RAID 2005

Home
Call For Papers
Sponsorship
Submissions
Program
Registration
Committees

Accommodation
Transportation

Visitor Information

RAID 2005
Eighth International Symposium on
Recent Advances in Intrusion Detection
September 7-9, 2005


  Program

Day 0 (Sept. 6, Tuesday)

18:30-20:30 Reception - Bell Harbor International Conference Center



Day 1 (Sept. 7, Wednesday) 

8:00-9:00
Registration
9:00-9:30
Welcome & Logistics
9:30-10:30
Keynote Address 1

"Recent Advances in Intrusion Disasters"
Phil Attfield, Northwest Security Institute
(30 minutes break)
11:00-12:00 Session A:   Worm Detection and Containment (I)

Chair:  Diego Zamboni, IBM Zurich

  • "Virtual Playgrounds for Worm Behavior Investigation"
    Xuxian Jiang¹, Dongyan Xu¹, Helen J. Wang², and Eugene H. Spafford¹
    ¹Purdue University, USA   ²Microsoft Research, USA
  • "Empirical Analysis of Rate Limiting Mechanisms"
    Cynthia Wong, Stan Bielski, Ahren Studer, and Chenxi Wang
    Carnegie Mellon University, USA

(lunch)
1:30-2:30
Session B:  Anomaly Detection

Chair:  Christopher Kruegel, Technical University of Vienna

  • "COTS Diversity Intrusion Detection and Application to Web Servers"
    Eric Totel, Frédéric Majorczyk, and Ludovic Mé
    Sup
    élec, Cesson-Sévigné Cedex, France
  • "Behavioral Distance for Intrusion Detection"
    Debin Gao, Michael K. Reiter, Dawn Song
    Carnegie Mellon University, USA

(30 minutes break)
3:00-4:30 Session C:   Intrusion Prevention and Response

Chair:  Fengmin Gong, McAfee

  • "FLIPS: Hybrid Adaptive Intrustion Prevention"
    Michael E. Locasto, Ke Wang, Angelos D. Keromytis, and Salvatore J. Stolfo
    Columbia University, USA

  • "Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card"
    H. Bos¹ and Kaiming Huang²
    ¹Vrije University, The Netherlands  ²Xiamen University, China

  • "Defending against Injection Attacks through Context-Sensitive String Evaluation"
    Tadeusz Pietraszek¹ and Chris Vanden Berghe²
    1,2IBM Zurich Research Laboratory, Switzerland, ²Katholieke Universiteit Leuven, Belgium
18:30 RAID 2005 Banquet

Argosy Cruises
Seattle Waterfront     Pier 56            
Boarding time            6:00PM
Sailing time               7:00PM
End time                   10:00PM


Day 2 (Sept. 8, Thursday)

9:00-10:30
Session D:  System Call-Based Intrusion Detection

Chair: Dawn Song, CMU

  • "Improving Host-based IDS with Argument Abstraction to Prevent Mimicry Attacks"
    Sufatrio and Roland H. C. Yap
    National University of Singapore, Singapore
  • "On Random-Inspection-Based Intrusion Detection"
    Simon P.  Chung and Aloysius K. Mok
    University of Texas at Austin, USA

  • "Environment-Sensitive Intrusion Detection"
    Jonathon T. Giffin
    ¹, David Dagon², Somesh Jha¹, Wenke Lee², Barton P. Miller¹
    ¹University of Wisconsin, USA  ²Georgia Institute of Technology, USA
(30 minutes break)
11:00-12:00
Session E:  Worm Detection and Containment (II)

Chair: Sungdeok (Steve) Cha, Korea Advanced Institute of Science and Technology

  • "Polymorphic Worm Detection Using Structural Information of Executables"
    Christopher Kruegel¹, Engin Kirda¹, Darren Mutz², William Robertson², and Giovanni Vigna²
    ¹Technical University of Vienna, Austria   ²University of California, Santa Barbara, USA
  • "Anomalous Payload-based Worm Detection and Signature Generation"
    Ke Wang, Gabriela Cretu, Salvatore J. Stolfo
    Columbia University, USA

(lunch)
1:30-3:00
Session F:  Network-Based Intrusion Detection

Chair: Rob Cunningham, Lincoln Labs

  • "On Interactive Internet Traffic Replay"
    Seung-Sun Hong and S. Felix Wu
    University of California, Davis, USA

  • "Interactive Visualization for Network and Port Scan Detection"
    Chris Muelder¹, Kwan-Liu Ma¹, and Tony Bartoletti²
    ¹University of California at Davis, USA   ²Lawrence Livermore National Laboratory, USA
  • "A Fast Static Analysis Approach to Detect Exploit Code inside Network Flows"
    Ramkumar Chinchani¹ and Eric Van Den Berg²
    ¹University at Buffalo (SUNY), USA    ²Telcordia Technologies, USA
(30 minutes break)
3:30-4:45
Poster (Presentation) Session
4:45-6:00 Poster (Display & Discussion) Session

Chair: Alfonso Valdes, SRI


Day 3 (Sept. 9, Friday)
9:00-10:00
Session G:  Mobile and Wireless Networks

Chair:  George Mohay, Queensland University of Technology

  • "Sequence Number-Based MAC Address Spoof Detection"
    Fanglu Guo and Tzi-cker Chiueh
    Stony Brook University, USA

  • "A Specification-based Intrusion Detection Model for OLSR"
    Chinyang Henry Tseng¹, Tao Song¹, Poornima Balasubramanyam¹, Calvin Ko², and Karl Levitt¹
    ¹University of California, Davis, USA   ²Sparta Inc., USA
(30 minutes break)
10:30-12:00
Panel: "What defines IDS? Does IDS really help?"

Chair:  Deborah Frincke, PNNL
Panelist:
           Phil Attfield, Northwest Security Institute
           Marc Dacier, Eurécom
           Dick Kemmerer, UC Santa Barbara
           Raffael Marty, ArchSight
           Bill Nickless, PNNL
(lunch)