RAID 2005

Call For Papers


Visitor Information

RAID 2005
Eighth International Symposium on
Recent Advances in Intrusion Detection
September 7-9, 2005


Day 0 (Sept. 6, Tuesday)

18:30-20:30 Reception - Bell Harbor International Conference Center

Day 1 (Sept. 7, Wednesday) 

Welcome & Logistics
Keynote Address 1

"Recent Advances in Intrusion Disasters"
Phil Attfield, Northwest Security Institute
(30 minutes break)
11:00-12:00 Session A:   Worm Detection and Containment (I)

Chair:  Diego Zamboni, IBM Zurich

  • "Virtual Playgrounds for Worm Behavior Investigation"
    Xuxian Jiang¹, Dongyan Xu¹, Helen J. Wang², and Eugene H. Spafford¹
    ¹Purdue University, USA   ²Microsoft Research, USA
  • "Empirical Analysis of Rate Limiting Mechanisms"
    Cynthia Wong, Stan Bielski, Ahren Studer, and Chenxi Wang
    Carnegie Mellon University, USA

Session B:  Anomaly Detection

Chair:  Christopher Kruegel, Technical University of Vienna

  • "COTS Diversity Intrusion Detection and Application to Web Servers"
    Eric Totel, Frédéric Majorczyk, and Ludovic Mé
    élec, Cesson-Sévigné Cedex, France
  • "Behavioral Distance for Intrusion Detection"
    Debin Gao, Michael K. Reiter, Dawn Song
    Carnegie Mellon University, USA

(30 minutes break)
3:00-4:30 Session C:   Intrusion Prevention and Response

Chair:  Fengmin Gong, McAfee

  • "FLIPS: Hybrid Adaptive Intrustion Prevention"
    Michael E. Locasto, Ke Wang, Angelos D. Keromytis, and Salvatore J. Stolfo
    Columbia University, USA

  • "Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card"
    H. Bos¹ and Kaiming Huang²
    ¹Vrije University, The Netherlands  ²Xiamen University, China

  • "Defending against Injection Attacks through Context-Sensitive String Evaluation"
    Tadeusz Pietraszek¹ and Chris Vanden Berghe²
    1,2IBM Zurich Research Laboratory, Switzerland, ²Katholieke Universiteit Leuven, Belgium
18:30 RAID 2005 Banquet

Argosy Cruises
Seattle Waterfront     Pier 56            
Boarding time            6:00PM
Sailing time               7:00PM
End time                   10:00PM

Day 2 (Sept. 8, Thursday)

Session D:  System Call-Based Intrusion Detection

Chair: Dawn Song, CMU

  • "Improving Host-based IDS with Argument Abstraction to Prevent Mimicry Attacks"
    Sufatrio and Roland H. C. Yap
    National University of Singapore, Singapore
  • "On Random-Inspection-Based Intrusion Detection"
    Simon P.  Chung and Aloysius K. Mok
    University of Texas at Austin, USA

  • "Environment-Sensitive Intrusion Detection"
    Jonathon T. Giffin
    ¹, David Dagon², Somesh Jha¹, Wenke Lee², Barton P. Miller¹
    ¹University of Wisconsin, USA  ²Georgia Institute of Technology, USA
(30 minutes break)
Session E:  Worm Detection and Containment (II)

Chair: Sungdeok (Steve) Cha, Korea Advanced Institute of Science and Technology

  • "Polymorphic Worm Detection Using Structural Information of Executables"
    Christopher Kruegel¹, Engin Kirda¹, Darren Mutz², William Robertson², and Giovanni Vigna²
    ¹Technical University of Vienna, Austria   ²University of California, Santa Barbara, USA
  • "Anomalous Payload-based Worm Detection and Signature Generation"
    Ke Wang, Gabriela Cretu, Salvatore J. Stolfo
    Columbia University, USA

Session F:  Network-Based Intrusion Detection

Chair: Rob Cunningham, Lincoln Labs

  • "On Interactive Internet Traffic Replay"
    Seung-Sun Hong and S. Felix Wu
    University of California, Davis, USA

  • "Interactive Visualization for Network and Port Scan Detection"
    Chris Muelder¹, Kwan-Liu Ma¹, and Tony Bartoletti²
    ¹University of California at Davis, USA   ²Lawrence Livermore National Laboratory, USA
  • "A Fast Static Analysis Approach to Detect Exploit Code inside Network Flows"
    Ramkumar Chinchani¹ and Eric Van Den Berg²
    ¹University at Buffalo (SUNY), USA    ²Telcordia Technologies, USA
(30 minutes break)
Poster (Presentation) Session
4:45-6:00 Poster (Display & Discussion) Session

Chair: Alfonso Valdes, SRI

Day 3 (Sept. 9, Friday)
Session G:  Mobile and Wireless Networks

Chair:  George Mohay, Queensland University of Technology

  • "Sequence Number-Based MAC Address Spoof Detection"
    Fanglu Guo and Tzi-cker Chiueh
    Stony Brook University, USA

  • "A Specification-based Intrusion Detection Model for OLSR"
    Chinyang Henry Tseng¹, Tao Song¹, Poornima Balasubramanyam¹, Calvin Ko², and Karl Levitt¹
    ¹University of California, Davis, USA   ²Sparta Inc., USA
(30 minutes break)
Panel: "What defines IDS? Does IDS really help?"

Chair:  Deborah Frincke, PNNL
           Phil Attfield, Northwest Security Institute
           Marc Dacier, Eurécom
           Dick Kemmerer, UC Santa Barbara
           Raffael Marty, ArchSight
           Bill Nickless, PNNL