#
# Wednesday
#

Wednesday, August 25, 1999 9:00am|10:30am|Opening Remarks & Keynote|note
Opening Remarks and Best Paper Awards 
Win Treese, Open Market, Inc.

Keynote Address - The Next Generation of Security 
Taher Elgamal, President, Information Security Group, Kroll-O'Gara 

The one predictable thing about the security industry is that it will remain unpredictable, because every new device or application adds new holes and vulnerabilities. The security industry is developing from a static model of shared secrets and acl's to PKIs, to single sign-on, and policy-based applications. The growth of E-commerce will not only drive the security industry but shape it towards risk-based thinking. We are moving from "this is a secure network because of the firewall" to "this is an adequate (or acceptable level of risk) IT system for our type of business."

As Chief Scientist of Netscape Communications Corporation, Dr. Elgamal pioneered Internet security technologies such as SSL, developed a number of Internet payment schemes, and participated in the "SET" credit card payment protocol.  He has a long career in cryptography and security, which started with a Ph.D. at Stanford, where he pioneered original public key cryptography and digital signature technology, inventing the Elgamal cryptography technology which was adopted by NIST in the DSS digital signature standard. He was director of engineering at RSA Data Security, Inc., where he produced the RSA cryptographic toolkits, the industry standards for developers of security-enabled applications and systems.
END

11:00am|12:30pm|The Burglar Alarm Builder's Toolbox|note
Marcus Ranum, CEO, Network Flight Recorder, Inc.

When you're protecting your site, don't ignore the home court advantage! One of the best ways to detect attackers is by instrumenting your system with unexpected booby traps and alarm bells. Make your system or network into a virtual minefield for hackers to play in. I will present a few useful tools and sick, twisted ideas for building burglar alarms.
END

2:00pm|3:30pm|ActiveX Insecurities|note
Richard M. Smith, President, Phar Lap Software, Inc.

Microsoft's ActiveX technology in the Internet Explorer browser is enough to give any person concerned about computer security the willies. Here we have binary executables being automatically downloaded and run by Web pages right past most firewalls. ActiveX controls do not execute in any sort of security sandbox and have complete access to a computer. Microsoft offers us their Authenticode technology to protect us from people creating malicious controls. So far, it's not hackers but major hardware and software vendors such as Microsoft, HP, Compaq, and MSNBC who have created clever methods of delivering questionable ActiveX controls and finding backdoors into Authenticode. Richard will describe Authenticode's inner workings. He'll demonstrate many of the problems he has found with different vendors' ActiveX controls and will show how these controls can be easily misused by anyone. He will also offer some potential solutions to problems created by ActiveX controls and weaknesses in the design of Authenticode.
END

4:00pm|5:30pm|Designing a Secure Multi-Agent Market|note
Edward W. Felten, Professor, Princeton University

Recently, a group at Princeton designed a secure electronic stock market that allows clients to inject trading "agent" programs that monitor the market and act on the client's behalf. Systems of this type raise some very difficult security issues. By allowing traders to write their agents in a general-purpose programming language, we allow great flexibility in designing trading strategies, which makes the market more interesting and efficient. However, giving so much freedom to the agents forces us to rigorously control what agents can do and what resources they can use. This talk will discuss the problems encountered in building a secure agent trading market, present the solutions our group devised and the compromises we made, and point the way to future research needed to build and deploy such systems in the real world.
END

7:00pm|9:00pm|Reception|

11:00am|12:30pm|PDAs|note
Session Chair: Jim Duncan, Cisco Systems, Inc. 

The Design and Analysis of Graphical Passwords 
Ian Jermyn, New York University; Alain Mayer, Bell Laboratories, Lucent Technologies; Fabian Monrose, New York University; Michael K. Reiter, Bell Laboratories, Lucent Technologies; Aviel Rubin, AT&T Labs - Research

Hand-Held Computers Can Be Better Smart Cards 
Dirk Balfanz, Edward W. Felten, Princeton University 

Offline Delegation
Arne Helme, Tage Stabell-Kul, University of Troms, Norway
END

2:00pm|3:30pm|Cages|note
Session Chair: Crispin Cowan, Oregon Graduate Institute 

Vaulted VPN: Compartmented Virtual Private Networks on Trusted Operating Systems
Tse-Huong Choo, Hewlett-Packard Laboratories

Enforcing Well-Formed and Partially-Formed Transactions for UNIX
Dean Povey, Cooperative Research Centre for Enterprise Distributed Systems, Queensland University of Technology

Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications
R. Sekar, Prem Uppuluri, State University of New York at Stony Brook
END

4:00pm|5:30pm|Keys|note
Session Chair: Carl Ellison, Intel Corporation 

Building Intrusion-Tolerant Applications
Thomas Wu, Michael Malkin, Dan Boneh, Stanford University

