[NRG] FW: [Theory-seminars] CIS/Microsoft seminar is AT MIT!! Friday, March 26th

Bestavros, Azer best at bu.edu
Thu Mar 18 11:46:53 EDT 2010

In case you missed Sharon's talk last year... --Azer

-----Original Message-----
From: theory-seminars-bounces at lists.csail.mit.edu [mailto:theory-seminars-bounces at lists.csail.mit.edu] On Behalf Of Be Blackburn
Sent: Thursday, March 18, 2010 10:34 AM
To: cis-seminars at theory.csail.mit.edu
Subject: [Theory-seminars] next CIS/Microsoft seminar is AT MIT!! Friday, March 26th

*CIS/Microsoft Seminar at MIT (note change)*
> Title:      How Secure are Secure Internet Routing Protocols?
> Speaker: Sharon Goldberg, Microsoft, NE
> Date:      Friday, March 26, 2010
> Time:     10:30 AM - 12:00 PM
> Place:     32-G449, Patil/Kival
> A decade of research has been devoted to addressing vulnerabilities in 
> the Internet's interdomain routing system. The result is a plethora of 
> security proposals, each providing different types of security 
> guarantees. To inform decisions about which of these protocols should 
> be deployed in the Internet, we use both theory and simulations to 
> *quantify* the ability of these protocols to blunt a particularly 
> dangerous form of attack, namely, when an attacker manipulates routing 
> protocol messages in order to attract traffic to its network (so that 
> it can eavesdrop, tamper, or drop traffic). The key implication of our 
> work is that network access control mechanisms (e.g. route filtering) 
> can be as effective as cryptographic routing protocols. Moreover, we 
> present a series of counterintuitive examples, found in the empirical 
> data, to show that the attack strategies considered by most prior work 
> can *underestimate* the severity of these attacks.
> Joint work with Michael Schapira, Pete Hummon, and Jennifer Rexford.
> Bio:
> Sharon Goldberg is a post doc researcher at MSR New England, and will 
> be joining the Computer Science Department at Boston University as an 
> assistant professor in August 2010. She received her Ph.D. in 
> Electrical Engineering from Princeton University in September 2009. 
> Her research leverages cryptography, game theory and algorithms to 
> solve practical problems in network security.

More information about the NRG-L mailing list