2009 IEEE/IFIP International Conference on Dependable Systems & Networks

29 June-2 July 2009

Filter Results

Displaying Results 1 - 25 of 93
  • [Front cover]

    Publication Year: 2009, Page(s): c1
    Request permission for reuse | PDF file iconPDF (1051 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): i
    Request permission for reuse | PDF file iconPDF (406 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):i - vi
    Request permission for reuse | PDF file iconPDF (633 KB)
    Freely Available from IEEE
  • Message from the Conference General Chair and Coordinator

    Publication Year: 2009, Page(s): i
    Request permission for reuse | PDF file iconPDF (249 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the DCCS Program Chair

    Publication Year: 2009, Page(s): ii
    Request permission for reuse | PDF file iconPDF (163 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the PDS Program Chair

    Publication Year: 2009, Page(s): iii
    Request permission for reuse | PDF file iconPDF (204 KB) | HTML iconHTML
    Freely Available from IEEE
  • William C. Carter Award

    Publication Year: 2009, Page(s): iv
    Request permission for reuse | PDF file iconPDF (255 KB) | HTML iconHTML
    Freely Available from IEEE
  • DSN 2009 Organizers

    Publication Year: 2009, Page(s): v
    Request permission for reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • DSN Steering Committee

    Publication Year: 2009, Page(s): vi
    Request permission for reuse | PDF file iconPDF (154 KB)
    Freely Available from IEEE
  • DCCS Program Committee

    Publication Year: 2009, Page(s): vii
    Request permission for reuse | PDF file iconPDF (154 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s):viii - ix
    Request permission for reuse | PDF file iconPDF (258 KB)
    Freely Available from IEEE
  • PDS Program Committee

    Publication Year: 2009, Page(s): x
    Request permission for reuse | PDF file iconPDF (180 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s): xi
    Request permission for reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • DSN 2009 Subcommittees

    Publication Year: 2009, Page(s): xii
    Request permission for reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • Future prospects of research on security and dependability

    Publication Year: 2009, Page(s): 1
    Request permission for reuse | PDF file iconPDF (218 KB) | HTML iconHTML
    Freely Available from IEEE
  • Dependability - How does the market value it?

    Publication Year: 2009, Page(s): 2
    Request permission for reuse | PDF file iconPDF (213 KB) | HTML iconHTML
    Freely Available from IEEE
  • WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks

    Publication Year: 2009, Page(s):3 - 12
    Cited by:  Papers (12)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    Recently, a new attack for poisoning the cache of Recursive DNS (RDNS) resolvers was discovered and revealed to the public. In response, major DNS vendors released a patch to their software. However, the released patch does not completely protect DNS servers from cache poisoning attacks in a number of practical scenarios. DNSSEC seems to offer a definitive solution to the vulnerabilities of the DN... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exception triggered DoS attacks on wireless networks

    Publication Year: 2009, Page(s):13 - 22
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (605 KB) | HTML iconHTML

    Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through experiments, we show that even the latest strongly authenticated protocols such as PEAP, EAP-TLS and EAP-TTLS are vulnerable to these attacks. Real attacks have been implemented and tested against TLS-based EAP protocols, the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HC-BGP: A light-weight and flexible scheme for securing prefix ownership

    Publication Year: 2009, Page(s):23 - 32
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    The border gateway protocol (BGP) is a fundamental building block of the Internet infrastructure. However, due to the implicit trust assumption among networks, Internet routing remains quite vulnerable to various types of misconfiguration and attacks. Prefix hijacking is one such misbehavior where an attacker AS injects false routes to the Internet routing system that misleads victim's traffic to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault isolation for device drivers

    Publication Year: 2009, Page(s):33 - 42
    Cited by:  Papers (20)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (183 KB) | HTML iconHTML

    This work explores the principles and practice of isolating low-level device drivers in order to improve OS dependability. In particular, we explore the operations drivers can perform and how fault propagation in the event a bug is triggered can be prevented. We have prototyped our ideas in an open-source multiserver OS (MINIX 3) that isolates drivers by strictly enforcing least authority and iter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WYSIWIB: A declarative approach to finding API protocols and bugs in Linux code

    Publication Year: 2009, Page(s):43 - 52
    Cited by:  Papers (10)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    Eliminating OS bugs is essential to ensuring the reliability of infrastructures ranging from embedded systems to servers. Several tools based on static analysis have been proposed for finding bugs in OS code. They have, however, emphasized scalability over usability, making it difficult to focus the tools on specific kinds of bugs and to relate the results to patterns in the source code. We propos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting refactoring in formal verification

    Publication Year: 2009, Page(s):53 - 62
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    In previous work, we introduced Echo, a new approach to the formal verification of the functional correctness of software. Part of what makes Echo practical is a technique called verification refactoring. The program to be verified is mechanically refactored specifically to facilitate verification. After refactoring, the program is documented with low-level annotations, and a specification is extr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maximizing system lifetime by battery scheduling

    Publication Year: 2009, Page(s):63 - 72
    Cited by:  Papers (12)  |  Patents (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    The use of mobile devices is limited by the battery lifetime. Some devices have the option to connect an extra battery, or to use smart battery packs with multiple cells to extend the lifetime. In these cases, scheduling the batteries over the load to exploit recovery properties usually extends the system lifetime. Straightforward scheduling schemes, like round robin or choosing the best battery a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safety modeling and evaluation of Automated Highway Systems

    Publication Year: 2009, Page(s):73 - 82
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (980 KB) | HTML iconHTML

    This paper addresses safety modeling and evaluation of automated highway systems, based on the use of platoons of vehicles driven by automated agents. We analyze the impact on safety of the strategy used to coordinate the vehicles' operations, inside each platoon and between platoons, when vehicles enter or exit the highway, or when maneuvers are carried out to recover from failures affecting the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the impact of Undetected Disk Errors in RAID systems

    Publication Year: 2009, Page(s):83 - 92
    Cited by:  Papers (11)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Despite the reliability of modern disks, recent studies have made it clear that a new class of faults, UndetectedDisk Errors (UDEs) also known as silent data corruption events, become a real challenge as storage capacity scales. While RAID systems have proven effective in protecting data from traditional disk failures, silent data corruption events remain a significant problem unaddressed by RAID.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.