Brute Force Attack on UNIX Passwords with SIMD Computer
Gershon Kedem, Yuriko Ishihara, Duke University

Antigone: A Flexible Framework for Secure Group Communication
Patrick McDaniel, Atul Prakash, Peter Honeyman, University of Michigan
END

#
# Thursday
#

Thursday, August 26 8:30am|10:00am|Apples, Oranges and the Public Key Infrastructure (PKI)|note
Paul C. Van Oorschot, Chief Scientist, Entrust Technologies

The unprecedented growth of the Internet is surpassed only by the confusion resulting from the rapid introduction of new technologies. A prime example is the application of Public Key Infrastructure (PKI) to a wide array of products, systems, and services. Many experts are positioning the Public Key Infrastructure as the answer to all security questions; other experts dismiss PKI as a poor fit for commercial problems. Both groups are correct - within their own unspoken definitions - and this is precisely the problem, namely the lack of common understanding of what PKI encompasses. In an attempt to clear the smoke (rather than to just move it around), this talk outlines the components of a baseline architecture for a managed PKI, explores standard features, and examines how these match the security requirements in a commercial world where public key certificates form the basis for security.
END

10:30am|12:00|Experience Is the Best Reacher to the Past and to the Future|note
Peter G. Neumann, Principal Scientist, SRI International

Everyone involved in information security and overall system survivability can learn more from the historical evolution of computer operating systems, distributed systems, databases, networks, and the associated risks. Yet, somehow the most valuable would-be lessons from the past keep getting lost.  Consequently, our "generally accepted'" principles are sub-optimal without an understanding of their deeper implications. However, our understanding of experience may also be flaky in the absence of guiding principles. This talk considers some of the lost horizons and assesses why the advancement of the state of the art in security has been so difficult.
END

1:30pm|3:00pm|U.S. Crypto Policy: Explaining the Inexplicable|note
Susan Landau, Sun Microsystems Laboratories

The richest, strongest, most electronically vulnerable nation on earth persists in a policy that effectively restricts the use of encryption technology domestically as well as abroad. Even while the security of transactions over telephone and computer networks has become a source of wide public concern, the U.S. government continues to work against the proliferation of unbreakable cryptography (and thus perfectly concealable communications). Why? In this talk, I attempt to explain today's inexplicable U.S. crypto policy in a perhaps more explicable context of U.S. history.
END

8:30am|10:00am|Potpourri|note
Session Chair: Trent Jaeger, IBM 

A Secure Station for Network Monitoring and Control
Vassilis Prevelakis, Network Management Center, University of Piraeus

The Flask Security Architecture: System Support for Diverse Security Policies
Ray Spencer, Secure Computing Corporation; Stephen Smalley, Peter Loscocco, National Security Agency; Mike Hibler, Dave Andersen, Jay Lepreau, University of Utah

A Study in Using Neural Networks for Anomaly and Misuse Detection
Anup K. Ghosh, Aaron Schwartzbard, Reliable Software Technologies
END

10:30am|12:00|Security Practicum|note
Session Chair: Wolfgang Ley, DFN-CERT 

The Design of a Cryptographic Security Architecture 
Peter Gutmann, University of Auckland 

Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
Alma Whitten, Carnegie Mellon University; J.  D. Tygar, University of California at Berkeley

Jonah: Experience Implementing PKIX Reference Freeware
Mary Ellen Zurko, John Wray, Iris Associates; Ian Morrison, IBM; Mike Shanzer, Iris Associates; Mike Crane, IBM; Pat Booth, Lotus; Ellen McDermott, IBM; Warren Macek, Iris Associates; Ann Graham, Jim Wade, Tom Sandlin, IBM
END

1:30pm|3:00pm|Access Control|note
Session Chair: Christoph Schuba, Sun Microsystems Laboratories 

Scalable Access Control for Distributed Object Systems
Daniel F. Sterne, Gregg W. Tally, C. Durward McDonell, David L. Sherman, David L. Sames, Pierre X.  Pasturel, NAI Labs, Network Associates, Inc.; E. John Sebes, Kroll-O'Gara Information Security Group

Certificate-based Access Control for Widely Distributed Resources
Mary R. Thompson, William Johnston, Srilekha Mudumbai, Gary Hoo, Keith Jackson, Abdelilah Essiari, Lawrence Berkeley National Laboratory

Digital-Ticket-Controlled Digital Ticket Circulation
Ko Fujimura, Hiroshi Kuno, Masayuki Terada, Kazuo Matsuyama, Yasunao Mizuno, Jun Sekine, NTT Information Sharing Platform Laboratories
END

3:30pm|5:00pm|Works-In-Progress Reports|note
Session Chair: Greg Rose, Qualcomm, Inc.

This session will consist of short presentations from researchers about work-in-progress, new results, or timely topics. To participate, please see Works-In-Progress description.
END
