From Yves.Roudier at eurecom.fr Thu Aug 5 13:23:48 2004 From: Yves.Roudier at eurecom.fr (Yves.Roudier@eurecom.fr) Date: Sat Dec 9 22:12:42 2006 Subject: [p2p-hackers] ESORICS 2004 Call for Participation - reminder Message-ID: <200408051323.i75DNmxI016559@zinnia.eurecom.fr> [Apologies for multiple copies of this announcement] CALL FOR PARTICIPATION ESORICS 2004 9th European Symposium on Research in Computer Security Sponsored by SAP, @sec, and Région PACA Institut Eurecom, Sophia Antipolis, French Riviera, France September 13-15, 2004 http://esorics04.eurecom.fr ESORICS 2004 will be collocated with RAID 2004 Since 1990, ESORICS has been confirmed as the European research event in computer security, attracting audience from both the academic and industrial communities. The symposium has established itself as one of the premiere, international gatherings on Information Assurance. This year's three days program will feature a single technical track with 27 full papers selected from almost 170 submissions. PRELIMINARY PROGRAM ------------------- Monday, September 13th ====================== 09:15 - 09:30 opening remarks 09:30 - 10:30 invited talk 10:30 - 11:00 coffee break 11:00 - 12:30 Access control -------------- Incorporating Dynamic Constraints in the Flexible Authorization Framework Shiping Chen, Duminda Wijesekera, Sushil Jajodia Access-Condition-Table-driven Access Control for XML Database Naizhen Qi, Michiharu Kudo An Algebra for Composing Enterprise Privacy Policies Michael Backes, Markus Duermuth, Rainer Steinwandt 12:30 - 14:00 lunch 14:00 - 15:30 Cryptographic protocols ----------------------- Deriving, attacking and defending the GDOI protocol Catherine Meadows, Dusko Pavlovic Better Privacy for Trusted Computing Platforms Jan Camenisch A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol Michael Backes 15:30 - 16:00 coffee break 16:00 - 17:30 Anonymity and information hiding -------------------------------- A Formalization of Anonymity and Onion Routing Sjouke Mauw, Jan Verschuren, Erik de Vink Breaking Cauchy Model-based JPEG Steganography with First Order Statistics Rainer Böhme, Andreas Westfeld Comparison between two practical mix designs Claudia Diaz, Len Sassaman, Evelyne Dewitte Tuesday, September 14th ======================= 09:00 - 10:30 Distributed data protection --------------------------- Signature Bouquets: Immutability for Aggregated/Condensed Signatures Einar Mykletun, Maithili Narasimha, Gene Tsudik Towards a theory of data entanglement James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, Sheng Zhong Portable and Flexible Document Access Control Mechanisms Mikhail Atallah, Marina Bykova 10:30 - 11:00 coffee break 11:00 - 12:30 Information flow and security properties ---------------------------------------- Possibilistic Information Flow Control in the Presence of Encrypted Communication Dieter Hutter, Axel Schairer Information flow control revisited: Noninfluence = Noninterference + Nonleakage David von Oheimb Security Property Based Administrative Controls Jon A. Solworth, Robert H. Sloan 12:30 - 14:00 lunch 14:00 - 15:30 Authentication and trust management ----------------------------------- A Vector Model of Trust for Developing Trustworthy Systems Indrajit Ray, Sudip Chakraborty Parameterized Authentication Michael J. Covington, Mustaque Ahamad, Irfan Essa, H. Venkateswaran Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Bulent Yener, Seyit A. Camtepe 15:30 - 16:00 coffee break 16:00 - 17:30 Cryptography ------------ IPv6 Opportunistic Encryption Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann On the role of key schedules in attacks on iterated ciphers Lars R. Knudsen, John E. Mathiassen A Public-Key Encryption Scheme with Pseudo-Random Ciphertexts Bodo Moller Wednesday, September 15th ========================= 09:00 - 10:30 Operating systems and architecture ---------------------------------- A Host Intrusion Prevention System for Windows Operating Systems Roberto Battistoni, Emanuele Gabrielli, Luigi Vincenzo Mancini Re-establishing Trust in Compromised Systems: Recovering from Rootkits that Trojan the System Call Table Julian Grizzard, John Levine, Henry Owen ARCHERR: Runtime Environment Driven Program Safety Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu Upadhyaya 10:30 - 11:00 coffee break 11:00 - 12:30 Intrusion detection ------------------- Sets, Bags, and Rock and Roll Analyzing Large Data Sets of Network Data John McHugh Redundancy and diversity in security Bev Littlewood, Lorenzo Strigini Discover Novel Attack Strategies from INFOSEC Alerts Xinzhou Qin, Wenke Lee ORGANIZING COMMITTEE -------------------- General Chair Refik Molva Institut Eurecom email: Refik.Molva@eurecom.fr Program Chairs Peter Ryan Pierangela Samarati University of Newcastle upon Tyne University of Milan email: Peter.Ryan@newcastle.ac.uk email: samarati@dti.unimi.it Publication Chair Publicity Chair Dieter Gollmann Yves Roudier TU Hamburg-Harburg Institut Eurecom email: diego@tuhh.de email: roudier@eurecom.fr Sponsoring Chair Marc Dacier Institut Eurecom email: dacier@eurecom.fr PROGRAM COMMITTEE ----------------- Vijay Atluri, Rutgers University, USA Giampaolo Bella, Università di Catania, Italy Joachim Biskup, Universitaet Dortmund, Germany Jan Camenisch, IBM Research, Switzerland Germano Caronni, Sun Microsystems Laboratories, USA David Chadwick, University of Salford, UK Ernesto Damiani, University of Milan, Italy Sabrina De Capitani di Vimercati, University of Milan, Italy Yves Deswarte, LAAS-CNRS, France Alberto Escudero-Pascual, Royal Institute of Technology, Sweden Csilla Farkas, University of South Carolina, USA Simon Foley, University College Cork, Ireland Dieter Gollmann, TU Hamburg-Harburg, Germany Joshua D. Guttman, MITRE, USA Sushil Jajodia, George Mason University, USA Sokratis K. Katsikas, University of the Aegean, Greece Maciej Koutny, University of Newcastle upon Tyne, UK Peng Liu, Pennsylvania State University, USA Javier Lopez, University of Malaga, Spain Roy Maxion, Carnegie Mellon University, USA Patrick McDaniel, AT&T Labs-Research, USA John McHugh, CERT/CC, USA Catherine A. Meadows, Naval Research Lab, USA Refik Molva, Institut Eurécom, France Peng Ning, NC State University, USA LouAnna Notargiacomo, The MITRE Corporation, USA Eiji Okamoto, University of