Tutorial Program at a Glance
Total Page:16
File Type:pdf, Size:1020Kb
Conference at a Glance Saturday, June 17 4:00 pm - 9:00 pm . .On-Site Registration USENIX Sunday, June 18 ! PARTY ! PARTY ! PARTY ! PARTY ! 7:30 am - 5:00 pm . .On-Site Registration 9:00 am - 5:00 pm . .Tutorial Program USENIX CELEBRATES 6:00 pm - 7:00 pm . .Welcome Reception ITS 25TH ANNIVERSARY! 7:00 pm - 8:00 pm . .Conference Orientation Monday, June 19 What would a celebration be without parties, games, and prizes? 7:30 am - 5:00 pm . .On-Site Registration 9:00 am - 5:00 pm . .Tutorial Program Please join us for the festivities! Tuesday, June 20 7:30 am - 5:00 pm . .On-Site Registration 9:00 am - 5:00 pm . .Tutorial Program 6:00 pm - 10:00 pm . .Birds-of-a-Feather Sessions Important Dates to Remember Wednesday, June 21 Pre-Registration Discount Deadline: 7:30 am - 6:00 pm . .On-Site Registration Friday, May 12, 2000 9:00 am - 10:30 am . .Keynote Address Hotel Discount Deadline: 11:00 am - 5:30 pm . .Refereed Papers/Invited Talks/FREENIX Friday, May 26, 2000 12:00 pm - 7:00 pm . .Vendor Exhibition 5:30 pm - 7:00 pm . .Happy Hour at the Exhibition 9:00 pm - 11:00 pm . .Birds-of-a-Feather Sessions Thursday, June 22 Contents 7:30 am - 5:00 pm . .On-Site Registration 9:00 am - 5:30 pm . .Refereed Papers/Invited Talks/FREENIX 2 Conference at a Glance 10:00 am - 4:00 pm . .Vendor Exhibition 3 Letter from the Program Chair 7:00 pm - 9:00 pm . .25th Anniversary Reception 4–14 Tutorial Program 9:00 pm - 11:00 pm . .Birds-of-a-Feather Sessions 15–16 Tutorial Instructors Friday, June 23 17–22 Technical Sessions 9:00 am - 3:30 pm . .Refereed Papers/Invited Talks/FREENIX 23 Vendor Exhibition 4:00 pm - 5:30 pm . .Joint Closing Session 23 FREE PASS for Vendor Exhibition 24 About USENIX and SAGE 24 Upcoming USENIX Events 25 Conference Activities and Services 26 Hotel and Travel Information 26 Registration Information 26 Student Discounts and Stipends 27 Registration Form USENIX is a registered trademark of the USENIX Association. USENIX acknowledges all trademarks herein. 2 FOR PROGRAM UPDATES: http://www.usenix.org/events/usenix2000/ 2000 Come Celebrate our 25th! An Invitation from the Program Chair Dear Colleague, The USENIX Annual Technical Conference has always been the gathering place for like minds in the computer industry, a place to meet peers and experts Christopher Small and share solutions to common problems. Conference Organizers Our tutorials feature top-of-the-line instructors offering techniques and technologies that you can put to immediate use. Choose from 28 full-day Program Chair classes. Topics? Hackers and you; how to automate your Web site maintenance; Christopher Small,Osprey Partners LLC the latest on Sendmail; administering and fine-tuning your systems—Linux, Samba, Solaris, NT; managing people as well as machines; and much more. Program Committee Our tutorials fill up fast, so register early. Ken Arnold, Sun Microsystems Aaron Brown, University of California at High-quality refereed papers are the cornerstone of this conference's repu- Berkeley tation for cutting-edge, technically excellent research. This year, the program Fred Douglis, AT&T Labs—Research committee received 92 excellent submissions and selected 27 of them for publi- Edward W. Felten, Princeton University cation. Presentations will include new work from Bill Cheswick, Rob Pike, and Eran Gabber, Bell Labs Research, Lucent Margo Seltzer, and the latest research results on operating systems, tools and Technologies techniques for dealing with the system infrastructure headaches. Greg Minshall, Siara Systems Yoonho Park, IBM Research Among the many invited talks, you’ll hear a report from the Microsoft Vern Paxson, ACIRI Antitrust Case by expert witness Edward Felten of Princeton University. Liuba Shrira, Brandeis University The very popular FREENIX track is devoted to *BSD, Linux, X11-based Keith A. Smith, Harvard University graphical user interfaces, and the full range of freely redistributable software. Mark Zbikowski, Microsoft Anyone interested in open-source software will appreciate the technical quality Invited Talks Coordinators and relevance of the FREENIX track. John Heidemann, USC/Information Sciences Institute In our Keynote, Bill Joy, Co-Founder of Sun Microsystems, will discuss John T. Kohl, Rational Software his vision of the future of computing. At our Closing Session you’ll hear Thomas Dolby Robertson, Founder of Beatnik, Inc., as our special guest FREENIX Program Chair speaker. Marshall Kirk McKusick, Author & Consultant Newcomers and past attendees will find that our Annual Technical FREENIX Program Committee Conference has a lot to offer. Join us in San Diego on June 18–23, 2000, as we Clem Cole, Compaq celebrate our 25th Anniversary and pave the way for future innovators. Chris Demetriou, AT&T Labs David Greenman, The FreeBSD Project For the USENIX 2000 Organizing Committee, Miguel de Icaza, Helix Code, Inc. Niels Provos, University of Michigan Christopher Small, Osprey Partners LLC Theodore Ts'o, VA Linux Systems