Wednesday, December 4, 1996
9:00 am Welcome to DIMACS Fred Roberts, DIMACS Director 9:10 Opening Remarks Rebecca N. Wright, AT&T Labs - Research 9:30 Peter G. Neumann, SRI International A Global Perspective on Network Risks 10:30 Break 10:40 Catherine Meadows, Naval Research Laboratory A Representation of Protocol Attacks for Risk Assessment 11:20 Yvo Desmedt, University of Wisconsin - Milwaukee A Network Security Threat in General (Even When Cryptography is Used) 12:00 Lunch 1:40 Sarvar Patel, Bellcore Information Leakage in Encrypted Key Exchange 2:20 Adam Shostack, Consultant Apparent Weaknesses in the Security Dynamics Client/Server Protocol 3:00 Break 3:20 Robert J. Hall, AT&T Labs - Research Channels: Avoiding unwanted electronic mail 4:00 Alexis Rosen, PANIX Public Access Networks Corporation Understanding and Defending Against SYN Attacks 5:00 Matt Blaze, AT&T Labs Defending against SYN attacks with Cryptographic Cookies 5:15 Reception
Thursday, December 5, 1996 9:00 am Shiu-Kai Chin, Syracuse University Verifying Privacy Enhanced Mail Functions with Higher Order Logic 9:40 Jean-Jacques Quisquater, Universite de Louvain Overview and security analysis of RSA-type cryptosystems against various attacks 10:20 Break 10:45 Ed Felten, Princeton University Spoofing Attacks on the Web 11:45 Lunch 1:45 Drew Dean, Princeton University Web Security: A High Level View 2:25 Avi Rubin, Bellcore Blocking Java Applets at the Firewall 3:05 Break 3:20 Steven M. Bellovin, AT&T Labs - Research Java -- Threat or Menace 4:00 Discussion: Webware: Can it be secured? Moderator: Peter G. Neumann, SRI International Panelists: Steven M. Bellovin, AT&T Labs - Research Drew Dean, Princeton University Ed Felten, Princeton University Avi Rubin, Bellcore
Friday, December 6, 1996 9:00 am Bill Cheswick, Lucent Technologies, Bell Laboratories Stupid Net Tricks 10:00 Millicent Watts, Security and Network Administration Consultant Network Security: Where does the real threat lie 10:40 Break 10:50 Cynthia Cullen, Bell Communications Research Demonstration of Hacker Techniques 12:50 Workshop adjourns