[e2e] SRUTI'05: A New Usenix Security Workshop
Dina Katabi
dina at csail.mit.edu
Sat Mar 5 13:18:48 PST 2005
----------------- SRUTI's CALL FOR PAPER -------------
*SRUTI 2005*
USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet
(July 7-8 ’05, MIT, Cambridge, MA)
The Internet is under increasing attacks with unwanted traffic in the
form of spam, distributed denial of service, viruses, worms, etc.
Unwanted traffic on the Internet has manifested itself as attacks on
many protocols (IP, TCP, DNS, BGP, and HTTP) and popular applications
(e.g., Email, Web). Recently, attacks combining multiple exploits have
become common. Many solutions have been proposed for specific attacks,
some of which have had limited success. SRUTI seeks research on the
unwanted traffic problem that looks across the protocol stack, examines
attack commonalities, and investigates how various solutions interact
and whether they can be combined to increase security. Original
research, promising ideas, and steps towards practical solutions at all
levels are sought. We look for ideas in networking and systems, and
insights from other areas such as databases, data mining, and economics.
SRUTI aims to bring academic and industrial research communities
together with those who face the problems at the operational level.
SRUTI 2005 will be a one and a half day event. Each session chair will
play the role of a discussant and present a summary of the papers in the
session and a state-of-the-art synopsis of the topic. The workshop will
be highly interactive, with a substantial time devoted to questions and
answers. Submissions must contribute to improving the current
understanding of unwanted traffic and/or suggestions to reducing it. The
proceedings of the workshop will be published.
RELEVANT TOPICS
* Architectural solutions to the unwanted traffic problem
* Scientific assessment of the spread and danger of the attacks
* Practical countermeasures to various aspects of unwanted traffic
(Spam, DoS, worms,...)
* Cross-layer solutions and solutions to combination attacks
* Attacks on emerging technologies (e.g., sensors, VOIP, PDAs) and
their countermeasures
* Privacy and anonymity
* Intrusion avoidance, detection, and response
* Viruses, Worms and other malicious code
* Analysis of protocols and systems vulnerabilities
* Handling errors/misconfigurations that might lead to unwanted traffic
* Attacks on specific distributed systems (e.g., P2P) or network
technologies (e.g., wireless networks)
* Data mining with application to unwanted traffic
* New types of solutions: incentive-based, economic, statistical,
collaborative, etc.
PROGRAM COMMITTEE
Paul Barford, University of Wisconsin, Madison
Steven M. Bellovin, AT&T Labs–Research
Herve Debar, France Telecom R&D
Mark Handley University College London
Dina Katabi, MIT
Bala Krishnamurthy, AT&T Labs–Research
Doug Maughan, DHS
Chris Morrow, UUNET
Vern Paxson, ICIR/ICSI
Dawn Song, Carnegie Mellon University
Paul Vixie, ISC
DEADLINES
Submission deadline: March 30, 2005 (11:59 PM EST, HARD)
Acceptance notification: May 3, 2005.
Final papers due: May 23, 2005.
Workshop: July 7-8, 2005.
STEERING COMMITTEE
Dina Katabi (MIT) and Balachander Krishnamurthy (AT&T Labs–Research)
Further Information - Workshop URL
Paper format, submission date etc. to be found at
http://www.research.att.com/~bala/sruti/
------------------ END of CFP ---------------------
More information about the end2end-interest
mailing list