 
>                      http://esorics04.eurecom.fr  
>              ESORICS 2004 will be collocated with RAID 2004
> 
> 
> Since 1990, ESORICS has been confirmed as the European research event in
> computer security, attracting audience from both the academic and industrial
> communities. The symposium has established itself as one of the premiere,
> international gatherings on Information Assurance. This year's three days
> program will feature a single technical track with 27 full papers selected
> from almost 170 submissions.
> 
> 
>                           PRELIMINARY PROGRAM
>                           -------------------
> 
> Monday, September 13th
> ======================
> 
> 09:15 - 09:30   opening remarks
> 
> 09:30 - 10:30   invited talk
> 
> 10:30 - 11:00   coffee break
> 
> 11:00 - 12:30   Access control
>                 --------------
> 
>   Incorporating Dynamic Constraints in the Flexible Authorization Framework
>   Shiping Chen, Duminda Wijesekera, Sushil Jajodia
> 	
>   Access-Condition-Table-driven Access Control for XML Database
>   Naizhen Qi, Michiharu Kudo
> 
>   An Algebra for Composing Enterprise Privacy Policies
>   Michael Backes, Markus Duermuth, Rainer Steinwandt
> 	
> 12:30 - 14:00   lunch
> 	
> 14:00 - 15:30   Cryptographic protocols
>                 -----------------------
> 
>   Deriving, attacking and defending the GDOI protocol
>   Catherine Meadows, Dusko Pavlovic
> 
>   Better Privacy for Trusted Computing Platforms
>   Jan Camenisch
> 
>   A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees
>   Protocol
>   Michael Backes
> 	
> 15:30 - 16:00   coffee break
> 	
> 16:00 - 17:30   Anonymity and information hiding
>                 --------------------------------
> 
>   A Formalization of Anonymity and Onion Routing
>   Sjouke Mauw, Jan Verschuren, Erik de Vink
> 
>   Breaking Cauchy Model-based JPEG Steganography with First Order Statistics
>   Rainer Bφhme, Andreas Westfeld
> 
>   Comparison between two practical mix designs
>   Claudia Diaz, Len Sassaman, Evelyne Dewitte
> 
> 
> Tuesday, September 14th
> =======================
> 
> 09:00 - 10:30    Distributed data protection
>                  ---------------------------
> 
>   Signature Bouquets: Immutability for Aggregated/Condensed Signatures
>   Einar Mykletun, Maithili Narasimha, Gene Tsudik
> 
>   Towards a theory of data entanglement
>   James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, Sheng Zhong
> 
>   Portable and Flexible Document Access Control Mechanisms
>   Mikhail Atallah, Marina Bykova
> 	
> 10:30 - 11:00   coffee break
> 	
> 11:00 - 12:30   Information flow and security properties
>                 ----------------------------------------
> 
>   Possibilistic Information Flow Control in the Presence of Encrypted
>   Communication
>   Dieter Hutter, Axel Schairer
> 
>   Information flow control revisited: Noninfluence = Noninterference +
>   Nonleakage
>   David von Oheimb
> 
>   Security Property Based Administrative Controls
>   Jon A. Solworth, Robert H. Sloan
> 	
> 12:30 - 14:00   lunch
> 	
> 14:00 - 15:30   Authentication and trust management
>                 -----------------------------------
> 
>   A Vector Model of Trust for Developing Trustworthy Systems
>   Indrajit Ray, Sudip Chakraborty
> 
>   Parameterized Authentication
>   Michael J. Covington, Mustaque Ahamad, Irfan Essa, H. Venkateswaran
> 
>   Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor
>   Networks
>   Bulent Yener, Seyit A. Camtepe
> 	
> 15:30 - 16:00   coffee break
> 	
> 16:00 - 17:30   Cryptography
>                 ------------
> 
>   IPv6 Opportunistic Encryption
>   Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann
> 
>   On the role of key schedules in attacks on iterated ciphers
>   Lars R. Knudsen, John E. Mathiassen
> 
>   A Public-Key Encryption Scheme with Pseudo-Random Ciphertexts
>   Bodo Moller
> 
> Wednesday, September 15th
> =========================
> 
> 09:00 - 10:30   Operating systems and architecture
