[NRG] FW: [Theory-seminars] CIS/Microsoft seminar is AT MIT!! Friday, March 26th
best at bu.edu
Thu Mar 18 11:46:53 EDT 2010
In case you missed Sharon's talk last year... --Azer
From: theory-seminars-bounces at lists.csail.mit.edu [mailto:theory-seminars-bounces at lists.csail.mit.edu] On Behalf Of Be Blackburn
Sent: Thursday, March 18, 2010 10:34 AM
To: cis-seminars at theory.csail.mit.edu
Subject: [Theory-seminars] next CIS/Microsoft seminar is AT MIT!! Friday, March 26th
*CIS/Microsoft Seminar at MIT (note change)*
> Title: How Secure are Secure Internet Routing Protocols?
> Speaker: Sharon Goldberg, Microsoft, NE
> Date: Friday, March 26, 2010
> Time: 10:30 AM - 12:00 PM
> Place: 32-G449, Patil/Kival
> A decade of research has been devoted to addressing vulnerabilities in
> the Internet's interdomain routing system. The result is a plethora of
> security proposals, each providing different types of security
> guarantees. To inform decisions about which of these protocols should
> be deployed in the Internet, we use both theory and simulations to
> *quantify* the ability of these protocols to blunt a particularly
> dangerous form of attack, namely, when an attacker manipulates routing
> protocol messages in order to attract traffic to its network (so that
> it can eavesdrop, tamper, or drop traffic). The key implication of our
> work is that network access control mechanisms (e.g. route filtering)
> can be as effective as cryptographic routing protocols. Moreover, we
> present a series of counterintuitive examples, found in the empirical
> data, to show that the attack strategies considered by most prior work
> can *underestimate* the severity of these attacks.
> Joint work with Michael Schapira, Pete Hummon, and Jennifer Rexford.
> Sharon Goldberg is a post doc researcher at MSR New England, and will
> be joining the Computer Science Department at Boston University as an
> assistant professor in August 2010. She received her Ph.D. in
> Electrical Engineering from Princeton University in September 2009.
> Her research leverages cryptography, game theory and algorithms to
> solve practical problems in network security.
More information about the NRG-L