By Topic

Dependable and Secure Computing, IEEE Transactions on

Issue 4 • Date July-Aug. 2011

Filter Results

Displaying Results 1 - 16 of 16
  • [Front cover]

    Publication Year: 2011 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (101 KB)  
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2011 , Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (94 KB)  
    Freely Available from IEEE
  • A New Diskless Checkpointing Approach for Multiple Processor Failures

    Publication Year: 2011 , Page(s): 481 - 493
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1136 KB) |  | HTML iconHTML  

    Diskless checkpointing is an important technique for performing fault tolerance in distributed or parallel computing systems. This study proposes a new approach to enhance neighbor-based diskless checkpointing to tolerate multiple failures using simple checkpointing and failure recovery operations, without relying on dedicated checkpoint processors. In this scheme, each processor saves its checkpo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anomaly Detection in Network Traffic Based on Statistical Inference and alpha-Stable Modeling

    Publication Year: 2011 , Page(s): 494 - 509
    Cited by:  Papers (5)
    Multimedia
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2785 KB) |  | HTML iconHTML  

    This paper proposes a novel method to detect anomalies in network traffic, based on a nonrestricted α-stable first-order model and statistical hypothesis testing. To this end, we give statistical evidence that the marginal distribution of real traffic is adequately modeled with α-stable functions and classify traffic patterns by means of a Generalized Likelihood Ratio Test (GLRT). Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Fault Detection and Diagnosis in Complex Software Systems with Information-Theoretic Monitoring

    Publication Year: 2011 , Page(s): 510 - 522
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (986 KB) |  | HTML iconHTML  

    Management metrics of complex software systems exhibit stable correlations which can enable fault detection and diagnosis. Current approaches use specific analytic forms, typically linear, for modeling correlations. In practice, more complex nonlinear relationships exist between metrics. Moreover, most intermetric correlations form clusters rather than simple pairwise correlations. These clusters ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ELMO: Energy Aware Local Monitoring in Sensor Networks

    Publication Year: 2011 , Page(s): 523 - 536
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1391 KB) |  | HTML iconHTML  

    Over the past decade, local monitoring has been shown to be a powerful technique for improving security in multihop wireless sensor networks (WSNs). Indeed, local monitoring-based security algorithms are becoming the most popular tool for providing security in WSNs. However, local monitoring as it is currently practiced is costly in terms of energy consumption, a major drawback for energy-constrai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and Mitigating Transient Errors in Logic Circuits

    Publication Year: 2011 , Page(s): 537 - 547
    Cited by:  Papers (11)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1373 KB) |  | HTML iconHTML  

    Transient or soft errors caused by various environmental effects are a growing concern in micro and nanoelectronics. We present a general framework for modeling and mitigating the logical effects of such errors in digital circuits. We observe that some errors have time-bounded effects; the system's output is corrupted for a few clock cycles, after which it recovers automatically. Since such errone... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Ultralightweight RFID Authentication Protocols

    Publication Year: 2011 , Page(s): 548 - 563
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1781 KB) |  | HTML iconHTML  

    A recent research trend, motivated by the massive deployment of RFID technology, looks at cryptographic protocols for securing communication between entities in which some of the parties have very limited computing capabilities. In this paper, we focus our attention on SASI, a new RFID authentication protocol, designed for providing Strong Authentication and Strong Integrity. SASI is a good repres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prime: Byzantine Replication under Attack

    Publication Year: 2011 , Page(s): 564 - 577
    Cited by:  Papers (7)
    Multimedia
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (682 KB) |  | HTML iconHTML  

    Existing Byzantine-resilient replication protocols satisfy two standard correctness criteria, safety and liveness, even in the presence of Byzantine faults. The runtime performance of these protocols is most commonly assessed in the absence of processor faults and is usually good in that case. However, faulty processors can significantly degrade the performance of some protocols, limiting their pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy-Preserving Updates to Anonymous and Confidential Databases

    Publication Year: 2011 , Page(s): 578 - 587
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (737 KB) |  | HTML iconHTML  

    Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted with a tuple owned by Bob, is still k-anonymous. Also, suppose that access to the database is strictly controlled, because for example data are used for certain experiments that need to be maintained confidential. Clearly, allowing Alice to directly read the contents of the tuple breaks the privacy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Runtime Defense against Code Injection Attacks Using Replicated Execution

    Publication Year: 2011 , Page(s): 588 - 601
    Cited by:  Papers (4)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (728 KB) |  | HTML iconHTML  

    The number and complexity of attacks on computer systems are increasing. This growth necessitates proper defense mechanisms. Intrusion detection systems play an important role in detecting and disrupting attacks before they can compromise software. Multivariant execution is an intrusion detection mechanism that executes several slightly different versions, called variants, of the same program in l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-Healing Control Flow Protection in Sensor Applications

    Publication Year: 2011 , Page(s): 602 - 616
    Multimedia
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1270 KB) |  | HTML iconHTML  

    Since sensors do not have a sophisticated hardware architecture or an operating system to manage code for safety, attacks injecting code to exploit memory-related vulnerabilities can present threats to sensor applications. In a sensor's simple memory architecture, injected code can alter the control flow of a sensor application to either misuse existing routines or download other malicious code to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks

    Publication Year: 2011 , Page(s): 617 - 623
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (368 KB) |  | HTML iconHTML  

    In this paper, we formulate an analytical model to characterize the spread of malware in decentralized, Gnutella type peer-to-peer (P2P) networks and study the dynamics associated with the spread of malware. Using a compartmental model, we derive the system parameters or network conditions under which the P2P network may reach a malware free equilibrium. The model also evaluates the effect of cont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stay Connected with the IEEE Computer Society [advertisement]

    Publication Year: 2011 , Page(s): 624
    Save to Project icon | Request Permissions | PDF file iconPDF (292 KB)  
    Freely Available from IEEE
  • TDSC Information for authors

    Publication Year: 2011 , Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (94 KB)  
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2011 , Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (101 KB)  
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University