>                 ----------------------------------
> 
>   A Host Intrusion Prevention System for Windows Operating Systems
>   Roberto Battistoni, Emanuele Gabrielli, Luigi Vincenzo Mancini
> 
>   Re-establishing Trust in Compromised Systems: Recovering from Rootkits
>   that Trojan the System Call Table
>   Julian Grizzard, John Levine, Henry Owen
> 
>   ARCHERR: Runtime Environment Driven Program Safety
>   Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu Upadhyaya
> 	
> 10:30 - 11:00   coffee break
> 	
> 11:00 - 12:30   Intrusion detection
>                 -------------------
> 
>   Sets, Bags, and Rock and Roll Analyzing Large Data Sets of Network Data
>   John McHugh
> 
>   Redundancy and diversity in security
>   Bev Littlewood, Lorenzo Strigini
> 
>   Discover Novel Attack Strategies from INFOSEC Alerts
>   Xinzhou Qin, Wenke Lee
> 
> 
>                            ORGANIZING COMMITTEE
>                            --------------------
> 
> General Chair
>  Refik Molva
>  Institut Eurecom
>  email: Refik.Molva at eurecom.fr 
> 
> Program Chairs 
>  Peter Ryan                              Pierangela Samarati 
>  University of Newcastle upon Tyne       University of Milan 
>  email: Peter.Ryan at newcastle.ac.uk       email: samarati at dti.unimi.it 
>     
> Publication Chair                       Publicity Chair 
>  Dieter Gollmann                         Yves Roudier 
>  TU Hamburg-Harburg                      Institut Eurecom 
>  email: diego at tuhh.de                    email: roudier at eurecom.fr 
>     
> Sponsoring Chair                        
>  Marc Dacier
>  Institut Eurecom
>  email: dacier at eurecom.fr
> 
> 
>                               PROGRAM COMMITTEE
>                               -----------------
> 
>  Vijay Atluri, Rutgers University, USA 
>  Giampaolo Bella, Universitΰ di Catania, Italy 
>  Joachim Biskup, Universitaet Dortmund, Germany 
>  Jan Camenisch, IBM Research, Switzerland 
>  Germano Caronni, Sun Microsystems Laboratories, USA 
>  David Chadwick, University of Salford, UK 
>  Ernesto Damiani, University of Milan, Italy 
>  Sabrina De Capitani di Vimercati, University of Milan, Italy 
>  Yves Deswarte, LAAS-CNRS, France 
>  Alberto Escudero-Pascual, Royal Institute of Technology, Sweden 
>  Csilla Farkas, University of South Carolina, USA 
>  Simon Foley, University College Cork, Ireland 
>  Dieter Gollmann, TU Hamburg-Harburg, Germany 
>  Joshua D. Guttman, MITRE, USA 
>  Sushil Jajodia, George Mason University, USA 
>  Sokratis K. Katsikas, University of the Aegean, Greece 
>  Maciej Koutny, University of Newcastle upon Tyne, UK 
>  Peng Liu, Pennsylvania State University, USA 
>  Javier Lopez, University of Malaga, Spain 
>  Roy Maxion, Carnegie Mellon University, USA 
>  Patrick McDaniel, AT&T Labs-Research, USA 
>  John McHugh, CERT/CC, USA 
>  Catherine A. Meadows, Naval Research Lab, USA 
>  Refik Molva, Institut Eurιcom, France 
>  Peng Ning, NC State University, USA 
>  LouAnna Notargiacomo, The MITRE Corporation, USA 
>  Eiji Okamoto, University of Tsukuba, Japan 
>  Stefano Paraboschi, University of Bergamo, Italy 
>  Andreas Pfitzmann, TU Dresden, Germany 
>  Bart Preneel, Katholieke Universiteit Leuven, Belgium 
>  Jean-Jacques Quisquater, Microelectronic laboratory, Belgium 
>  Steve Schneider, University of London, UK 
>  Christoph Schuba, Sun Microsystems, Inc., USA 
>  Michael Steiner, IBM T.J. Watson Research Laboratory, USA 
>  Paul Syverson, Naval Research Laboratory, USA 
>  Kymie M.C. Tan, Carnegie Mellon University, USA 
>  Dan Thomsen, Tresys Technology, USA 
>  Moti Yung, Columbia University, USA 
> 
> 
> 
>                               VENUE / TRAVEL
>                               --------------
> 
> ESORICS 2004 will be held on the French Riviera coast, about 20 km West of Nice
> and 15 km Northeast of Cannes. The conference will take place at Institut
> Eurecom / CICA, in the Sophia Antipolis science park, which can easily be
