August 18th -- 21st, 2003

Centro Stefano Francini
Ascona, Switzerland

Program

Monday, August 18, 2003
7:00 p.m. Welcome Reception and Dinner



Tuesday, August 19, 2003
7:00 - 8:30 Breakfast
8:45 - 9:15 Welcome from General Chairs and Organizational Announcements

SESSION 1: Surviving Threats
Session Chair
9:15 - 10:15 Locality: A new Paradigm for Thinking About Normal Behavior and Outsider Threat
J. McHugh

10:15 - 10:30 Break for Refreshments

10:30 - 11:30 Forming Alliance for DDoS Defense
J Mirkovic, M Robinson, P Reiher
11:30 - 12:30 Merging Paradigms of Survivability and Security: Stochastic Faults and Designed Faults
J McDermott et al

12:30 - 2:00 Lunch

SESSION 2: Language Based Security
Session Chair
2:00 - 3:00 SELF: a Transparent Security Extension for ELF Binaries
S Bhatkar, DC DuVarney, VN Venkatakrishnan
3:00 - 4:00 Dynamic Label Binding at Run-time
Y Beres, C Dalton

4:00 - 4:15 Break for Refreshments

4:30 Social Activity: Guided tour of the Casa Anatta museum

7:00 - 8:30 Dinner



Wednesday, August 20, 2003

7:00-8:30 Breakfast

9:00 - 9:15 Organisational Announcements

SESSION 3: Security Engineering

9:15 - 10:15 Bringing Security Home: A process for developing secure and usable systems
I Flechais, M.A. Sasse, S.M.V Hailes

10:15 - 10:30 Break for Refreshments

10:30 - 11:30 Security Check: A Formal Yet Practical Framework For Secure Software Architecture
A Ray
11:30 - 12:30 From Absence of Certain Vulnerabilities towards Security Proofs --- Pushing the Limits of Formal Verification
M Backes, M Schunter

12:30 - 2:00 Lunch

SESSION 4: Identification Control
2:00 - 3:00 Secure Object Identification - or: Solving The Chess Grandmaster Problem
Ammar Alkassar, Christian Stüble, Ahmad-Reza Sadeghi
3:00 - 4:00 Public Key Distribution through "cryptoIDs"

4:00 - 4:15 Break for Refreshments
4:15 - 5:15 Owner Controlled Information
C Gates, J Slonim

7:00 - 8:30 Dinner



Thursday, August 21, 2003
7:00 - 8:30 Breakfast

9:00 - 9:15 Organisational Announcements

SESSION 5: Ubiquitous Computing/Security

9:15 - 10:15 Towards a New Paradigm for Securing Wireless Sensor Networks
K Jones et al

10:15 - 10:30 Break for Refreshments

10:30 - 11:30 WiFi Nomads and their Unprotected Devices: The Case for QED-Quarantine, Examination, and Decontamination
K Eustice et al

11:30 - 12:30 Business Meeting

12:30 - 2:00 Lunch

ACSA
An  ACSA Conference
CISC/JMU
Proceedings Sponsored by the
Online Information Security Masters Program
James Madison University
 
SDSC
Web Site Courtesy of the San Diego Supercomputer Center