By Topic

IEEE Transactions on Dependable and Secure Computing

Issue 3 • Date July-Sept. 2010

Filter Results

Displaying Results 1 - 14 of 14
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2010, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • Editorial

    Publication Year: 2010, Page(s): 225
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Differential Power Analysis Attacks to Precharged Buses: A General Analysis for Symmetric-Key Cryptographic Algorithms

    Publication Year: 2010, Page(s):226 - 239
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2592 KB) | HTML iconHTML Multimedia Media

    In this paper, a general model of multibit Differential Power Analysis (DPA) attacks to precharged buses is discussed, with emphasis on symmetric-key cryptographic algorithms. Analysis provides a deeper insight into the dependence of the DPA effectiveness (i.e., the vulnerability of cryptographic chips) on the parameters that define the attack, the algorithm, and the processor architecture in whic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Effects of Process Variation in Network-on-Chip Architectures

    Publication Year: 2010, Page(s):240 - 254
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3746 KB) | HTML iconHTML

    The advent of diminutive technology feature sizes has led to escalating transistor densities. Burgeoning transistor counts are casting a dark shadow on modern chip design: global interconnect delays are dominating gate delays and affecting overall system performance. Networks-on-Chip (NoC) are viewed as a viable solution to this problem because of their scalability and optimized electrical propert... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the General Applicability of Instruction-Set Randomization

    Publication Year: 2010, Page(s):255 - 270
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (813 KB) | HTML iconHTML

    We describe Instruction-Set Randomization (ISR), a general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoffs' principle to create OS process-specific randomized instruction sets (e.g., machine instructions) of the system executing potentially vulnerable software. An attacker who does not know the key to the randomization algorithm will inject code tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Quality of Service of Crash-Recovery Failure Detectors

    Publication Year: 2010, Page(s):271 - 283
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1756 KB) | HTML iconHTML Multimedia Media

    We model the probabilistic behavior of a system comprising a failure detector and a monitored crash-recovery target. We extend failure detectors to take account of failure recovery in the target system. This involves extending QoS measures to include the recovery detection speed and proportion of failures detected. We also extend estimating the parameters of the failure detector to achieve a requi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures

    Publication Year: 2010, Page(s):284 - 299
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1920 KB) | HTML iconHTML

    Network survivability is the ability of a network to stay connected under failures and attacks, which is a fundamental issue to the design and performance evaluation of wireless ad hoc networks. In this paper, we focus on the analysis of network survivability in the presence of node misbehaviors and failures. First, we propose a novel semi-Markov process model to characterize the evolution of node... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Role Engineering via Prioritized Subset Enumeration

    Publication Year: 2010, Page(s):300 - 314
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3749 KB) | HTML iconHTML

    Today, role-based access control (RBAC) has become a well-accepted paradigm for implementing access control because of its convenience and ease of administration. However, in order to realize the full benefits of the RBAC paradigm, one must first define the roles accurately. This task of defining roles and associating permissions with them, also known as role engineering, is typically accomplished... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wavelet Codes for Algorithm-Based Fault Tolerance Applications

    Publication Year: 2010, Page(s):315 - 328
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4123 KB) | HTML iconHTML

    Algorithm-based fault tolerance (ABFT) methods, which use real number parity values computed in two separate comparable ways to detect computer-induced errors in numerical processing operations, can employ wavelet codes for establishing the necessary redundancy. Wavelet codes, one form of real number convolutional codes, determine the required parity values in a continuous fashion and can be inter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cluster-Based Key Predistribution Using Deployment Knowledge

    Publication Year: 2010, Page(s):329 - 335
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2118 KB) | HTML iconHTML Multimedia Media

    We present a novel key predistribution scheme that uses deployment knowledge to divide deployment regions into overlapping clusters, each of which has its own distinct key space. Through careful construction of these clusters, network resilience is improved, without compromising connectivity or communications overhead. Experimental results show significant improvement in performance over existing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for Papers for Special Issue on Learning, Games and Security

    Publication Year: 2010, Page(s): 336
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • TDSC Information for authors

    Publication Year: 2010, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2010, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University