2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)最新文献

筛选
英文 中文
A concept of a trust management architecture to increase the robustness of nano age devices 信任管理架构的概念,以增加纳米时代设备的健壮性
2010 International Conference on Dependable Systems and Networks Workshops (DSN-W) Pub Date : 2010-06-28 DOI: 10.1109/DSNW.2010.5542604
Thilo Pionteck, W. Brockmann
{"title":"A concept of a trust management architecture to increase the robustness of nano age devices","authors":"Thilo Pionteck, W. Brockmann","doi":"10.1109/DSNW.2010.5542604","DOIUrl":"https://doi.org/10.1109/DSNW.2010.5542604","url":null,"abstract":"Future nano age devices will face a dramatic increase of soft and hard errors, degradation and process variability. Addressing these problems with worst-case design techniques will lead to a suboptimal performance and will introduce a huge overhead and an unacceptable low yield. A solution to this problem is to adapt the system parameters at runtime to current external requirements on performance and reliability as well as on current device dependent parameters such as error rates and chip temperature. But due to noise and time-variant system properties, measured chip properties may not represent the real system state. For the same reasons, control parameters of thermal and load management may not always show the same physical effects. To avoid worst-case design further, it is our approach for a trustworthy operation to explicitly model the vagueness, ambiguities and uncertainties of sensor values and actor settings. The concept of a respective methodological framework for such a trust management is motivated and presented in this paper. Its main features are to model the uncertainties of sensor readings and actors explicitly by dynamic trust level attributes. These parameters are exploited by the internal control of the device operation, e.g. for load and thermal management. In this way, robustness and performance are increased without sacrificing the lifetime of the device.","PeriodicalId":124206,"journal":{"name":"2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130557864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing the attack resilience capabilities of a fortified primary-backup system 评估强化主备份系统的攻击恢复能力
2010 International Conference on Dependable Systems and Networks Workshops (DSN-W) Pub Date : 2010-06-28 DOI: 10.1109/DSNW.2010.5542596
D. Clarke, P. Ezhilchelvan
{"title":"Assessing the attack resilience capabilities of a fortified primary-backup system","authors":"D. Clarke, P. Ezhilchelvan","doi":"10.1109/DSNW.2010.5542596","DOIUrl":"https://doi.org/10.1109/DSNW.2010.5542596","url":null,"abstract":"Primary-Backup service replication does not constrain that the service be built as a deterministic state machine. It is meant to tolerate crashes, not intrusions. We consider an approach, called FORTRESS, for adding intrusion-resilience capability to a primary-backup server system. It involves using proxies that block clients from directly accessing servers, and periodically randomizing the executables of proxies and servers. We argue that proxies and proactive randomization can offer sound defense against attacks including de-randomization attacks. Using simulations, we then compare the attack resilience that FORTRESS adds to a primary-backup server system with that attainable through state machine replication (SMR) that is fit only for deterministic services. A significant observation is that FORTRESS emerges to be more resilient than an SMR system of four server replicas that are diversely randomized at the start and are subject to proactive recovery throughout.","PeriodicalId":124206,"journal":{"name":"2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131541439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Realizing S-Reliability for services via recovery-driven intrusion tolerance mechanism 通过恢复驱动的入侵容忍机制实现服务的s可靠性
2010 International Conference on Dependable Systems and Networks Workshops (DSN-W) Pub Date : 2010-06-28 DOI: 10.1109/DSNW.2010.5542599
Q. Nguyen, A. Sood
{"title":"Realizing S-Reliability for services via recovery-driven intrusion tolerance mechanism","authors":"Q. Nguyen, A. Sood","doi":"10.1109/DSNW.2010.5542599","DOIUrl":"https://doi.org/10.1109/DSNW.2010.5542599","url":null,"abstract":"Service-Oriented Architecture (SOA) paradigm facilitates the design of large systems as a set of loosely coupled services interacting with each other. These services, in turn, can be combined to form a more complex service. But, for services to be useful, they must satisfy non-functional requirements, especially security-related quality of service. Unfortunately, software vulnerabilities expose these services to malicious actors, and make them susceptible to attacks. Therefore, security quality of service is critical in order to ensure confidentiality, integrity, and availability for system data and services. Due to the distributed and decentralized nature of services, publishing and guaranteeing security quality of service are crucial so that potential applications and clients can make use of the provided services. In this paper, we will first discuss how Intrusion Tolerance Quality of Service (IT-QoS) can be modeled and specified. Then, we will show how a recovery-driven intrusion tolerance architecture is able to ensure differentiated levels of S-Reliability, an important IT-QoS for a Service.","PeriodicalId":124206,"journal":{"name":"2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128222697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Aspect oriented software fault tolerance and analytically redundant design framework 面向方面的软件容错与分析冗余设计框架