> reached thanks to the nearby Nice international airport. For more
> information, refer to: http://esorics04.eurecom.fr/visitor_information.html
> 
> 
>                               IMPORTANT DATES
>                               ---------------
> 
>  ESORICS conference dates: September 13-15, 2004
> 
> 
> ------------------------------
> 
> Message: 2
> Date: Thu, 5 Aug 2004 15:23:59 +0200 (MEST)
> From: Yves.Roudier at eurecom.fr
> Subject: [p2p-hackers] RAID 2004 Call for Participation - reminder
> To: p2p-hackers at zgp.org
> Message-ID: <200408051323.i75DNxjh016652 at zinnia.eurecom.fr>
> 
>          [Apologies for multiple copies of this announcement]
> 
>                         CALL FOR PARTICIPATION
> 
>                               RAID 2004
>                     "Intrusion Detection and Society"
>                    Seventh International Symposium on
>                 Recent Advances in Intrusion Detection
> 
>            Sponsored by SAP, France Telecom, and Rιgion PACA
> 
>       Institut Eurecom, Sophia-Antipolis, French Riviera, France
>                          September 15-17, 2004
>                        http://raid04.eurecom.fr
>              RAID 2004 will be collocated with ESORICS 2004
> 
> 
> The RAID symposium brings together leading researchers and practitioners from
> academia, government, and industry to discuss intrusion detection technologies
> and issues from research and commercial perspectives. 
> 
> This year's program features a single technical track with 14 full papers and
> 2 practical experience reports selected from almost 120 submissions. It also
> includes invited speakers, a poster session as well as an abstracts' session.
> 
> The abstracts' session offers attendees the opportunity to present preliminary
> research results or summaries of work published elsewhere. Poster presentations
> of similar research results are also possible on Wednesday evening. Abstract
> submissions from people not presenting posters are also welcome. Submissions
> to either poster or abstract session should be sent to <dacier at eurecom.fr>.
> For details see http://raid04.eurecom.fr/ .
> 
> 
> 
> 
>                              TECHNICAL PROGRAM
>                              -----------------
> 
> Wednesday, September 15th
> =========================
> 
> 09.00           Registration opens
> 
> 12.30           Lunch
> 
> 14.00 - 14.15   Welcome
> 
> 14.15 - 15.15   Invited Talk: Lessons in Intrusion Detection
>                 Bruce Schneier, Counterpane Internet Security, CA, USA
> 
> 15.15 - 15.45   Coffee break
> 
> 15.45 - 16.45   Modelling process behaviour - Chair: Alfonso Valdes,
>                 (SRI International, USA)
> 
>                 Automatic Extraction of Accurate Application-Specific
>                 Sandboxing Policy,
>                 Lap-chung Lam and Tzi-cker Chiueh,
>                 Rether Networks Inc., Centereach N.Y., USA
> 
>                 Context Sensitive Anomaly Monitoring of Process Control
>                 Flow to Detect Mimicry Attacks and Impossible Paths,
>                 Haizhi Xu, Wenliang Du, and Steve J. Chapin,
>                 Systems Assurance Institute, Syracuse University, USA
> 
> 16.45 - 17.00   Break
> 
> 17.00 - 18.00   Abstract session
> 
> 18.00 -         Poster session
> 
> 
> 
> Thursday, September 16th
> ========================
> 
> 09.00 - 10.30   Detecting Worms and Viruses - Chair: John McHugh
>                 (CMU/SEI CERT, USA)
> 
>                 HoneyStat: Local Worm Detection Using Honeypots,
>                 David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian
>                 Grizzard, John Levine, and Henry Owen,
>                 Georgia Institute of Technology, USA
> 
>                 Fast Detection of Scanning Worm Infections,
>                 Jaeyeon Jung (1), Stuart E. Schechter (2),
>                 and Arthur W. Berger (1),
>                 (1) MIT CSAIL, USA
>                 (2) Harvard DEAS, USA.
