Wednesday, December 4, 1996
9:00 am Welcome to DIMACS
Fred Roberts, DIMACS Director
9:10 Opening Remarks
Rebecca N. Wright, AT&T Labs - Research
9:30 Peter G. Neumann, SRI International
A Global Perspective on Network Risks
10:30 Break
10:40 Catherine Meadows, Naval Research Laboratory
A Representation of Protocol Attacks for Risk Assessment
11:20 Yvo Desmedt, University of Wisconsin - Milwaukee
A Network Security Threat in General
(Even When Cryptography is Used)
12:00 Lunch
1:40 Sarvar Patel, Bellcore
Information Leakage in Encrypted Key Exchange
2:20 Adam Shostack, Consultant
Apparent Weaknesses in the Security Dynamics
Client/Server Protocol
3:00 Break
3:20 Robert J. Hall, AT&T Labs - Research
Channels: Avoiding unwanted electronic mail
4:00 Alexis Rosen, PANIX Public Access Networks Corporation
Understanding and Defending Against SYN Attacks
5:00 Matt Blaze, AT&T Labs
Defending against SYN attacks with Cryptographic Cookies
5:15 Reception
Thursday, December 5, 1996
9:00 am Shiu-Kai Chin, Syracuse University
Verifying Privacy Enhanced Mail Functions with
Higher Order Logic
9:40 Jean-Jacques Quisquater, Universite de Louvain
Overview and security analysis of RSA-type
cryptosystems against various attacks
10:20 Break
10:45 Ed Felten, Princeton University
Spoofing Attacks on the Web
11:45 Lunch
1:45 Drew Dean, Princeton University
Web Security: A High Level View
2:25 Avi Rubin, Bellcore
Blocking Java Applets at the Firewall
3:05 Break
3:20 Steven M. Bellovin, AT&T Labs - Research
Java -- Threat or Menace
4:00 Discussion: Webware: Can it be secured?
Moderator: Peter G. Neumann, SRI International
Panelists: Steven M. Bellovin, AT&T Labs - Research
Drew Dean, Princeton University
Ed Felten, Princeton University
Avi Rubin, Bellcore
Friday, December 6, 1996
9:00 am Bill Cheswick, Lucent Technologies, Bell Laboratories
Stupid Net Tricks
10:00 Millicent Watts, Security and Network Administration Consultant
Network Security: Where does the real threat lie
10:40 Break
10:50 Cynthia Cullen, Bell Communications Research
Demonstration of Hacker Techniques
12:50 Workshop adjourns
Previous: Participation
Next: Registration
Index