Date: 5:30 - 7:00pm - Wed. Dec. 7, 2005
Chair: Mary Ellen Zurko, IBM Software Group
The WIP session is intended as a forum to:
- introduce new ideas
- report on ongoing work that may or may not be
complete
- state positions on controversial issues or open
problems
We welcome submissions that are relevant to the general topic
of computer security. In particular, we invite students and engineers from
industry to take this opportunity to exchange their ideas and solutions, as well
as technical problems and practical experience, with the community.
This year's program includes:
- Simple Voice Security Protocol -Carole Bassil, Ecole National Superieur des Telecommunications
- Wireless and Mobile Networks Security . Matthew N. Anyanwu, Jackson State University
- Secure Group Management in Peer-to-Peer Networks . Anish Kamra, Mohamed Shehab, Purdue University
- A Novel Intrusion Detection System Architecture - Duane Wilson, U.S. Army Research Laboratory
- An efficient context-sensitive intrusion detection technique . Haizhi Xu, Syracuse University
- A Flow Reduction Method for Anomaly Detection based on Multi-Stage Traffic Analysis - Masashi TSUJI, Tohoku University
- Data Modeling and Data Warehousing Techniques to Improve IDS . Anoop Singhal, NIST
- Selection of Flow Features for Use in Traffic Characterization - Annie De Montigny, Communications Research Centre Canada
- Traffic Pattern Filtering Based on Lower Bounds of Traffic Volume for DDoS Traceback - Hironori UTSUMI, Tohoku University
- Building Breach Law Compliance into Incident Response Procedures . Cristina Serban, AT&T Labs
- Cost Estimation for Secure Software and Systems - Edward Colbert, University of Southern California
- Hardware acceleration of elliptic curve cryptography for server systems - Christian Puehringer, Graz University of Technology
- The State of Messaging Security: Defenses are Getting Stronger as Evil Doers Morph . Paul Coe, Ciphertrust
- Fine-Grained Taint Analysis using Regular Expressions - Aleks Kissinger, University of Tulsa
- Engineering Challenges in Immunizing Systems Against Malicious Code . Craig Chamberlain, Verdasys
WIP program may be subject to last minute change
Please contact the WIP Chair or the ACSAC Program Chair (program_chair@acsac.org) for any questions on WIP sessions.