> 
>                 Detecting Unknown Massive Mailing Viruses Using
>                 Proactive Methods
>                 Ruiqi Hu and Aloysius K. Mok,
>                 Dept of Computer Sciences, University of Texas at Austin, USA
> 
> 
> 10.30 - 11.00   Coffee break
> 
> 11.00 - 12.30   Attack and Alert Analysis - Chair: Diego Zamboni
>                 (IBM Research, Switzerland)
> 
>                 Using Adaptive Alert Classification to Reduce False Positives
>                 in Intrusion Detection,
>                 Tadeusz Pietraszek, 
>                 IBM Zόrich Research Laboratory, Switzerland.
> 
>                 Attack Analysis and Detection for Ad Hoc Routing Protocols
>                 Yi-an Huang, Wenke Lee,
>                 College of Computing, Georgia Institute of Technology, USA.
> 
>                 On the Design and Use of Internet Sinks for Network Abuse
>                 Monitoring
>                 Vinod Yegneswaran (1), Paul Barford (1), Dave Plonka (2),
>                 (1) Dept of Computer Science, University of Wisconsin,
>                     Madison, USA,
>                 (2) Dept of Information Technology, University of Wisconsin, 
>                     Madison, USA
> 
> 
> 12.30 - 14.00   Lunch
> 
> 14.00 - 15.00   Invited Talk: Fighting Fraud in Telecom Environments 
>                 Hεkan Kvarnstrφm 
>                 TeliaSonera AB, Sweden 
> 
> 15.00 - 15.30   Coffee break
> 
> 15.30 - 16.30   Practical Experience -  Chair: George Mohay
>                 (Queensland University of Technology, Australia)
> 
>                 Monitoring IDS Background Noise Using EWMA Control
>                 Charts and Alert Information
>                 Jouni Viinikka and Herve Debar,
>                 France Telecom R&D, Caen, France
> 
>                 Experience with a Commercial Deception System,
>                 Brian Hernacki, Jeremy Bennett, Thomas Lofgren,
>                 Symantec Corporation, Redwood City, USA
> 
> 16.30 - 17.30   Poster session
> 
> 
> Friday, September 17th
> ======================
> 
> 09.00 - 10.30   Anomaly Detection - Chair: Christopher Kruegel,
>                 (Technical University of Vienna, Austria)
> 
>                 Anomalous Payload-based Network Intrusion Detection
>                 Ke Wang Salvatore J. Stolfo,
>                 Computer Science Dept, Columbia University, USA
> 
>                 Anomaly Detection Using Layered Networks Based on Eigen 
>                 Co-occurrence Matrix
>                 Mizuki Oka (1), Yoshihiro Oyama (2,3), Hirotake Abe (1), and 
>                 Kazuhiko Kato (1,3),
>                 (1) University of Tsukuba, Japan, 
>                 (2) University of Tokyo, Japan,
>                 (3) Japan Science and Technology Cooperation, Japan
> 
>                 Seurat: A Pointillist Approach to Anomaly Detection
>                 Yinglian Xie (1), Hyang-Ah Kim (1), David R. O'Hallaron (1,2) 
>                 Michael K. Reiter (1,2), and Hui Zhang (1,2),
>                 (1) Dept of Computer Science, Carnegie-Mellon University, USA
>                 (2) Dept of Electrical and Computer Engineering, 
>                     Carnegie-Mellon University, USA
>                 
> 
> 10.30 - 11.00   Coffee Break
> 
> 11.00 - 12.30   Formal Analysis for Intrusion Detection - Chair: Wenke Lee
>                 (Georgia Tech, USA)
> 
>                 Detection of Interactive Stepping Stones with Maximum 
>                 Delay Bound: Algorithms and Confidence Bounds
>                 Avrim Blum, Dawn Song, Shobha Venkataraman
>                 Carnegie Mellon University, USA.
