By Topic

37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07)

Date 25-28 June 2007

Filter Results

Displaying Results 1 - 25 of 107
  • 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (305 KB)
    Freely Available from IEEE
  • 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks-Title

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (178 KB)
    Freely Available from IEEE
  • 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks-Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - TOC

    Publication Year: 2007, Page(s):v - xiii
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Message from the Conference General Chair and Coordinator

    Publication Year: 2007, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (51 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the DCCS Track Program Chair

    Publication Year: 2007
    Request permission for commercial reuse | PDF file iconPDF (65 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the PDS Track Program Chair

    Publication Year: 2007, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (96 KB) | HTML iconHTML
    Freely Available from IEEE
  • William C. Carter Award

    Publication Year: 2007, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (58 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organizers

    Publication Year: 2007, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • DSN Steering Committee

    Publication Year: 2007, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • DCCS Program Committee

    Publication Year: 2007, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Reviewers for DCCS

    Publication Year: 2007, Page(s):xxi - xxiii
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • PDS Program Committee

    Publication Year: 2007, Page(s): xxiv
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • Reviewers for PDS

    Publication Year: 2007, Page(s): xxv
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • Science and Engineering: A Collusion of Cultures

    Publication Year: 2007, Page(s):2 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB) | HTML iconHTML

    The cultures of science and engineering are diametrically opposed along a number of dimensions: long-term/short-term, idealism/compromise, formality/ intuition, certainty/risk management, perfection/ adequacy, originality/familiarity, generality/specificity, unification/diversity, separation/amalgamation of concerns. You would expect two such radically different cultures to collide. Yet all the te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Augmenting Branch Predictor to Secure Program Execution

    Publication Year: 2007, Page(s):10 - 19
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (377 KB) | HTML iconHTML

    Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from what the programmer/user intends to do. Program execution blindly follows the execution path specified by control flow transfer instructions with the targets generated at run-time without any validation. An enhancement is t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Firewall for Routers: Protecting against Routing Misbehavior

    Publication Year: 2007, Page(s):20 - 29
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (238 KB) | HTML iconHTML

    In this work, we present the novel idea of route normalization by correcting on the fly routing traffic on behalf of a local router to protect the local network from malicious and misconfigured routing updates. Analogous to traffic normalization for network intrusion detection systems, the proposed RouteNormalizer patches ambiguities and eliminates semantically incorrect routing updates to protect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Architectural Approach to Preventing Code Injection Attacks

    Publication Year: 2007, Page(s):30 - 40
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    Code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the NX-bit and PaX have been useful in limiting the attacks, however they enforce program layout restrictions and can often times still be circumvented by a determined attacker. We propose a change to the memory architecture of modern processors that addresses the code inje... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Failure Resilience for Device Drivers

    Publication Year: 2007, Page(s):41 - 50
    Cited by:  Papers (32)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (157 KB) | HTML iconHTML

    Studies have shown that device drivers and extensions contain 3-7 times more bugs than other operating system code and thus are more likely to fail. Therefore, we present a failure-resilient operating system design that can recover from dead drivers and other critical components - primarily through monitoring and replacing malfunctioning components on the fly - transparent to applications and with... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault Tolerance Connectors for Unreliable Web Services

    Publication Year: 2007, Page(s):51 - 60
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1262 KB) | HTML iconHTML

    Web Services are commonly used to implement service oriented architectures/applications. Service-oriented applications are large-scale distributed applications, typically highly dynamic, by definition loosely coupled and often unstable due to the unreliability of Web Services, which can be moved, deleted, and are subject to various sources of failures. In this paper, we propose customizable fault-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robustness and Security Hardening of COTS Software Libraries

    Publication Year: 2007, Page(s):61 - 71
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    COTS components, like software libraries, can be used to reduce the development effort. Unfortunately, many COTS components have been developed without a focus on robust- ness and security. We propose a novel approach to harden software libraries to improve their robustness and security. Our approach is automated, general and extensible and consists of the following stages. First, we use a static ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Verification and Discovery of Byzantine Consensus Protocols

    Publication Year: 2007, Page(s):72 - 81
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    Model-checking of asynchronous distributed protocols is challenging because of the large size of the state and solution spaces. This paper tackles this problem in the context of low-latency Byzantine Consensus protocols. It reduces the state space by focusing on the latency-determining first round only, ignoring the order of messages in this round, and distinguishing between state-modifying action... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge Connectivity vs. Synchrony Requirements for Fault-Tolerant Agreement in Unknown Networks

    Publication Year: 2007, Page(s):82 - 91
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    In self-organizing systems, such as mobile ad-hoc and peer-to-peer networks, consensus is a fundamental building block to solve agreement problems. It contributes to coordinate actions of nodes distributed in an ad-hoc manner in order to take consistent decisions. It is well known that in classical environments, in which entities behave asynchronously and where identities are known, consensus cann... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Communication Predicates: A High-Level Abstraction for Coping with Transient and Dynamic Faults

    Publication Year: 2007, Page(s):92 - 101
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    Consensus is one of the key problems in fault tolerant distributed computing. A very popular model for solving consensus is the failure detector model defined by Chandra and Toueg. However, the failure detector model has limitations. The paper points out these limitations, and suggests instead a model based on communication predicates, called HO model. The advantage of the HO model over failure de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Synchronous Consensus with Mortal Byzantines

    Publication Year: 2007, Page(s):102 - 112
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    We consider the problem of reaching agreement in synchronous systems under a fault model whose severity lies between Byzantine and crash faults. For these "mortal" Byzantine faults, we assume that faulty processes take a finite number of arbitrary steps before they eventually crash. After discussing several application examples where this model is justified, we present and prove correct a consensu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.