2010 International Conference on Dependable Systems and Networks Workshops (DSN-W) Pub Date : 2010-06-28 DOI: 10.1109/DSNW.2010.5542623
Kashif Hameed, Rob Williams, Jimmie S. Smith
{"title":"Aspect oriented software fault tolerance and analytically redundant design framework","authors":"Kashif Hameed, Rob Williams, Jimmie S. Smith","doi":"10.1109/DSNW.2010.5542623","DOIUrl":"https://doi.org/10.1109/DSNW.2010.5542623","url":null,"abstract":"Diversity or redundancy based software fault tolerance does not come for free; rather it introduces additional complexity to the core functionality in the form of redundancy development, management and controlled execution. This results in tangling of core functionality with the fault tolerance concerns. This paper presents a novel design framework using static and dynamic advice provided by aspect oriented programming. The proposed strategy introduces, manage and exercise different fault tolerance strategies such that modularization is achieved by separation of these concerns from core functionality. A Mathematical Model of an Inverted Pendulum Control System has been used as a case study to demonstrate the effectiveness of the proposed design framework.","PeriodicalId":124206,"journal":{"name":"2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131148005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A security evaluation of a novel resilient web serving architecture: Lessons learned through industry/academia collaboration 一种新型弹性web服务架构的安全评估:通过产业界/学术界合作获得的经验教训
2010 International Conference on Dependable Systems and Networks Workshops (DSN-W) Pub Date : 2010-06-28 DOI: 10.1109/DSNW.2010.5542597
Y. Huang, Anup K. Ghosh, Tom Bracewell, Brian Mastropietro
{"title":"A security evaluation of a novel resilient web serving architecture: Lessons learned through industry/academia collaboration","authors":"Y. Huang, Anup K. Ghosh, Tom Bracewell, Brian Mastropietro","doi":"10.1109/DSNW.2010.5542597","DOIUrl":"https://doi.org/10.1109/DSNW.2010.5542597","url":null,"abstract":"We have previously developed a virtualization-based web serving architecture and a prototype to enhance web service resilience under cyber attack. The proposed system utilizes replicated virtual servers managed by a closed-loop feedback controller without humans in the loop. We have replicated the prototype at the Raytheon Company, which conducted a thorough penetration test and security examination. In this paper, we present the Resilient Web Service (RWS) and describe its security evaluation by Raytheon of a prototype implementation. We then present new research directions that address previous weaknesses and discuss the ongoing efforts of designing the next generation RWS architecture.","PeriodicalId":124206,"journal":{"name":"2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117203972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Implementation of self-healing asynchronous circuits at the example of a video-processing algorithm 实现自愈异步电路中的一个视频处理算法的例子
2010 International Conference on Dependable Systems and Networks Workshops (DSN-W) Pub Date : 2010-06-28 DOI: 10.1109/DSNW.2010.5542609
T. Panhofer, W. Friesenbichler, A. Steininger
{"title":"Implementation of self-healing asynchronous circuits at the example of a video-processing algorithm","authors":"T. Panhofer, W. Friesenbichler, A. Steininger","doi":"10.1109/DSNW.2010.5542609","DOIUrl":"https://doi.org/10.1109/DSNW.2010.5542609","url":null,"abstract":"This paper presents a self-healing, asynchronous implementation of a small part of the hardware pre-processing to be used in the video processing unit of GAIA, a scientific mission of the European Space Agency (ESA). With the applied concept the circuit is able to detect permanent faults during runtime and to recover from them by an autonomous reconfiguration. The work describes how to transform a standard FSL circuit into a self-healing FSL design and presents first results of hardware experiments.","PeriodicalId":124206,"journal":{"name":"2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131477526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of a Markov decision process model for intrusion tolerance 入侵容忍的马尔可夫决策过程模型分析
2010 International Conference on Dependable Systems and Networks Workshops (DSN-W) Pub Date : 2010-06-28 DOI: 10.1109/DSNW.2010.5542603
O. P. Kreidl
