IEEE Master Brand

Third IEEE International
Workshop on Information Assurance

March 23-24, 2005  –  College Park, MD, USA

Computer Society Logo

Home

Registration Information

Call for Papers (deadline has passed)

Location and Accommodation Information

Program

The preliminary program is also available in Adobe PDF format.

March 23, 2005

0800-0845 Registration / Breakfast
0845-0900 Welcome and Introduction
separator line

Session I: Malware Defense

0900-0930 A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks
Y. Younan, W. Joosen, and F. Piessens
Presentation Slides in Adobe Portable Document Format
0930-1000 Making the Kernel Responsible: A New Approach to Detecting & Preventing Buffer Overflows
W. Speirs
Presentation Slides in Adobe Portable Document Format
100-1030 Evaluation of Worm Containment Algorithms and Their Effect on Legitimate Traffic
M. Abdelhafez and G. Riley
1030-1100 Malware Defense Using Network Security Authentication\
J. Antrosio and E. Fulp
1100-1120 Break
separator line

Session II: MANET Security

1120-1150 A General Cooperative Intrusion Detection Architecture for MANETs
D. Sterne, P. Balasubramanyam, D. Carman, B. Wilson, R. Talpade, C. Ko, R. Balupari, C.-Y. Tseng, T. Bowen, K. Levitt, and J. Rowe
1150-1220 SAWAN: A Survivable Architecture for Wireless LANs
M. Virendra, S. Upadhyaya, V. Kumar, and V. Anand
1220-1400 Lunch
separator line
1400-1500 Keynote Talk: Creating High Assurance for a Product: Lessons Learned from GEMSOS
Roger Schell
Presentation Slides in Adobe Portable Document Format
1500-1520 Break
separator line

Session III: Intrusion Detection I

1520-1550 Meta IDS Environments: An Event Message Anomaly Detection Approach
J. Tölle, M. Jahnke, M. Bussmann, and S. Henkel
Presentation Slides in Adobe Portable Document Format
1550-1620 An Alert Fusion Framework for Situation Awareness of Coordinated Multistage Attacks
S. Mathew, C. Shah, and S. Upadhyaya
Presentation Slides in Adobe Portable Document Format
1620-1650 Stellar: A Fusion System for Scenario Construction and Security Risk Assessment
S. Boyer, O. Dain, and R. Cunningham
Presentation Slides in Adobe Portable Document Format
1650-1710 Break
separator line

Panel Session

1710-1900 Panel Session To be confirmed.
separator line

March 24, 2005

Session IV: Modeling and Policies

0900-0930 Attack-Potential-Based Survivability Modeling for High-Consequence Systems
J. McDermott
Presentation Slides in Adobe Portable Document Format
0930-1000 Enforcing Messaging Security Policies
J. Likavec and S. Wolthusen
1000-1030 Cross Domain Controlled Interface and Labeling (CDCIL) Services
K. Goertzel
1030-1100 Break
separator line

Session V: Intrusion Detection II

1100-1130 The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness
X. Yin, W. Yurcik, and A. Slagell
Presentation Slides in Adobe Portable Document Format
1130-1200 Forensic Analysis of File System Intrusions Using Improved Backtracking
S. Sitaraman and S. Venkatesan
1200-1230 Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion Detection Models
Z. Liu, S. Bridges, and R. Vaughn
Presentation Slides in Adobe Portable Document Format
separator line
1230-1245 Closing Remarks
J. L. Cole

This page and all contents (unless otherwise noted) are
Copyright © 2004-2005 Institute of Electrical and Electronics Engineers, Inc..
All rights reserved.

in cooperation with the 
ACM Special Interest Group on
 Security, Audit, and Control