|
|
|
|
9:45-11:00 Keynote: J. McHugh, Dalhousie University |
|
|
Reaction: The Internet security
paradox. |
|
|
|
|
11:30-12:30 Code Analysis |
|
|
Using
Type qualifiers to analyze untrusted integers and detecting security
flaws in C programs. |
|
|
Ebrima N. Ceesay, Jingmin
Zhou, Matt Bishop, Michael Gertz and Karl Levitt |
|
Using
static program analysis to aid intrusion detection. |
|
|
Manuel
Egele, Martin Szydlowski, Engin Kirda and Christopher Kruegel |
|
|
|
14:00-15:30 Intrusion
Detection |
|
|
An SVM-based masquerade
detection method with
online update using co-occurrence matrix. |
|
|
Liangwen
Chen and Masayoshi Aritsugi |
|
Network-level
polymorphic shellcode detection
using emulation. |
|
|
Michalis
Polychronakis, Kostas G. Anagnostakis
and Evangelos P. Markatos |
|
Detecting
unknown network attacks using language
models. |
|
|
Konrad
Rieck and Pavel Laskov |
|
|
|
16:00-17:00 Threat Protection and Response |
|
|
Using
labeling to prevent cross-service attacks
against smart phones.
|
|
|
Collin
Mulliner, Giovanni Vigna, David Dagon and Wenke Lee |
|
Using
contextual security policies for threat
response. |
|
|
Hervé
Debar, Yohann Thomas, Nora
Boulahia-Cuppens and Frédéric Cuppens |
|
|
|
Meeting of the
GI Special Interest Group SIDAR |
|
|
|
Boat trip on
the Spree / Conference dinner and dinner address by Stefan Grosse, Federal Ministry of the Interior |
|
|