Tsukuba, Japan Stefano Paraboschi, University of Bergamo, Italy Andreas Pfitzmann, TU Dresden, Germany Bart Preneel, Katholieke Universiteit Leuven, Belgium Jean-Jacques Quisquater, Microelectronic laboratory, Belgium Steve Schneider, University of London, UK Christoph Schuba, Sun Microsystems, Inc., USA Michael Steiner, IBM T.J. Watson Research Laboratory, USA Paul Syverson, Naval Research Laboratory, USA Kymie M.C. Tan, Carnegie Mellon University, USA Dan Thomsen, Tresys Technology, USA Moti Yung, Columbia University, USA VENUE / TRAVEL -------------- ESORICS 2004 will be held on the French Riviera coast, about 20 km West of Nice and 15 km Northeast of Cannes. The conference will take place at Institut Eurecom / CICA, in the Sophia Antipolis science park, which can easily be reached thanks to the nearby Nice international airport. For more information, refer to: http://esorics04.eurecom.fr/visitor_information.html IMPORTANT DATES --------------- ESORICS conference dates: September 13-15, 2004 From Yves.Roudier at eurecom.fr Thu Aug 5 13:23:59 2004 From: Yves.Roudier at eurecom.fr (Yves.Roudier@eurecom.fr) Date: Sat Dec 9 22:12:42 2006 Subject: [p2p-hackers] RAID 2004 Call for Participation - reminder Message-ID: <200408051323.i75DNxjh016652@zinnia.eurecom.fr> [Apologies for multiple copies of this announcement] CALL FOR PARTICIPATION RAID 2004 "Intrusion Detection and Society" Seventh International Symposium on Recent Advances in Intrusion Detection Sponsored by SAP, France Telecom, and Région PACA Institut Eurecom, Sophia-Antipolis, French Riviera, France September 15-17, 2004 http://raid04.eurecom.fr RAID 2004 will be collocated with ESORICS 2004 The RAID symposium brings together leading researchers and practitioners from academia, government, and industry to discuss intrusion detection technologies and issues from research and commercial perspectives. This year's program features a single technical track with 14 full papers and 2 practical experience reports selected from almost 120 submissions. It also includes invited speakers, a poster session as well as an abstracts' session. The abstracts' session offers attendees the opportunity to present preliminary research results or summaries of work published elsewhere. Poster presentations of similar research results are also possible on Wednesday evening. Abstract submissions from people not presenting posters are also welcome. Submissions to either poster or abstract session should be sent to . For details see http://raid04.eurecom.fr/ . TECHNICAL PROGRAM ----------------- Wednesday, September 15th ========================= 09.00 Registration opens 12.30 Lunch 14.00 - 14.15 Welcome 14.15 - 15.15 Invited Talk: Lessons in Intrusion Detection Bruce Schneier, Counterpane Internet Security, CA, USA 15.15 - 15.45 Coffee break 15.45 - 16.45 Modelling process behaviour - Chair: Alfonso Valdes, (SRI International, USA) Automatic Extraction of Accurate Application-Specific Sandboxing Policy, Lap-chung Lam and Tzi-cker Chiueh, Rether Networks Inc., Centereach N.Y., USA Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths, Haizhi Xu, Wenliang Du, and Steve J. Chapin, Systems Assurance Institute, Syracuse University, USA 16.45 - 17.00 Break 17.00 - 18.00 Abstract session 18.00 - Poster session Thursday, September 16th ======================== 09.00 - 10.30 Detecting Worms and Viruses - Chair: John McHugh (CMU/SEI CERT, USA) HoneyStat: Local Worm Detection Using Honeypots, David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian Grizzard, John Levine, and Henry Owen, Georgia Institute of Technology, USA Fast Detection of Scanning Worm Infections, Jaeyeon Jung (1), Stuart E. Schechter (2), and Arthur W. Berger (1), (1) MIT CSAIL, USA (2) Harvard DEAS, USA. Detecting Unknown Massive Mailing Viruses Using Proactive Methods Ruiqi Hu and Aloysius K. Mok, Dept of Computer Sciences, University of Texas at Austin, USA 10.30 - 11.00 Coffee break 11.00 - 12.30 Attack and Alert Analysis - Chair: Diego Zamboni (IBM Research, Switzerland) Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection, Tadeusz Pietraszek, IBM Zürich Research Laboratory, Switzerland. Attack Analysis and Detection for Ad Hoc Routing Protocols Yi-an Huang, Wenke Lee, College of Computing, Georgia Institute of Technology, USA. On the Design and Use of Internet Sinks for Network Abuse Monitoring Vinod Yegneswaran (1), Paul Barford (1), Dave Plonka (2), (1) Dept of Computer Science, University of Wisconsin, Madison, USA, (2) Dept of Information Technology, University of Wisconsin, Madison, USA 12.30 - 14.00 Lunch 14.00 - 15.00 Invited Talk: Fighting Fraud in Telecom Environments Håkan Kvarnström TeliaSonera AB, Sweden 15.00 - 15.30 Coffee break 15.30 - 16.30 Practical Experience - Chair: George Mohay (Queensland University of Technology, Australia) Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information Jouni Viinikka and Herve Debar, France Telecom R&D, Caen, France Experience with a Commercial Deception System, Brian Hernacki, Jeremy Bennett, Thomas Lofgren, Symantec Corporation, Redwood City, USA 16.30 - 17.30 Poster session Friday, September 17th ====================== 09.00 - 10.30 Anomaly Detection - Chair: Christopher Kruegel, (Technical University of Vienna, Austria) Anomalous Payload-based Network Intrusion Detection Ke Wang Salvatore J. Stolfo, Computer Science Dept, Columbia University, USA Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix Mizuki Oka (1), Yoshihiro Oyama (2,3), Hirotake Abe (1), and Kazuhiko Kato (1,3), (1) University of Tsukuba, Japan, (2) University of Tokyo, Japan, (3) Japan Science and Technology Cooperation, Japan Seurat: A Pointillist Approach to Anomaly Detection Yinglian Xie (1), Hyang-Ah Kim (1), David R. O'Hallaron (1,2) Michael K. Reiter (1,2), and Hui Zhang (1,2), (1) Dept of Computer Science, Carnegie-Mellon University, USA (2) Dept of Electrical and Computer Engineering, Carnegie-Mellon University, USA 10.30 - 11.00 Coffee Break 11.00 - 12.30 Formal Analysis for Intrusion Detection - Chair: Wenke Lee (Georgia Tech, USA) Detection of Interactive Stepping Stones with Maximum Delay Bound: Algorithms and Confidence Bounds Avrim Blum, Dawn Song, Shobha Venkataraman Carnegie Mellon University, USA. Formal Reasoning about Intrusion Detection Systems Tao Song (1), Calvin Ko (2), Jim Alves-Foss (3), Cui Zhang (4), and Karl Levitt (1), (1) Computer Security Laboratory, University of California, Davis, USA, (2) NAI LAbs, Network Associates Inc., Santa Clara, CA, USA, (3) Center for Secure and Dependable Systems, University of Idaho, USA (4) Computer Science Dept, California State University, Sacramento, USA. RheoStat : Real-time Risk Management Ashish Gehani and Gershon Kedem, Dept of Computer Science, Duke University, USA 12.30 - 12.45 Concluding remarks 12.45 - 14.00 Lunch ORGANIZING COMMITTEE -------------------- General Chair: Refik Molva Program Chairs: Erland Jonsson Alfonso Valdes Publication Chair: Magnus Almgren Publicity Chair: Yves Roudier Sponsor Chair: Marc Dacier PROGRAM COMMITTEE ----------------- Tatsuya Baba (NTT Data, Japan) Lee Badger (DARPA, USA) Sungdeok Cha (KAIST, Korea) Steven Cheung (SRI International, USA) Herve Debar (France Telecom R&D, France) Simone Fischer-Hubner (Karlstad University, Sweden) Steven Furnell (University of Plymouth, UK) Dogan Kesdogan (RWTH Aachen, Germany) Chris Kruegel (Technical University of Vienna, Austria) Hakan Kvarnstrom (TeliaSonera R&D, Sweden) Wenke Lee (Georgia Tech, USA) Douglas Maughan (DHS HSARPA, USA) Roy Maxion (Carnegie Mellon University, USA) John McHugh (CMU/SEI CERT, USA) Ludovic Me (Supelec, France) George Mohay (Queensland University of Technology, Australia) Vern Paxson (ICSI and LBNL, USA) Giovanni Vigna (UCSB, USA) Andreas Wespi (IBM Research, Switzerland) Felix Wu (UC Davis, USA) Diego Zamboni (IBM Research, Switzerland) STEERING COMMITTEE ------------------ Chair: Marc Dacier (Eurecom, France) Herve Debar (France Telecom R&D, France) Deborah Frincke (University of Idaho, USA) Huang Ming-Yuh (The Boeing Company, USA) Wenke Lee (Georgia Institute of Technology, USA) Ludovic Me (Supelec, France) S. Felix Wu (UC Davis, USA) Andreas Wespi (IBM Research, Switzerland) Giovanni Vigna (UCSB, USA) VENUE / TRAVEL -------------- RAID 2004 will be held on the French Riviera coast, about 20 km West of Nice and 15 km Northeast of Cannes. The conference will take place at Institut Eurecom / CICA, in the Sophia Antipolis science park, which can easily be reached thanks to the nearby Nice international airport. For more information, refer to: http://raid04.eurecom.fr/visitor_information.html IMPORTANT DATES --------------- Deadline for abstract/poster submission : August 30, 2004 (contact: Marc Dacier ) RAID conference dates : September 15-17, 2004 From nmpallas at ceid.upatras.gr Thu Aug 5 21:45:59 2004 From: nmpallas at ceid.upatras.gr (Mpallas Nikolaos) Date: Sat Dec 9 22:12:42 2006 Subject: [p2p-hackers] help In-Reply-To: <20040805190004.0ACEA3FD0D@capsicum.zgp.org> Message-ID: Camel is a horse made up in a laboratory On Thu, 5 Aug 2004 p2p-hackers-request@zgp.org wrote: > Send p2p-hackers mailing list submissions to > p2p-hackers@zgp.org > > To subscribe or unsubscribe via the World Wide Web, visit > http://zgp.org/mailman/listinfo/p2p-hackers > or, via email, send a message with subject or body 'help' to > p2p-hackers-request@zgp.org > > You can reach the person managing the list at > p2p-hackers-owner@zgp.org > > When replying, please edit your Subject line so it is more specific > than "Re: Contents of p2p-hackers digest..." > > > Today's Topics: > > 1. ESORICS 2004 Call for Participation - reminder > (Yves.Roudier@eurecom.fr) > 2. RAID 2004 Call for Participation - reminder > (Yves.Roudier@eurecom.fr) > > > ---------------------------------------------------------------------- > > Message: 1 > Date: Thu, 5 Aug 2004 15:23:48 +0200 (MEST) > From: Yves.Roudier@eurecom.fr > Subject: [p2p-hackers] ESORICS 2004 Call for Participation - reminder > To: p2p-hackers@zgp.org > Message-ID: <200408051323.i75DNmxI016559@zinnia.eurecom.fr> > > [Apologies for multiple copies of this announcement] > > CALL FOR PARTICIPATION > > ESORICS 2004 > 9th European Symposium on Research in Computer Security > > Sponsored by SAP, @sec, and R?gion PACA > > Institut Eurecom, Sophia Antipolis, French Riviera, France > September 13-15, 2004 > http://esorics04.eurecom.fr > ESORICS 2004 will be collocated with RAID 2004 > > > Since 1990, ESORICS has been confirmed as the European research event in > computer security, attracting audience from both the academic and industrial > communities. The symposium has established itself as one of the premiere, > international gatherings on Information Assurance. This year's three days > program will feature a single technical track with 27 full papers selected > from almost 170 submissions. > > > PRELIMINARY PROGRAM > ------------------- > > Monday, September 13th > ====================== > > 09:15 - 09:30 opening remarks > > 09:30 - 10:30 invited talk > > 10:30 - 11:00 coffee break > > 11:00 - 12:30 Access control > -------------- > > Incorporating Dynamic Constraints in the Flexible Authorization Framework > Shiping Chen, Duminda Wijesekera, Sushil Jajodia > > Access-Condition-Table-driven Access Control for XML Database > Naizhen Qi, Michiharu Kudo > > An Algebra for Composing Enterprise Privacy Policies > Michael Backes, Markus Duermuth, Rainer Steinwandt > > 12:30 - 14:00 lunch > > 14:00 - 15:30 Cryptographic protocols > ----------------------- > > Deriving, attacking and defending the GDOI protocol > Catherine Meadows, Dusko Pavlovic > > Better Privacy for Trusted Computing Platforms > Jan Camenisch > > A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees > Protocol > Michael Backes > > 15:30 - 16:00 coffee break > > 16:00 - 17:30 Anonymity and information hiding > -------------------------------- > > A Formalization of Anonymity and Onion Routing > Sjouke Mauw, Jan Verschuren, Erik de Vink > > Breaking Cauchy Model-based JPEG Steganography with First Order Statistics > Rainer B?hme, Andreas Westfeld > > Comparison between two practical mix designs > Claudia Diaz, Len Sassaman, Evelyne Dewitte > > > Tuesday, September 14th > ======================= > > 09:00 - 10:30 Distributed data protection > --------------------------- > > Signature Bouquets: Immutability for Aggregated/Condensed Signatures > Einar Mykletun, Maithili Narasimha, Gene Tsudik > > Towards a theory of data entanglement > James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, Sheng Zhong > > Portable and Flexible Document Access Control Mechanisms > Mikhail Atallah, Marina Bykova > > 10:30 - 11:00 coffee break > > 11:00 - 12:30 Information flow and security properties > ---------------------------------------- > > Possibilistic Information Flow Control in the Presence of Encrypted > Communication > Dieter Hutter, Axel Schairer > > Information flow control revisited: Noninfluence = Noninterference + > Nonleakage > David von Oheimb > > Security Property Based Administrative Controls > Jon A. Solworth, Robert H. Sloan > > 12:30 - 14:00 lunch > > 14:00 - 15:30 Authentication and trust management > ----------------------------------- > > A Vector Model of Trust for Developing Trustworthy Systems > Indrajit Ray, Sudip Chakraborty > > Parameterized Authentication > Michael J. Covington, Mustaque Ahamad, Irfan Essa, H. Venkateswaran > > Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor > Networks > Bulent Yener, Seyit A. Camtepe > > 15:30 - 16:00 coffee break > > 16:00 - 17:30 Cryptography > ------------ > > IPv6 Opportunistic Encryption > Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann > > On the role of key schedules in attacks on iterated ciphers > Lars R. Knudsen, John E. Mathiassen > > A Public-Key Encryption Scheme with Pseudo-Random Ciphertexts > Bodo Moller > > Wednesday, September 15th > ========================= > > 09:00 - 10:30 Operating systems and architecture > ---------------------------------- > > A Host Intrusion Prevention System for Windows Operating Systems > Roberto Battistoni, Emanuele Gabrielli, Luigi Vincenzo Mancini > > Re-establishing Trust in Compromised Systems: Recovering from Rootkits > that Trojan the System Call Table > Julian Grizzard, John Levine, Henry Owen > > ARCHERR: Runtime Environment Driven Program Safety > Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu Upadhyaya > > 10:30 - 11:00 coffee break > > 11:00 - 12:30 Intrusion detection > ------------------- > > Sets, Bags, and Rock and Roll Analyzing Large Data Sets of Network Data > John McHugh > > Redundancy and diversity in security > Bev Littlewood, Lorenzo Strigini > > Discover Novel Attack Strategies from INFOSEC Alerts > Xinzhou Qin, Wenke Lee > > > ORGANIZING COMMITTEE > -------------------- > > General Chair > Refik Molva > Institut Eurecom > email: Refik.Molva@eurecom.fr > > Program Chairs > Peter Ryan Pierangela Samarati > University of Newcastle upon Tyne University of Milan > email: Peter.Ryan@newcastle.ac.uk email: samarati@dti.unimi.it > > Publication Chair Publicity Chair > Dieter Gollmann Yves Roudier > TU Hamburg-Harburg Institut Eurecom > email: diego@tuhh.de email: roudier@eurecom.fr > > Sponsoring Chair > Marc Dacier > Institut Eurecom > email: dacier@eurecom.fr > > > PROGRAM COMMITTEE > ----------------- > > Vijay Atluri, Rutgers University, USA > Giampaolo Bella, Universit? di Catania, Italy > Joachim Biskup, Universitaet Dortmund, Germany > Jan Camenisch, IBM Research, Switzerland > Germano Caronni, Sun Microsystems Laboratories, USA > David Chadwick, University of Salford, UK > Ernesto Damiani, University of Milan, Italy > Sabrina De Capitani di Vimercati, University of Milan, Italy > Yves Deswarte, LAAS-CNRS, France > Alberto Escudero-Pascual, Royal Institute of Technology, Sweden > Csilla Farkas, University of South Carolina, USA > Simon Foley, University College Cork, Ireland > Dieter Gollmann, TU Hamburg-Harburg, Germany > Joshua D. Guttman, MITRE, USA > Sushil Jajodia, George Mason University, USA > Sokratis K. Katsikas, University of the Aegean, Greece > Maciej Koutny, University of Newcastle upon Tyne, UK > Peng Liu, Pennsylvania State University, USA > Javier Lopez, University of Malaga, Spain > Roy Maxion, Carnegie Mellon University, USA > Patrick McDaniel, AT&T Labs-Research, USA > John McHugh, CERT/CC, USA > Catherine A. Meadows, Naval Research Lab, USA > Refik Molva, Institut Eur?com, France > Peng Ning, NC State University, USA > LouAnna Notargiacomo, The MITRE Corporation, USA > Eiji Okamoto, University of Tsukuba, Japan > Stefano Paraboschi, University of Bergamo, Italy > Andreas Pfitzmann, TU Dresden, Germany > Bart Preneel, Katholieke Universiteit Leuven, Belgium > Jean-Jacques Quisquater, Microelectronic laboratory, Belgium > Steve Schneider, University of London, UK > Christoph Schuba, Sun Microsystems, Inc., USA > Michael Steiner, IBM T.J. Watson Research Laboratory, USA > Paul Syverson, Naval Research Laboratory, USA > Kymie M.C. Tan, Carnegie Mellon University, USA > Dan Thomsen, Tresys Technology, USA > Moti Yung, Columbia University, USA > > > > VENUE / TRAVEL > -------------- > > ESORICS 2004 will be held on the French Riviera coast, about 20 km West of Nice > and 15 km Northeast of Cannes. The conference will take place at Institut > Eurecom / CICA, in the Sophia Antipolis science park, which can easily be > reached thanks to the nearby Nice international airport. For more > information, refer to: http://esorics04.eurecom.fr/visitor_information.html > > > IMPORTANT DATES > --------------- > > ESORICS conference dates: September 13-15, 2004 > > > ------------------------------ > > Message: 2 > Date: Thu, 5 Aug 2004 15:23:59 +0200 (MEST) > From: Yves.Roudier@eurecom.fr > Subject: [p2p-hackers] RAID 2004 Call for Participation - reminder > To: p2p-hackers@zgp.org > Message-ID: <200408051323.i75DNxjh016652@zinnia.eurecom.fr> > > [Apologies for multiple copies of this announcement] > > CALL FOR PARTICIPATION > > RAID 2004 > "Intrusion Detection and Society" > Seventh International Symposium on > Recent Advances in Intrusion Detection > > Sponsored by SAP, France Telecom, and R?gion PACA > > Institut Eurecom, Sophia-Antipolis, French Riviera, France > September 15-17, 2004 > http://raid04.eurecom.fr > RAID 2004 will be collocated with ESORICS 2004 > > > The RAID symposium brings together leading researchers and practitioners from > academia, government, and industry to discuss intrusion detection technologies > and issues from research and commercial perspectives. > > This year's program features a single technical track with 14 full papers and > 2 practical experience reports selected from almost 120 submissions. It also > includes invited speakers, a poster session as well as an abstracts' session. > > The abstracts' session offers attendees the opportunity to present preliminary > research results or summaries of work published