DIMACS Workshop on Theft in E-Commerce: Content, Identity, and Service

Linda Casals lindac at dimacs.rutgers.edu
Thu Mar 24 09:21:40 EST 2005


*************************************************
     
DIMACS Workshop on Theft in E-Commerce: Content, Identity, and Service 
          
      April 14 - 15, 2005
      DIMACS Center, Rutgers University, Piscataway, NJ

Organizers: 
       Drew Dean, SRI International, ddean at csl.sri.com  
       Markus Jakobsson, Indiana University, markus at indiana.edu 
     
Presented under the auspices of the Special Focus on Communication
Security and Information Privacy and is sponsored by RSA Security. 
    ************************************************

This workshop is focusing on Theft in E-Commerce (of content, identity
and service). While theft is an old problem, the automated nature of
e-commerce introduces new opportunities for traditional forms of
theft, as well as entirely new forms of theft. The centrality of
computation makes these threats a part of computer security. This is
an area of research where we are seeing a lot of activity, and where
we believe there is a great potential for valuable research
contributions. While our primary interest is in defenses against
theft, we are also interested in novel attacks and real data about
attacks, as the defenders need to know what to defend against. It is
our hope that we could stimulate such research by bringing together
the leaders in this area, which is the very intention of this
workshop.

**************************************************************
Workshop Program:
This is a preliminary program subject to change.

Thursday, April 14, 2005

 8:00 -  8:30 Registration and Breakfast

 8:30 -  8:45 Welcome and Opening Comments
              Fred Roberts, DIMACS Director

 8:45 -  9:45 Identity Theft: A Risk to Be Managed
              Richard A Parry, Consumer Risk Management, JPMorganChase

 9:45 - 10:15 Identity Theft and Legitimately - Minted Fraudulent Credentials
              Paul Van Oorschot, Carleton University, Canada

10:15 - 10:30 Break

10:30 - 11:15 Some are not thieves!
              Alexandr Andoni, MIT

11:00 - 11:30 Using Mutual Authentication to Fight Phishing
              Steve Myers, IUB

11:30 - 12:00 Building a Cryptovirus Using Microsoft's Cryptographic API
              Adam L: Young, LECG, LLC

12:00 -  1:30 Break

 1:30 -  2:00 An open - source USB token
              Hein Roehrig, University of Calgary

 2:00 -  2:30 Passwords Don't Get No Respect - - Or, How to Make the
              Most of (Weak) Shared Secrets
              Burt Kaliski, RSA Security 

 2:30 -  3:00 Blocking Phishing Spam: Pitfalls and Future Directions
              Minaxi Gupta, IUB  
 
 3:00 -  3:15 Break

 3:15 -  3:45 Phishing Countermeasures
              Aaron Emigh, Radix Labs

 3:45 -  4:15 Messin' with Texas: Deriving Mother's Maiden Names 
              Using Public Records
              Virgil Griffith, IUB 

Friday, April 15, 2005
 
 8:00 -  8:30 Breakfast and Registration

 8:30 -  9:15 Identity Theft: Methods and Prevention
              John Black, University of Colorado

 9:00 -  9:30 Preventing Theft in the Open
              Naftaly Minsky, Rutgers University

 9:30 - 10:15 Expressing Human Trust in Distributed Systems: the
              Mismatch Between Tools and Reality
              Sean Smith, Dartmouth College

10:00 - 10:15 Break

10:15 - 10:45 Separable Identity - Based Ring Signatures: Theoretical
              Foundations for Fighting Phishing Attacks
              Susan Hohenberger, MIT

10:45 - 11:15 Fighting Phishing Attacks: A Lightweight Trust
              Architecture for Detecting Spoofed Emails
              Ben Adida, MIT

11:15 - 11:45 How to Search Privately on Streaming Data
              Rafail Ostrovsky, UCLA

11:45 - 12:15 Distributed Phishing Attacks
              Markus Jakobsson, IUB, CACR

12:15 -  1:45 Lunch

 1:45 -  2:15 Are Peripheral Security Indicators Effective to 
              Prevent Phishing Attacks? 
              Min Wu, MIT

 2:15 -  2:45 Kleptography: The Outsider Inside Your Crypto Devices, 
              and its Trust Implications
              Moti Yung, Columbia University

 2:45 -  3:15 Safeguarding wireless service access
              Panos Papadimitratos,  Virginia Tech

 3:15 -  3:30 Break

 3:30 -  4:00 Social Networks and Trust Networks
              Jean Camp, IUB
 
 4:00 -  4:30 Fraud and Fraud Reduction on the Internet
              Bezalel Gavish, Southern Methodist University


**************************************************************
Registration:

Pre-registration deadline: April 7, 2005

Please see website for registration information

  http://dimacs.rutgers.edu/Workshops/Intellectual/

*********************************************************************
Information on participation, registration, accomodations, and travel 
can be found at:

http://dimacs.rutgers.edu/Workshops/Intellectual/

   **PLEASE BE SURE TO PRE-REGISTER EARLY**

********************************************************************



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list