> 
>                 Formal Reasoning about Intrusion Detection Systems
>                 Tao Song (1), Calvin Ko (2), Jim Alves-Foss (3), 
>                 Cui Zhang (4), and Karl Levitt (1),
>                 (1) Computer Security Laboratory, University of California,
>                     Davis, USA,
>                 (2) NAI LAbs, Network Associates Inc., Santa Clara, CA, USA,
>                 (3) Center for Secure and Dependable Systems, University
>                     of Idaho, USA 
>                 (4) Computer Science Dept, California State University,
>                     Sacramento, USA.
>                 
>                 RheoStat : Real-time Risk Management
>                 Ashish Gehani and Gershon Kedem,
>                 Dept of Computer Science, Duke University, USA
> 
> 12.30 - 12.45   Concluding remarks
> 
> 12.45 - 14.00   Lunch
> 
> 
> 
> 
>                            ORGANIZING COMMITTEE
>                            --------------------
> 
> 
>    General Chair:     Refik Molva <refik.molva at eurecom.fr>
> 
>    Program Chairs:    Erland Jonsson <erland.jonsson at ce.chalmers.se>
>                       Alfonso Valdes <valdes at sdl.sri.com>
> 
>    Publication Chair: Magnus Almgren <almgren at ce.chalmers.se>
> 
>    Publicity Chair:   Yves Roudier <Yves.Roudier at eurecom.fr>
> 
>    Sponsor Chair:     Marc Dacier <marc.dacier at eurecom.fr>
> 
> 
>                               PROGRAM COMMITTEE
>                               -----------------
> 
>    Tatsuya Baba (NTT Data, Japan)
>    Lee Badger (DARPA, USA)
>    Sungdeok Cha (KAIST, Korea)
>    Steven Cheung (SRI International, USA)
>    Herve Debar (France Telecom R&D, France)
>    Simone Fischer-Hubner (Karlstad University, Sweden)
>    Steven Furnell (University of Plymouth, UK)
>    Dogan Kesdogan (RWTH Aachen, Germany)
>    Chris Kruegel (Technical University of Vienna, Austria)
>    Hakan Kvarnstrom (TeliaSonera R&D, Sweden)
>    Wenke Lee (Georgia Tech, USA)
>    Douglas Maughan (DHS HSARPA, USA)
>    Roy Maxion (Carnegie Mellon University, USA)
>    John McHugh (CMU/SEI CERT, USA)
>    Ludovic Me (Supelec, France)
>    George Mohay (Queensland University of Technology, Australia)
>    Vern Paxson (ICSI and LBNL, USA)
>    Giovanni Vigna (UCSB, USA)
>    Andreas Wespi (IBM Research, Switzerland)
>    Felix Wu (UC Davis, USA)
>    Diego Zamboni (IBM Research, Switzerland)
> 
> 
>                               STEERING COMMITTEE
>                               ------------------
> 
>    Chair: Marc Dacier (Eurecom, France)
> 
>    Herve Debar  (France Telecom R&D, France)
>    Deborah Frincke  (University of Idaho, USA)
>    Huang Ming-Yuh  (The Boeing Company, USA)
>    Wenke Lee  (Georgia Institute of Technology, USA)
>    Ludovic Me  (Supelec, France)
>    S. Felix Wu  (UC Davis, USA)
>    Andreas Wespi  (IBM Research, Switzerland)
>    Giovanni Vigna  (UCSB, USA)
> 
> 
>                               VENUE / TRAVEL
>                               --------------
> 
> RAID 2004 will be held on the French Riviera coast, about 20 km West of Nice
> and 15 km Northeast of Cannes. The conference will take place at Institut
> Eurecom / CICA, in the Sophia Antipolis science park, which can easily be
> reached thanks to the nearby Nice international airport. For more
> information, refer to: http://raid04.eurecom.fr/visitor_information.html
> 
> 
>                               IMPORTANT DATES
>                               ---------------
> 
>  Deadline for abstract/poster submission : August 30, 2004
>      (contact: Marc Dacier <Marc.Dacier at eurecom.fr>)
>  RAID conference dates                   : September 15-17, 2004
> 
> 
> ------------------------------
> 
> _______________________________________________
> p2p-hackers mailing list
> p2p-hackers at zgp.org
> http://zgp.org/mailman/listinfo/p2p-hackers
> 
> 
> End of p2p-hackers Digest, Vol 13, Issue 1
> ******************************************
> 




More information about the P2p-hackers mailing list