10th USENIX Security Symposium 2001 Aug. 13, 2001 to Aug. 17, 2001, Washington DC, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Address: Web-Enabled Gadgets: Can We Trust Them? Richard M. Smith The new frontier for consumer electronic devices is the Internet. We are now seeing devices ... Security Keynote
Denial Of Service Steve Bellovin None Security
Using Client Puzzles To Protect Tls Adam Stubblefield , Drew Dean None Security
Inferring Internet Denial-Of-Service Activity Geoffrey M. Voelker , Stefan Savage , David Moore None Security
Multops: A Data-Structure For Bandwidth Attack Detection Thomer M. Gil , Massimiliano Poletto None Security
A Maze Of Twisty Little Statutes, All Alike: The Electronic Communications Privacy Act Of 1986(And Its Application To Network Service Providers) Mark Eckenwiler In the United States, the Electronic Communications Privacy Act of 1986 (ECPA) governs the acquisition ... Security Privacy Legal
Hardware Dirk Balfanz None Security Hardware General
Data Remanence In Semiconductor Devices Peter Gutmann None Security Hardware General Forensics
Stackghost: Hardware Facilitated Stack Protection Mike Frantzen , Mike Shuey None Security
Improving Des Coprocessor Throughput For Short Operations Mark Lindemann , Sean W. Smith None Security
Loaning Your Soul To The Devil: Influencing Policy Without Selling Out Matt Blaze All of a sudden, it seems, computer security and cryptology have become important not only ... Security Risk
Firewalls/Intrusion Detection Hobbit , Peiter ( Mudge ) Zatko Security Firewall
Architecting The Lumeta Firewall Analyzer Avishai Wool None Security Firewall
Transient Addressing For Related Processes: Improved Firewalling By Using Ipv6 And Multiple Addresses Per Host Steven M. Bellovin , Peter M. Gleitz None Security IPv6
Network Intrusion Detection: Evasion, Traffic Normalization, And End-To-End Protocol Semantics Mark Handley , Vern Paxson , Christian Kreibich None Security
Cops Are From Mars, Sysadmins Are From Pluto: Dealing With Law Enforcement Tom Perrine In today's Internet, it is inevitable that system administrators and security managers will have to ... Security Law Enforcement
Reading Between The Lines: Lessons From The Sdmi Challenge Dan S. Wallach , Adam Stubblefield , Scott A. Craver , Min Wu , Bede Liu , Ben Swartzlander , Drew Felten None Security
Panel Discussion On Sdmi/Dmca Cindy Cohn , Edward W. Felten , Dan S. Wallach , Peter Jaszi This is a joint session with the General Track . Security Panel
Operating Systems Teresa Lunt None Security
Security Analysis Of The Palm Operating System And Its Weaknesses Against Malicious Code Threats Hobbit , Joe ( Kingpin ) Grand , Peiter ( Mudge ) Zatko Security Analysis
Secure Data Deletion For Linux File Systems Steven Bauer , Nissanka B. Priyantha None Security
Raceguard: Kernel Protection From Temporary File Race Vulnerabilities Crispin Cowan , Steve Beattie , Christian Wright , Greg Kroah-hartman None Security
Changes In Deployment Of Cryptography, And Possible Causes Eric Murray SSL/TLS is arguably the most widely deployed cryptographic protocol and is readily characterized. Last year ... Security Cryptography
Managing Code Trent Jaeger None Security
Statically Detecting Likely Buffer Overflow Vulnerabilities David Evans , David Larochelle None Security
Formatguard: Automatic Protection From Printf Format String Vulnerabilities Steve Beattie , Mike Frantzen , Greg Kroah-hartman , Matt Barringer , Jamie Lokier , Crispin Cowan Security
Detecting Format String Vulnerabilities With Type Qualifiers David A. Wagner , Umesh Shankar , Kunal Talwar , Jeffrey S. Foster None Security
Reversing The Panopticon John Young , Deborah Natsios Cryptome welcomes documents for publication that are prohibited by governments worldwide--in particular, material on cryptology; ... Security
Authorization Carl Ellison None Security
Capability File Names: Separating Authorisation From User Management In An Internet File System Jude T. Regan , Christian damsgaard Jensen None Security
Kerberized Credential Translation: A Solution To Web Access Control Peter Honeyman , Kevin Coffman , Olga Kornievskaia , Bill Doster None Security Web Access
The Dos And Don'Ts Of Client Authentication On The Web Kevin Fu , Nick Feamster , Emil Sit , Kendra Smith None Security Web
Designing Against Traffic Analysis Paul Syverson Traffic analysis reveals who is communicating with whom and in what way. Thus, traffic-analysis-resistant communication ... Security Analysis Network
Key Management Peter Gutmann None Security
Sc-Cfs: Smartcard Secured Cryptographic File System Naomaru Itoi None Security
Secure Distribution Of Events In Content-Based Publish Subscribe Systems Atul Prakash , Lukasz Opyrchal None Security
A Method For Fast Revocation Of Public Key Certificates And Security Capabilities Dan Boneh , Xuhua Ding , Gene Tsudik , Chi Ming Wong None Security Privacy
Countering Syn Flood Denial-Of-Service (Dos) Attacks Ross Oliver , Tech Mavens A great deal of attention has been focused on DoS attacks in the past year, ... Security Firewall Network
Math Attacks! Ian Goldberg None Security
Pdm: A New Strong Password-Based Protocol Charlie Kaufman , Radia Perlman None Security
Defending Against Statistical Steganalysis Niels Provos None Security Cryptography
Timing Analysis Of Keystrokes And Timing Attacks On Ssh Dawn Xiaodong Song , Xuqing Tian , David A. Wagner Security Analysis
Real Stateful Tcp Packet Filtering In Ip-Filter Guido van Rooij Ip-filter, an open-source packet-filtering engine, is available for a number of operating systems. Ip-filter comes ... Security