{"title":"A concept of a trust management architecture to increase the robustness of nano age devices","authors":"Thilo Pionteck, W. Brockmann","doi":"10.1109/DSNW.2010.5542604","DOIUrl":"https://doi.org/10.1109/DSNW.2010.5542604","url":null,"abstract":"Future nano age devices will face a dramatic increase of soft and hard errors, degradation and process variability. Addressing these problems with worst-case design techniques will lead to a suboptimal performance and will introduce a huge overhead and an unacceptable low yield. A solution to this problem is to adapt the system parameters at runtime to current external requirements on performance and reliability as well as on current device dependent parameters such as error rates and chip temperature. But due to noise and time-variant system properties, measured chip properties may not represent the real system state. For the same reasons, control parameters of thermal and load management may not always show the same physical effects. To avoid worst-case design further, it is our approach for a trustworthy operation to explicitly model the vagueness, ambiguities and uncertainties of sensor values and actor settings. The concept of a respective methodological framework for such a trust management is motivated and presented in this paper. Its main features are to model the uncertainties of sensor readings and actors explicitly by dynamic trust level attributes. These parameters are exploited by the internal control of the device operation, e.g. for load and thermal management. In this way, robustness and performance are increased without sacrificing the lifetime of the device.","PeriodicalId":124206,"journal":{"name":"2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130557864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing the attack resilience capabilities of a fortified primary-backup system","authors":"D. Clarke, P. Ezhilchelvan","doi":"10.1109/DSNW.2010.5542596","DOIUrl":"https://doi.org/10.1109/DSNW.2010.5542596","url":null,"abstract":"Primary-Backup service replication does not constrain that the service be built as a deterministic state machine. It is meant to tolerate crashes, not intrusions. We consider an approach, called FORTRESS, for adding intrusion-resilience capability to a primary-backup server system. It involves using proxies that block clients from directly accessing servers, and periodically randomizing the executables of proxies and servers. We argue that proxies and proactive randomization can offer sound defense against attacks including de-randomization attacks. Using simulations, we then compare the attack resilience that FORTRESS adds to a primary-backup server system with that attainable through state machine replication (SMR) that is fit only for deterministic services. A significant observation is that FORTRESS emerges to be more resilient than an SMR system of four server replicas that are diversely randomized at the start and are subject to proactive recovery throughout.","PeriodicalId":124206,"journal":{"name":"2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131541439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Realizing S-Reliability for services via recovery-driven intrusion tolerance mechanism","authors":"Q. Nguyen, A. Sood","doi":"10.1109/DSNW.2010.5542599","DOIUrl":"https://doi.org/10.1109/DSNW.2010.5542599","url":null,"abstract":"Service-Oriented Architecture (SOA) paradigm facilitates the design of large systems as a set of loosely coupled services interacting with each other. These services, in turn, can be combined to form a more complex service. But, for services to be useful, they must satisfy non-functional requirements, especially security-related quality of service. Unfortunately, software vulnerabilities expose these services to malicious actors, and make them susceptible to attacks. Therefore, security quality of service is critical in order to ensure confidentiality, integrity, and availability for system data and services. Due to the distributed and decentralized nature of services, publishing and guaranteeing security quality of service are crucial so that potential applications and clients can make use of the provided services. In this paper, we will first discuss how Intrusion Tolerance Quality of Service (IT-QoS) can be modeled and specified. Then, we will show how a recovery-driven intrusion tolerance architecture is able to ensure differentiated levels of S-Reliability, an important IT-QoS for a Service.","PeriodicalId":124206,"journal":{"name":"2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128222697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aspect oriented software fault tolerance and analytically redundant design framework","authors":"Kashif Hameed, Rob Williams, Jimmie S. Smith","doi":"10.1109/DSNW.2010.5542623","DOIUrl":"https://doi.org/10.1109/DSNW.2010.5542623","url":null,"abstract":"Diversity or redundancy based software fault tolerance does not come for free; rather it introduces additional complexity to the core functionality in the form of redundancy development, management and controlled execution. This results in tangling of core functionality with the fault tolerance concerns. This paper presents a novel design framework using static and dynamic advice provided by aspect oriented programming. The proposed strategy introduces, manage and exercise different fault tolerance strategies such that modularization is achieved by separation of these concerns from core functionality. A Mathematical Model of an Inverted Pendulum Control System has been used as a case study to demonstrate the effectiveness of the proposed design framework.","PeriodicalId":124206,"journal":{"name":"2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131148005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Huang, Anup K. Ghosh, Tom Bracewell, Brian Mastropietro
