By Topic

IEEE Transactions on Dependable and Secure Computing

Issue 4 • Date Oct.-Dec. 2010

Filter Results

Displaying Results 1 - 15 of 15
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2010, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • A Large-Scale Study of Failures in High-Performance Computing Systems

    Publication Year: 2010, Page(s):337 - 350
    Cited by:  Papers (61)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3708 KB) | HTML iconHTML

    Designing highly dependable systems requires a good understanding of failure characteristics. Unfortunately, little raw data on failures in large IT installations are publicly available. This paper analyzes failure data collected at two large high-performance computing sites. The first data set has been collected over the past nine years at Los Alamos National Laboratory (LANL) and has recently be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Architectural Approach to Preventing Code Injection Attacks

    Publication Year: 2010, Page(s):351 - 365
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3637 KB) | HTML iconHTML

    Code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the execute-disable bit and PaX have been useful in limiting the attacks; however, they enforce program layout restrictions and can oftentimes still be circumvented by a determined attacker. We propose a change to the memory architecture of modern processors that addresses ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing Dependable Storage Solutions for Shared Application Environments

    Publication Year: 2010, Page(s):366 - 380
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3393 KB) | HTML iconHTML

    The costs of data loss and unavailability can be large, so businesses use many data protection techniques such as remote mirroring, snapshots, and backups to guard against failures. Choosing an appropriate combination of techniques is difficult because there are numerous approaches for protecting data and allocating resources. Storage system architects typically use ad hoc techniques, often result... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Intrusions through System Call Sequence and Argument Analysis

    Publication Year: 2010, Page(s):381 - 395
    Cited by:  Papers (16)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2836 KB) | HTML iconHTML

    We describe an unsupervised host-based intrusion detection system based on system call arguments and sequences. We define a set of anomaly detection models for the individual parameters of the call. We then describe a clustering process that helps to better fit models to system call arguments and creates interrelations among different arguments of a system call. Finally, we add a behavioral Markov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault Localization via Risk Modeling

    Publication Year: 2010, Page(s):396 - 409
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2241 KB) | HTML iconHTML

    Internet backbone networks are under constant flux in order to keep up with demand and offer new features. The pace of change in technology often outstrips the pace of introduction of associated fault monitoring capabilities that are built into today's IP protocols and routers. Moreover, some of these new technologies cross networking layers, raising the potential for unanticipated interactions an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Greedy Receivers in IEEE 802.11 Hotspots: Impacts and Detection

    Publication Year: 2010, Page(s):410 - 423
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3430 KB) | HTML iconHTML

    As wireless hotspot business becomes a tremendous financial success, users of these networks have increasing motives to misbehave in order to obtain more bandwidth at the expense of other users. Such misbehaviors threaten the performance and availability of hotspot networks and have recently attracted increasing research attention. However, the existing work so far focuses on sender-side misbehavi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proactive Detection of Computer Worms Using Model Checking

    Publication Year: 2010, Page(s):424 - 438
    Cited by:  Papers (6)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3334 KB) | HTML iconHTML

    Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants mostly differ in their binary representation rather than their functionality, they can be recognized by analyzing the program behavior, even though they are not covered by the signature databases of current antivirus tool... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid Approach for Detection and Correction of Transient Faults in SoCs

    Publication Year: 2010, Page(s):439 - 445
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1174 KB) | HTML iconHTML

    Critical applications based on Systems-on-Chip (SoCs) require suitable techniques that are able to ensure a sufficient level of reliability. Several techniques have been proposed to improve fault detection and correction capabilities of faults affecting SoCs. This paper proposes a hybrid approach able to detect and correct the effects of transient faults in SoC data memories and caches. The propos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society OnlinePlus [advertisement]

    Publication Year: 2010, Page(s): 446
    Request permission for commercial reuse | PDF file iconPDF (228 KB)
    Freely Available from IEEE
  • IEEE Computer Society - Stay Connected [advertisement]

    Publication Year: 2010, Page(s): 447
    Request permission for commercial reuse | PDF file iconPDF (297 KB)
    Freely Available from IEEE
  • IEEE Computer Society CSDA Certification [advertisement]

    Publication Year: 2010, Page(s): 448
    Request permission for commercial reuse | PDF file iconPDF (343 KB)
    Freely Available from IEEE
  • TDSC Information for authors

    Publication Year: 2010, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2010, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University