{"title":"Analysis of a Markov decision process model for intrusion tolerance","authors":"O. P. Kreidl","doi":"10.1109/DSNW.2010.5542603","DOIUrl":"https://doi.org/10.1109/DSNW.2010.5542603","url":null,"abstract":"We consider a simplest Markov decision process model for intrusion tolerance, assuming that (i) each attack proceeds through one or more steps before the system's security fails and (ii) defensive responses targeting these intermediate steps may only sometimes thwart the attack. Our analysis shows that, even in the ideal case of perfect detectors, it can be sub-optimal in the long run to employ defensive responses while under attack; that is, depending on attack dynamics and response effectiveness, the total overhead of ongoing defensive countermeasures can exceed the total risk of intermittent security failures. Simulation experiments reveal that a tradeoff between these two types of costs persists in the realistic case of imperfect detectors. These experiments also shed light on (i) the extent to which increasing sensor uncertainty monotonically degrades achievable performance and (ii) the loss from optimum performance of two popular rule-based policies for response selection.","PeriodicalId":124206,"journal":{"name":"2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128991455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
On rootkit and malware detection in smartphones 关于智能手机中的rootkit和恶意软件检测
2010 International Conference on Dependable Systems and Networks Workshops (DSN-W) Pub Date : 2010-06-28 DOI: 10.1109/DSNW.2010.5542600
Bryan Dixon, Shivakant Mishra
{"title":"On rootkit and malware detection in smartphones","authors":"Bryan Dixon, Shivakant Mishra","doi":"10.1109/DSNW.2010.5542600","DOIUrl":"https://doi.org/10.1109/DSNW.2010.5542600","url":null,"abstract":"Dramatic increase in smartphone sales and third-party applications that users can download has significantly increased the possibility of rootkits and malware targeted for smartphones. This paper discusses the current state of research in detection and mitigation of propagation of malicious code, such as viruses, malware and even rootkits in smartphones. A new strategy is introduced that offers a solution to efficiently detect the presence of rootkits and mal-ware in smartphones. A preliminary prototype based on this strategy has been built for the android dev phone. The paper discusses the design, implementation and preliminary performance of this prototype.","PeriodicalId":124206,"journal":{"name":"2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133776453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Towards understanding the effects of intermittent hardware faults on programs 了解间歇性硬件故障对程序的影响
2010 International Conference on Dependable Systems and Networks Workshops (DSN-W) Pub Date : 2010-06-28 DOI: 10.1109/DSNW.2010.5542613
L. Rashid, K. Pattabiraman, S. Gopalakrishnan
{"title":"Towards understanding the effects of intermittent hardware faults on programs","authors":"L. Rashid, K. Pattabiraman, S. Gopalakrishnan","doi":"10.1109/DSNW.2010.5542613","DOIUrl":"https://doi.org/10.1109/DSNW.2010.5542613","url":null,"abstract":"Intermittent hardware faults are bursts of errors that last from a few CPU cycles to a few seconds. They are caused by process variations, circuit wear-out, and temperature, clock or voltage fluctuations. Recent studies show that intermittent fault rates are increasing due to technology scaling and are likely to be a significant concern in future systems. We study the propagation of intermittent faults to programs; in particular, we are interested in the crash behaviour of programs. We use a model of a program that represents the data dependencies in a fault-free trace of the program and we analyze this model to glean some information about the length of intermittent faults and their effect on the program under specific fault and crash models. The results of our study can aid fault detection, diagnosis and recovery techniques.","PeriodicalId":124206,"journal":{"name":"2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131158658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Towards self-timed logic in the Time-Triggered Protocol 时间触发协议中的自定时逻辑
2010 International Conference on Dependable Systems and Networks Workshops (DSN-W) Pub Date : 2010-06-28 DOI: 10.1109/DSNW.2010.5542607
M. Ferringer
{"title":"Towards self-timed logic in the Time-Triggered Protocol","authors":"M. Ferringer","doi":"10.1109/DSNW.2010.5542607","DOIUrl":"https://doi.org/10.1109/DSNW.2010.5542607","url":null,"abstract":"While asynchronous logic has many potential advantages compared to traditional synchronous designs, one of the major drawbacks is its unpredictability with respect to temporal behavior. Without having a high-precision oscillator, a self-timed circuit's execution speed is heavily dependent on temperature and supply voltage. Small fluctuations of these parameters already result in noticeable changes of the design's throughput and performance. This indeterminism or jitter makes the use of asynchronous logic hardly feasible for real-time applications. In this work, we make first steps towards an asynchronous TTP (Time-Triggered Protocol) controller. We will present circuits which use the deterministic data-bus of TTP in order to derive a suitable time-base for message reception and transmission. Speed fluctuations due to changing operating conditions will be compensated automatically by our design, thus increasing robustness and precision. In preparation for the envisioned asynchronous TTP controller, we will integrate the proposed circuits into a (self-timed) message transceiver unit and investigate its precision and dynamics under changing operating conditions.","PeriodicalId":124206,"journal":{"name":"2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"11 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116664981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信