elsewhere. Poster presentations > of similar research results are also possible on Wednesday evening. Abstract > submissions from people not presenting posters are also welcome. Submissions > to either poster or abstract session should be sent to . > For details see http://raid04.eurecom.fr/ . > > > > > TECHNICAL PROGRAM > ----------------- > > Wednesday, September 15th > ========================= > > 09.00 Registration opens > > 12.30 Lunch > > 14.00 - 14.15 Welcome > > 14.15 - 15.15 Invited Talk: Lessons in Intrusion Detection > Bruce Schneier, Counterpane Internet Security, CA, USA > > 15.15 - 15.45 Coffee break > > 15.45 - 16.45 Modelling process behaviour - Chair: Alfonso Valdes, > (SRI International, USA) > > Automatic Extraction of Accurate Application-Specific > Sandboxing Policy, > Lap-chung Lam and Tzi-cker Chiueh, > Rether Networks Inc., Centereach N.Y., USA > > Context Sensitive Anomaly Monitoring of Process Control > Flow to Detect Mimicry Attacks and Impossible Paths, > Haizhi Xu, Wenliang Du, and Steve J. Chapin, > Systems Assurance Institute, Syracuse University, USA > > 16.45 - 17.00 Break > > 17.00 - 18.00 Abstract session > > 18.00 - Poster session > > > > Thursday, September 16th > ======================== > > 09.00 - 10.30 Detecting Worms and Viruses - Chair: John McHugh > (CMU/SEI CERT, USA) > > HoneyStat: Local Worm Detection Using Honeypots, > David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian > Grizzard, John Levine, and Henry Owen, > Georgia Institute of Technology, USA > > Fast Detection of Scanning Worm Infections, > Jaeyeon Jung (1), Stuart E. Schechter (2), > and Arthur W. Berger (1), > (1) MIT CSAIL, USA > (2) Harvard DEAS, USA. > > Detecting Unknown Massive Mailing Viruses Using > Proactive Methods > Ruiqi Hu and Aloysius K. Mok, > Dept of Computer Sciences, University of Texas at Austin, USA > > > 10.30 - 11.00 Coffee break > > 11.00 - 12.30 Attack and Alert Analysis - Chair: Diego Zamboni > (IBM Research, Switzerland) > > Using Adaptive Alert Classification to Reduce False Positives > in Intrusion Detection, > Tadeusz Pietraszek, > IBM Z?rich Research Laboratory, Switzerland. > > Attack Analysis and Detection for Ad Hoc Routing Protocols > Yi-an Huang, Wenke Lee, > College of Computing, Georgia Institute of Technology, USA. > > On the Design and Use of Internet Sinks for Network Abuse > Monitoring > Vinod Yegneswaran (1), Paul Barford (1), Dave Plonka (2), > (1) Dept of Computer Science, University of Wisconsin, > Madison, USA, > (2) Dept of Information Technology, University of Wisconsin, > Madison, USA > > > 12.30 - 14.00 Lunch > > 14.00 - 15.00 Invited Talk: Fighting Fraud in Telecom Environments > H?kan Kvarnstr?m > TeliaSonera AB, Sweden > > 15.00 - 15.30 Coffee break > > 15.30 - 16.30 Practical Experience - Chair: George Mohay > (Queensland University of Technology, Australia) > > Monitoring IDS Background Noise Using EWMA Control > Charts and Alert Information > Jouni Viinikka and Herve Debar, > France Telecom R&D, Caen, France > > Experience with a Commercial Deception System, > Brian Hernacki, Jeremy Bennett, Thomas Lofgren, > Symantec Corporation, Redwood City, USA > > 16.30 - 17.30 Poster session > > > Friday, September 17th > ====================== > > 09.00 - 10.30 Anomaly Detection - Chair: Christopher Kruegel, > (Technical University of Vienna, Austria) > > Anomalous Payload-based Network Intrusion Detection > Ke Wang Salvatore J. Stolfo, > Computer Science Dept, Columbia University, USA > > Anomaly Detection Using Layered Networks Based on Eigen > Co-occurrence Matrix > Mizuki Oka (1), Yoshihiro Oyama (2,3), Hirotake Abe (1), and > Kazuhiko Kato (1,3), > (1) University of Tsukuba, Japan, > (2) University of Tokyo, Japan, > (3) Japan Science and Technology Cooperation, Japan > > Seurat: A Pointillist Approach to Anomaly Detection > Yinglian Xie (1), Hyang-Ah Kim (1), David R. O'Hallaron (1,2) > Michael K. Reiter (1,2), and Hui Zhang (1,2), > (1) Dept of Computer Science, Carnegie-Mellon University, USA > (2) Dept of Electrical and Computer Engineering, > Carnegie-Mellon University, USA > > > 10.30 - 11.00 Coffee Break > > 11.00 - 12.30 Formal Analysis for Intrusion Detection - Chair: Wenke Lee > (Georgia Tech, USA) > > Detection of Interactive Stepping Stones with Maximum > Delay Bound: Algorithms and Confidence Bounds > Avrim Blum, Dawn Song, Shobha Venkataraman > Carnegie Mellon University, USA. > > Formal Reasoning about Intrusion Detection Systems > Tao Song (1), Calvin Ko (2), Jim Alves-Foss (3), > Cui Zhang (4), and Karl Levitt (1), > (1) Computer Security Laboratory, University of California, > Davis, USA, > (2) NAI LAbs, Network Associates Inc., Santa Clara, CA, USA, > (3) Center for Secure and Dependable Systems, University > of Idaho, USA > (4) Computer Science Dept, California State University, > Sacramento, USA. > > RheoStat : Real-time Risk Management > Ashish Gehani and Gershon Kedem, > Dept of Computer Science, Duke University, USA > > 12.30 - 12.45 Concluding remarks > > 12.45 - 14.00 Lunch > > > > > ORGANIZING COMMITTEE > -------------------- > > > General Chair: Refik Molva > > Program Chairs: Erland Jonsson > Alfonso Valdes > > Publication Chair: Magnus Almgren > > Publicity Chair: Yves Roudier > > Sponsor Chair: Marc Dacier > > > PROGRAM COMMITTEE > ----------------- > > Tatsuya Baba (NTT Data, Japan) > Lee Badger (DARPA, USA) > Sungdeok Cha (KAIST, Korea) > Steven Cheung (SRI International, USA) > Herve Debar (France Telecom R&D, France) > Simone Fischer-Hubner (Karlstad University, Sweden) > Steven Furnell (University of Plymouth, UK) > Dogan Kesdogan (RWTH Aachen, Germany) > Chris Kruegel (Technical University of Vienna, Austria) > Hakan Kvarnstrom (TeliaSonera R&D, Sweden) > Wenke Lee (Georgia Tech, USA) > Douglas Maughan (DHS HSARPA, USA) > Roy Maxion (Carnegie Mellon University, USA) > John McHugh (CMU/SEI CERT, USA) > Ludovic Me (Supelec, France) > George Mohay (Queensland University of Technology, Australia) > Vern Paxson (ICSI and LBNL, USA) > Giovanni Vigna (UCSB, USA) > Andreas Wespi (IBM Research, Switzerland) > Felix Wu (UC Davis, USA) > Diego Zamboni (IBM Research, Switzerland) > > > STEERING COMMITTEE > ------------------ > > Chair: Marc Dacier (Eurecom, France) > > Herve Debar (France Telecom R&D, France) > Deborah Frincke (University of Idaho, USA) > Huang Ming-Yuh (The Boeing Company, USA) > Wenke Lee (Georgia Institute of Technology, USA) > Ludovic Me (Supelec, France) > S. Felix Wu (UC Davis, USA) > Andreas Wespi (IBM Research, Switzerland) > Giovanni Vigna (UCSB, USA) > > > VENUE / TRAVEL > -------------- > > RAID 2004 will be held on the French Riviera coast, about 20 km West of Nice > and 15 km Northeast of Cannes. The conference will take place at Institut > Eurecom / CICA, in the Sophia Antipolis science park, which can easily be > reached thanks to the nearby Nice international airport. For more > information, refer to: http://raid04.eurecom.fr/visitor_information.html > > > IMPORTANT DATES > --------------- > > Deadline for abstract/poster submission : August 30, 2004 > (contact: Marc Dacier ) > RAID conference dates : September 15-17, 2004 > > > ------------------------------ > > _______________________________________________ > p2p-hackers mailing list > p2p-hackers@zgp.org > http://zgp.org/mailman/listinfo/p2p-hackers > > > End of p2p-hackers Digest, Vol 13, Issue 1 > ****************************************** > From ls011g7939 at blueyonder.co.uk Fri Aug 6 11:32:10 2004 From: ls011g7939 at blueyonder.co.uk (David Ashe) Date: Sat Dec 9 22:12:42 2006 Subject: [p2p-hackers] help References: Message-ID: <003501c47ba9$075a1490$6501a8c0@bombaymix> ok, i'm here to help. try one of the following : psychiatrist psycologist therapist linguist? ----- Original Message ----- From: "Mpallas Nikolaos" To: Sent: Thursday, August 05, 2004 10:45 PM Subject: [p2p-hackers] help Camel is a horse made up in a laboratory On Thu, 5 Aug 2004 p2p-hackers-request@zgp.org wrote: > Send p2p-hackers mailing list submissions to > p2p-hackers@zgp.org From eugen at leitl.org Fri Aug 6 16:35:21 2004 From: eugen at leitl.org (Eugen Leitl) Date: Sat Dec 9 22:12:42 2006 Subject: [p2p-hackers] States Threaten P2P Companies (fwd from brian-slashdotnews@hyperreal.org) Message-ID: <20040806163521.GX1400@leitl.org> ----- Forwarded message from brian-slashdotnews@hyperreal.org ----- From: brian-slashdotnews@hyperreal.org Date: 6 Aug 2004 16:26:04 -0000 To: slashdotnews@hyperreal.org Subject: States Threaten P2P Companies User-Agent: SlashdotNewsScooper/0.0.3 Link: http://slashdot.org/article.pl?sid=04/08/06/1348257 Posted by: michael, on 2004-08-06 14:25:00 from the they-do-it-for-the-children dept. [1]The Importance of writes "[2]C|Net News reports that 46 state attorneys general are warning P2P companies of dire, unnamed consequences for continuing to exist, 'At present, P2P software has too many times been hijacked by those who use it for illegal purposes to which the vast majority of our consumers do not wish to be exposed.' Read the letter [3]here (pdf) [PDF], or the [4]annotated text version." References 1. http://www.corante.com/importance/ 2. http://news.com.com/State+AGs+warn+file-sharing+companies/2100-1032_3-5298413.html 3. http://www.corante.com/importance/archives/P2P_United_Letter_(8-5-04).pdf 4. http://www.corante.com/importance/archives/005537.php ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 198 bytes Desc: not available Url : http://zgp.org/pipermail/p2p-hackers/attachments/20040806/0fde1240/attachment.pgp From angryhicKclown at netscape.net Sat Aug 7 18:23:26 2004 From: angryhicKclown at netscape.net (angryhicKclown@netscape.net) Date: Sat Dec 9 22:12:42 2006 Subject: [p2p-hackers] source code (in python, using twisted) to my reliable udp rpc protocol Message-ID: <513814D1.54080CE7.519F8DB3@netscape.net> I was paging thru the archives and realized I never posted it. Works for me, but I've never done a large-scale test of it. Perhaps someone would like to and share the results? It consists of several layers, a stack, if you will: Reliable datagram - handles acks, etc Datagram stream - allows one to send messages larger than the MTU CBOB - binary format for storing structured data, similar to xml, except it doesn't suck TinyRPC - RPC protocol build upon all of those layers Enjoy. Requires www.twistedmatrix.com. ---- cut here ---- # TinyRPC protocol # bsd license from twisted.internet import reactor, protocol, interfaces, defer from twisted.protocols import policies import socket import struct import binascii import cStringIO as StringIO import time CBOB_BOOL = 0 CBOB_INT = 1 CBOB_FLOAT = 2 CBOB_STR = 3 CBOB_USTR = 4 CBOB_TUPLE = 5 CBOB_LIST = 6 CBOB_DICT = 7 CBOB_OBJ = 8 CBOB_NONE = 9 def cbob_encode(obj, buf=StringIO.StringIO()): if isinstance(obj, bool): if obj: buf.write(struct.pack("! BB", CBOB_BOOL, 1)) else: buf.write(struct.pack("! BB", CBOB_BOOL, 0)) elif isinstance(obj, int): buf.write(struct.pack("! Bi", CBOB_INT, obj)) elif isinstance(obj, float): buf.write(struct.pack("! Bf", CBOB_FLOAT, obj)) elif isinstance(obj, str): buf.write(struct.pack("! BH", CBOB_STR, len(obj)) + obj) elif isinstance(obj, unicode): buf.write(struct.pack("! BH", CBOB_USTR, len(obj)) + obj) elif isinstance(obj, tuple): buf.write(struct.pack("! BB", CBOB_TUPLE, len(obj))) for o in obj: cbob_encode(o, buf) elif isinstance(obj, list): buf.write(struct.pack("! BH", CBOB_LIST, len(obj))) for o in obj: cbob_encode(o, buf) elif isinstance(obj, dict): buf.write(struct.pack("! BH", CBOB_DICT, len(obj))) for o in obj: cbob_encode(o, buf) cbob_encode(obj[o], buf) elif isinstance(obj, object): members = obj.__dict__.items() #inspect.getmembers(obj) buf.write(struct.pack("! BHB", CBOB_OBJ, len(members), len(obj.__class__.__name__))) buf.write(obj.__class__.