Stephen C. Tweedie, Red Hat, Inc. Program Chair Victor Yodaiken, FSMLabs and New Mexico Institute of Technology FOR MORE INFORMATION: Call 1.949.588.8649 3 Tutorial Program June 18–20, 2000 To meet your needs, the Tutorial Program at USENIX 2000 provides you with in-depth, immediately useful instruction in the latest techniques, effective tools, and best strategies. USENIX tutorials survey the topic, then dive right into the specifics of what to do and how to do it. Instructors are well-known experts in their fields, selected for their ability to teach complex subjects. Attend the tutorials at USENIX 2000 and take valuable skills back to your company or organization. Register now to guarantee your first choice—seating is limited. TUTORIAL PROGRAM AT A GLANCE SUNDAY MONDAY S1 UNIX Security Tools: Use and Comparison M1 Intrusion Detection and Network Forensics S2 Sendmail Configuration and Operation M2 Advanced Solaris Systems Administration Topics (Updated for Sendmail 8.10) M3 Linux Systems Administration S3 System and Network Performance Tuning M4 Windows NT and UNIX Integration: S4 Advanced Topics in Perl Programming NEW Problems and Solutions S5 Windows NT Internals M5 Security from the Inside Out: System Engineering for Security Systems NEW S6 Hacking Exposed: LIVE! NEW M6 Topics in Systems Administration I NEW S7 Introduction to UNIX Administration M7 Administering Windows 2000: A Course for UNIX People UPDATED S8 Cryptographic Algorithms Revealed NEW M8 Advanced CGI Techniques Using Perl NEW M9 Modern Security Systems for Intranets, Extranets, and the Internet M10 Secure Networking: An Introduction to VPN Architecture and Implementation NEW 4 REGISTER BY MAY 12, 2000: Save up to $100 June 18–20, 2000 Tutorial Program UNIX/Linux Our guarantee: If you’re not happy, we’re TUTORIAL DESCRIPTIONS Tutorial fees include: not happy. If you feel a tutorial does not ◆ Admission to the tutorials you select ◆ Lunch meet the high standards you have come to SUNDAY, JUNE 18, 2000 ◆ Tutorial CD-ROM expect from USENIX, let us know by the first ◆ Printed and bound tutorial UNIX Security Tools: Use materials from your sessions break and we will change you to any other and Comparison ◆ Admission to the Vendor Exhibition available tutorial immediately. S1 Matt Bishop, University of California, Davis Who should attend: UNIX system, network, and security administrators who need to better understand the various secu- rity tools currently available. TUESDAY Continuing Education The goal of this course is to assist UNIX Units (CEUs) security administrators, and other interested USENIX provides users, in locating and using publicly avail- T1 Designing Resilient Distributed Systems— able programs to improve the security of High Availability Continuing Education their systems. This course will compare the Units for a small addi- uses and drawbacks of several different pro- grams, with an emphasis on when to use tional administrative T2 Solaris Internals: Architecture, Tips, and Tidbits which. Only free tools with source code fee. The CEU is a available will be discussed. nationally recognized Topics include: ◆ Tool checking and analysis T3 Inside the Linux Kernel standard unit of mea- ◆ What to look for sure for continuing edu- ◆ How to analyze a tool ◆ Checking downloaded tools for T4 Configuring and Administering Samba Servers NEW cation and training and security problems is used by thousands of ◆ Static analysis tools: filesystem audit- organizations. Each full- ing (tiger, COPS) T5 Computer Attacks: Trends and Countermeasures ◆ Network analysis and security tools: day tutorial, or two half- monitors (nfsbug, tcp_wrappers), day tutorials, qualifies SATAN, Gabriel T6 Network Administration NEW for 0.6 CEUs. You can ◆ Tools for privilege: managing shells (lsu, smrsh) request CEU credit by ◆ Tools for logging and log analysis T7 Practical Web Site Development and Maintenance completing the CEU tools (swatch, logcheck) ◆ Libraries (msystem, trustfile) with Perl: A Cookbook Approach NEW section on the registra- ◆ Tools for authentication: proactive tion form. USENIX pro- password changers (passwd+, crack) vides a certificate for T8 Managing and Being Managed NEW each attendee taking a Sendmail Configuration tutorial for CEU credit S2 and Operation (Updated T9 Network Security Profiles: A Collection (Hodgepodge) and maintains tran- for Sendmail 8.10) of Stuff Hackers Know About You scripts for all CEU stu- Eric Allman, Sendmail, Inc. dents. CEUs are not the Who should attend: System administra- T10 Special Topics in Sendmail: Sendmail 8.10 and same as college credits. tors who want to learn more about the Sendmail Security NEW Consult your employer sendmail program, particularly details of configuration and operational issues (this or school to determine tutorial will not cover mail front ends). their applicability. This will be an intense, fast-paced, full-day tutorial for people who have already been REGISTER EARLY FOR TUTORIALS: Get Your First Choice! 5 Tutorial Program June 18–20, 2000 exposed to sendmail.