{"title":"A security evaluation of a novel resilient web serving architecture: Lessons learned through industry/academia collaboration","authors":"Y. Huang, Anup K. Ghosh, Tom Bracewell, Brian Mastropietro","doi":"10.1109/DSNW.2010.5542597","DOIUrl":"https://doi.org/10.1109/DSNW.2010.5542597","url":null,"abstract":"We have previously developed a virtualization-based web serving architecture and a prototype to enhance web service resilience under cyber attack. The proposed system utilizes replicated virtual servers managed by a closed-loop feedback controller without humans in the loop. We have replicated the prototype at the Raytheon Company, which conducted a thorough penetration test and security examination. In this paper, we present the Resilient Web Service (RWS) and describe its security evaluation by Raytheon of a prototype implementation. We then present new research directions that address previous weaknesses and discuss the ongoing efforts of designing the next generation RWS architecture.","PeriodicalId":124206,"journal":{"name":"2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117203972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of self-healing asynchronous circuits at the example of a video-processing algorithm","authors":"T. Panhofer, W. Friesenbichler, A. Steininger","doi":"10.1109/DSNW.2010.5542609","DOIUrl":"https://doi.org/10.1109/DSNW.2010.5542609","url":null,"abstract":"This paper presents a self-healing, asynchronous implementation of a small part of the hardware pre-processing to be used in the video processing unit of GAIA, a scientific mission of the European Space Agency (ESA). With the applied concept the circuit is able to detect permanent faults during runtime and to recover from them by an autonomous reconfiguration. The work describes how to transform a standard FSL circuit into a self-healing FSL design and presents first results of hardware experiments.","PeriodicalId":124206,"journal":{"name":"2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131477526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of a Markov decision process model for intrusion tolerance","authors":"O. P. Kreidl","doi":"10.1109/DSNW.2010.5542603","DOIUrl":"https://doi.org/10.1109/DSNW.2010.5542603","url":null,"abstract":"We consider a simplest Markov decision process model for intrusion tolerance, assuming that (i) each attack proceeds through one or more steps before the system's security fails and (ii) defensive responses targeting these intermediate steps may only sometimes thwart the attack. Our analysis shows that, even in the ideal case of perfect detectors, it can be sub-optimal in the long run to employ defensive responses while under attack; that is, depending on attack dynamics and response effectiveness, the total overhead of ongoing defensive countermeasures can exceed the total risk of intermittent security failures. Simulation experiments reveal that a tradeoff between these two types of costs persists in the realistic case of imperfect detectors. These experiments also shed light on (i) the extent to which increasing sensor uncertainty monotonically degrades achievable performance and (ii) the loss from optimum performance of two popular rule-based policies for response selection.","PeriodicalId":124206,"journal":{"name":"2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128991455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On rootkit and malware detection in smartphones","authors":"Bryan Dixon, Shivakant Mishra","doi":"10.1109/DSNW.2010.5542600","DOIUrl":"https://doi.org/10.1109/DSNW.2010.5542600","url":null,"abstract":"Dramatic increase in smartphone sales and third-party applications that users can download has significantly increased the possibility of rootkits and malware targeted for smartphones. This paper discusses the current state of research in detection and mitigation of propagation of malicious code, such as viruses, malware and even rootkits in smartphones. A new strategy is introduced that offers a solution to efficiently detect the presence of rootkits and mal-ware in smartphones. A preliminary prototype based on this strategy has been built for the android dev phone. The paper discusses the design, implementation and preliminary performance of this prototype.","PeriodicalId":124206,"journal":{"name":"2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133776453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards understanding the effects of intermittent hardware faults on programs","authors":"L. Rashid, K. Pattabiraman, S. Gopalakrishnan","doi":"10.1109/DSNW.2010.5542613","DOIUrl":"https://doi.org/10.1109/DSNW.2010.5542613","url":null,"abstract":"Intermittent hardware faults are bursts of errors that last from a few CPU cycles to a few seconds. They are caused by process variations, circuit wear-out, and temperature, clock or voltage fluctuations. Recent studies show that intermittent fault rates are increasing due to technology scaling and are likely to be a significant concern in future systems. We study the propagation of intermittent faults to programs; in particular, we are interested in the crash behaviour of programs. We use a model of a program that represents the data dependencies in a fault-free trace of the program and we analyze this model to glean some information about the length of intermittent faults and their effect on the program under specific fault and crash models. The results of our study can aid fault detection, diagnosis and recovery techniques.","PeriodicalId":124206,"journal":{"name":"2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131158658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards self-timed logic in the Time-Triggered Protocol","authors":"M. Ferringer","doi":"10.1109/DSNW.2010.5542607","DOIUrl":"https://doi.org/10.1109/DSNW.2010.5542607","url":null,"abstract":"While asynchronous logic has many potential advantages compared to traditional synchronous designs, one of the major drawbacks is its unpredictability with respect to temporal behavior. Without having a high-precision oscillator, a self-timed circuit's execution speed is heavily dependent on temperature and supply voltage. Small fluctuations of these parameters already result in noticeable changes of the design's throughput and performance. This indeterminism or jitter makes the use of asynchronous logic hardly feasible for real-time applications. In this work, we make first steps towards an asynchronous TTP (Time-Triggered Protocol) controller. We will present circuits which use the deterministic data-bus of TTP in order to derive a suitable time-base for message reception and transmission. Speed fluctuations due to changing operating conditions will be compensated automatically by our design, thus increasing robustness and precision. In preparation for the envisioned asynchronous TTP controller, we will integrate the proposed circuits into a (self-timed) message transceiver unit and investigate its precision and dynamics under changing operating conditions.","PeriodicalId":124206,"journal":{"name":"2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"11 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116664981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}