__name__) for member in members: cbob_encode(member[0], buf) cbob_encode(member[1], buf) elif isinstance(obj, NoneType): buf.write(struct.pack("! B", CBOB_NONE)) else: raise "couldn't serialize " + str(obj) def cbob_decode(buf): d = buf.read(1) typ = struct.unpack("! B", d)[0] if typ == CBOB_BOOL: v = struct.unpack("! B", buf.read(1))[0] return v == 1 elif typ == CBOB_INT: return struct.unpack("! i", buf.read(4))[0] elif typ == CBOB_FLOAT: return struct.unpack("! f", buf.read(4))[0] elif typ == CBOB_STR: l = struct.unpack("! H", buf.read(2))[0] return buf.read(l) elif typ == CBOB_USTR: l = struct.unpack("! H", buf.read(2))[0] return unicode(buf.read(l)) elif typ == CBOB_TUPLE: l = struct.unpack("! B", buf.read(1))[0] v = () for i in range(0, l): v = v + (cbob_decode(buf),) return v elif typ == CBOB_LIST: l = struct.unpack("! H", buf.read(2))[0] v = [] for i in range(0, l): v.append(cbob_decode(buf)) return v elif typ == CBOB_DICT: l = struct.unpack("! H", buf.read(2))[0] v = {} for i in range(0, l): key,value = cbob_decode(buf),cbob_decode(buf) v[key] = value return v elif typ == CBOB_OBJ: membercount,clsnamesize = struct.unpack("! HB", buf.read(3)) clsname = buf.read(clsnamesize) v = globals()[clsname]() for i in range(0, membercount): name,value = cbob_decode(buf),cbob_decode(buf) setattr(v, name, value) return v elif typ == CBOB_NONE: return None else: raise "invalid typecode " + typ class DispatcherTransport: __implements__ = interfaces.IUDPConnectedTransport def __init__(self, dispatcher, addr, proto): self.dispatcher = dispatcher self.addr = addr self.protocol = proto def getHost(self): return self.dispatcher.getHost() def getPeer(self): return ("INET",) + self.addr def write(self, packet): return self.dispatcher.transport.write(packet, self.addr) def loseConnection(self): self.protocol.stopProtocol() del self.protocol class Dispatcher(protocol.DatagramProtocol): # TODO: call startFactory()? def __init__(self, factory): self.handlers = {} factory.dispatcher = self self.factory = factory def __getitem__(self, addr): if addr not in self.handlers: return self.open_new(addr) return self.handlers[addr] def datagramReceived(self, data, addr): self[addr].datagramReceived(data) def getHost(self): return self.transport.getHost() def open_new(self, addr): assert addr not in self.handlers, "Already connected" p = self.factory.buildProtocol(addr) p.transport = DispatcherTransport(self, addr, p) p.startProtocol() self.handlers[addr] = p return p def startProtocol(self): return self.factory.startFactory() def stopProtocol(self): return self.factory.stopFactory() class ReliableDatagramProtocol(protocol.ConnectedDatagramProtocol): "acks and stuff" NUM_RETRANSMITS = 2 #10 RETRANSMIT_INTERVAL = .200 MAX_LAST_RECEIVED = 50 OP_SEND = 0 OP_ACK = 128 # msb set def startProtocol(self): self.retransmits = {} # crc->(data,num retransmits, bits, delayedcall for retransmit, Deferred when packet is acked) self.last_received = [] def stopProtocol(self, reason): print "protocol stopped",reason def send(self, data, bits=0): crc = binascii.crc32(data) d = defer.Deferred() self.retransmits[crc] = (data, self.NUM_RETRANSMITS, bits, reactor.callLater(self.RETRANSMIT_INTERVAL, self.retransmit, crc), d) self.send_packet(self.OP_SEND, bits, data) return d def retransmit(self, crc): t = self.retransmits[crc] self.send_packet(self.OP_SEND, t[2], t[0]) if t[1] > 0: self.retransmits[crc] = (t[0], t[1] - 1, t[2], reactor.callLater(self.RETRANSMIT_INTERVAL, self.retransmit, crc), t[4]) else: self.packetLost(retransmits[crc][0]) del self.retransmits[crc] def send_packet(self, op, bits, data): self.transport.write(struct.pack("! B", op | bits) + data) def send_ack(self, crc): if len(self.last_received) >= self.MAX_LAST_RECEIVED: del self.last_received[0] self.last_received.append(crc) self.transport.write(struct.pack("! Bi", self.OP_ACK, crc)) def got_ack(self, crc): self.retransmits[crc][3].cancel() d = self.retransmits[crc][4] del self.retransmits[crc] d.callback(crc) def datagramReceived(self, data): opbyte, = struct.unpack("! B", data[0]) op = opbyte & 128 data = data[1:] if op == self.OP_SEND: crc = binascii.crc32(data) if crc not in self.last_received: self.dataReceived(data, opbyte) self.send_ack(crc) else: self.got_ack(struct.unpack("! i", data)[0]) def dataReceived(self, data, bits): print "received",data,"from",self.transport.getPeer() def packetLost(self): self.transport.loseConnection() class ReliableDatagramStreamMessageProtocol(ReliableDatagramProtocol): "Sends large messages (> mtu size) and sends them in a buffered block..." MTU = 512 OP_BEGINMSG = 64 # 2nd msb set OP_DATA = 0 def startProtocol(self): ReliableDatagramProtocol.startProtocol(self) self.outmessagequeue = [] # data len, stream, bits self.inmessage = None self.packetcount = 0 self.numpackets = 0 def sendMessage(self, data, bits=0): self.outmessagequeue.append((len(data), StringIO.StringIO(data), bits)) if len(self.outmessagequeue) == 1: self.send_first_block() def send_first_block(self, dummy=""): length,stream,bits = self.outmessagequeue[0] length = length - self.MTU + 4 if length < 0: length = 0 length = length + 1 self.send(struct.pack("! I", length / self.MTU + length % self.MTU) + stream.read(self.MTU - 4), self.OP_BEGINMSG | bits).addCallback(self.send_next_block) def send_next_block(self, dummy=""): length,stream,bits = self.outmessagequeue[0] d = stream.read(self.MTU) if len(d) > 0: self.send(d, self.OP_DATA | bits).addCallback(self.send_next_block) else: stream.close() del self.outmessagequeue[0] if len(self.outmessagequeue) > 0: self.send_next_block() def dataReceived(self, data, bits): if bits & 64 == self.OP_DATA: self.packetcount = self.packetcount + 1 self.inmessage.write(data) else: self.inmessage = StringIO.StringIO() self.packetcount = 1 mtu = len(data) # the entire packet size is the size of the mtu self.numpackets = struct.unpack("! I", data[:4])[0] self.inmessage.write(data[4:]) if self.packetcount >= self.numpackets: self.messageReceived(self.inmessage.getvalue(), bits) self.inmessage = StringIO.StringIO() def messageReceived(self, message, bits): print "got message", message class DatagramRPCProtocol(ReliableDatagramStreamMessageProtocol): OP_CALL = 32 OP_RETURN = 0 MAX_CALLID = 512 def startProtocol(self): ReliableDatagramStreamMessageProtocol.startProtocol(self) if hasattr(self.factory, "buildRemote"): self.remotes = self.factory.buildRemote() self.calls = {} self.callid = 0 def messageReceived(self, message, bits): message = StringIO.StringIO(message) if bits & 32 == self.OP_CALL: t, objname, methodname, args, kwargs = cbob_decode(message) r = getattr(self.remotes[objname], methodname)(*args,**kwargs) #print "calling " + objname + "." + methodname if isinstance(r, defer.Deferred): r.addCallback(lambda result: self.send_result(t, result)) else: self.send_result(t, r) else: t,r = cbob_decode(message) self.calls[t].callback(r) def send_result(self, t, r): sio = StringIO.StringIO() cbob_encode((t, r), sio) self.sendMessage(sio.getvalue(), self.OP_RETURN) def callRemote(self, objname, methodname, *args, **kwargs): t = self.callid if self.callid == self.MAX_CALLID: self.callid = 0 else: self.callid = self.callid + 1 self.calls[t] = defer.Deferred() sio = StringIO.StringIO() cbob_encode((t, objname, methodname, args, kwargs), sio) self.sendMessage(sio.getvalue(), self.OP_CALL) return self.calls[t] #class LazyRMIProtocol(DatagramRPCProtocol): # raise "Todo: implement" class TestObject: def hello(self, name): return "Hello, " + name.first + " " + name.last class Name: first = "" last = "" def test(): reactor.callLater(0, test2) reactor.run() def test2(): f = protocol.ServerFactory() #f.protocol = ReliableDatagramProtocol #f.protocol = ReliableDatagramStreamMessageProtocol f.protocol = DatagramRPCProtocol f.buildRemote = lambda: {"myObj" : TestObject()} d = Dispatcher(f) d2 = Dispatcher(f) p = d[socket.gethostbyname("localhost"), 8889] p2 = d[socket.gethostbyname("localhost"), 8888] reactor.listenUDP(8888, d) reactor.listenUDP(8889, d2) reactor.callLater(0, test3, p, p2) def test3(p, p2): name = Name() name.first = "great" name.last = "world" p.callRemote("myObj", "hello", name).addCallback(test4) def test4(r): print "result of call", r if __name__ == "__main__": test() __________________________________________________________________ Switch to Netscape Internet Service. As low as $9.95 a month -- Sign up today at http://isp.netscape.com/register Netscape. Just the Net You Need. New! Netscape Toolbar for Internet Explorer Search from anywhere on the Web and block those annoying pop-ups. Download now at http://channels.netscape.com/ns/search/install.jsp From philippe.fx at swissinfo.org Mon Aug 16 10:28:33 2004 From: philippe.fx at swissinfo.org (Philippe Froidevaux) Date: Sat Dec 9 22:12:42 2006 Subject: [p2p-hackers] general questions Message-ID: <41208C51.6040702@swissinfo.org> Hi, I'm quite new in p2p's field and have a few questions. 1/ is there a p2p-hackers mailing-list's FAQ or Wiki ? 2/ in general, I'm searching infos about free (publicly available) DHT with automatic replications. All URLs are welcome :) 3/ FreePastry and Past : I read on this list that the FreePastry's documentation is really poor. What about Past ? Does anyone have simple apps that could be used as example or tutorial ? Is this list the right place to talk about FreePastry coding ? 4/ does anyone work on a Perl or Python implementation of Pastry or other DHT ? I found just one project (in python, http://www.bol.ucla.edu/~mgp/) but it doesn't seem to offer the full freepastry capabilities (like localisation) and doesn't implement Past. 5/ Why do most people use Pastry/Past and not JXTA ? The JXTA-2 seems to have DHT and replication (but I was unable to find a simple usage example), and seems to have been ported to Perl, Python, Rubby, etc. And it seems to be more mature and active. So, any reason ? Maybe JXTA is too complex ? Different goals and philosophy ? Thanks for your answers and sorry for the "newby" style. regards, Philippe. -- Meilleures salutations / Mit freundlichen Gruessen / Kind regards =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Philippe Froidevaux Philippe.Froidevaux@unifr.ch D?partement d'Informatique Systems Manager Rue de Faucigny 2 tel: +41 (0)26 300 83 42 CH-1700 Fribourg fax: +41 (0)26 300 96 42 http://diuf.unifr.ch/techsupport/ From em at em.no-ip.com Tue Aug 17 00:07:19 2004 From: em at em.no-ip.com (Enzo Michelangeli) Date: Sat Dec 9 22:12:42 2006 Subject: [p2p-hackers] general questions References: <41208C51.6040702@swissinfo.org> Message-ID: <004c01c483ef$82e0a7c0$0200a8c0@em.noip.com> ----- Original Message ----- From: "Philippe Froidevaux" To: Sent: Monday, August 16, 2004 6:28 PM Subject: [p2p-hackers] general questions > Hi, > > I'm quite new in p2p's field and have a few questions. > > 1/ is there a p2p-hackers mailing-list's FAQ or Wiki ? Not that I'm aware of, but I have found http://www.infoanarchy.org/wiki/wiki.pl?IA_Wiki to be a useful resource. > 2/ in general, I'm searching infos about free (publicly available) DHT > with automatic replications. All URLs are welcome :) Here you may find many links: http://www.etse.urv.es/~cpairot/dhts.html http://www.infoanarchy.org/wiki/wiki.pl?Distributed_Hash_Table Enzo From mfreed at cs.nyu.edu Thu Aug 26 17:53:55 2004 From: mfreed at cs.nyu.edu (Michael J. Freedman) Date: Sat Dec 9 22:12:42 2006 Subject: [p2p-hackers] CoralCDN available for beta consumption Message-ID: We'd like to publicly announce the availability of CoralCDN, an open peer-to-peer content distribution network, beta-deployed on PlanetLab since March 2004: http://www.scs.cs.nyu.edu/coral/ To take advantage of CoralCDN, a content publisher, user, or some third party posting to a high-traffic portal, simply appends .nyud.net:8090 to the hostname in a URL. For example: http://news.google.com/ --> http://news.google.com.nyud.net:8090/ Through DNS redirection, oblivious clients with unmodified web browsers are transparently redirected to nearby Coral web caches. These caches cooperate to transfer data from nearby peers whenever possible, minimizing the load on the origin web server and possibly reducing client latency. In fact, such servers should see near to a single request per web object to initialize the cooperative cache. CoralCDN is comprised of a completely decentralized and self- organizing network of web proxies and DNS redirectors, and is built on top of a novel key/value DHT-like indexing infrastructure called Coral. Two properties make Coral ideal for CDNs. First, Coral allows nodes to locate nearby cached copies of web objects without querying more distant nodes, by creating self-organizing clusters of nodes through network mapping. Second, Coral prevents hot spots in the infrastructure, even under degenerate loads, using load-balancing and rate-limiting techniques. For more technical details, see our NSDI 04 paper at: http://www.scs.cs.nyu.edu/coral/pubs/ For real-time maps and statistics of deployment, see: http://www.scs.cs.nyu.edu/coral/maps/ http://www.scs.cs.nyu.edu/coral/stats/ While Coral is primarily meant as a server-driven solution (or at least one interfacing with oblivious clients), we also provide some simple plugins for Mozilla/Firefox for demonstrative purposes. http://www.scs.cs.nyu.edu/coral/download/plugins.html Please don't hesitate with any questions, comments, bug reports, etc. Thanks, --mike ----- "Not all those who wander are lost." www.michaelfreedman.org