29 June-2 July 2009
Filter Results
-
[Front cover]
Publication Year: 2009, Page(s): c1|
PDF (1051 KB)
-
[Copyright notice]
Publication Year: 2009, Page(s): i|
PDF (406 KB)
-
Table of contents
Publication Year: 2009, Page(s):i - vi|
PDF (633 KB)
-
Message from the Conference General Chair and Coordinator
Publication Year: 2009, Page(s): i -
Message from the DCCS Program Chair
Publication Year: 2009, Page(s): ii -
Message from the PDS Program Chair
Publication Year: 2009, Page(s): iii -
-
DSN 2009 Organizers
Publication Year: 2009, Page(s): v|
PDF (102 KB)
-
DSN Steering Committee
Publication Year: 2009, Page(s): vi|
PDF (154 KB)
-
DCCS Program Committee
Publication Year: 2009, Page(s): vii|
PDF (154 KB)
-
list-reviewer
Publication Year: 2009, Page(s):viii - ix|
PDF (258 KB)
-
PDS Program Committee
Publication Year: 2009, Page(s): x|
PDF (180 KB)
-
list-reviewer
Publication Year: 2009, Page(s): xi|
PDF (175 KB)
-
DSN 2009 Subcommittees
Publication Year: 2009, Page(s): xii|
PDF (120 KB)
-
Future prospects of research on security and dependability
Publication Year: 2009, Page(s): 1 -
Dependability - How does the market value it?
Publication Year: 2009, Page(s): 2 -
WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks
Publication Year: 2009, Page(s):3 - 12
Cited by: Papers (12)Recently, a new attack for poisoning the cache of Recursive DNS (RDNS) resolvers was discovered and revealed to the public. In response, major DNS vendors released a patch to their software. However, the released patch does not completely protect DNS servers from cache poisoning attacks in a number of practical scenarios. DNSSEC seems to offer a definitive solution to the vulnerabilities of the DN... View full abstract»
-
Exception triggered DoS attacks on wireless networks
Publication Year: 2009, Page(s):13 - 22
Cited by: Papers (3) | Patents (1)Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through experiments, we show that even the latest strongly authenticated protocols such as PEAP, EAP-TLS and EAP-TTLS are vulnerable to these attacks. Real attacks have been implemented and tested against TLS-based EAP protocols, the... View full abstract»
-
HC-BGP: A light-weight and flexible scheme for securing prefix ownership
Publication Year: 2009, Page(s):23 - 32
Cited by: Papers (3)The border gateway protocol (BGP) is a fundamental building block of the Internet infrastructure. However, due to the implicit trust assumption among networks, Internet routing remains quite vulnerable to various types of misconfiguration and attacks. Prefix hijacking is one such misbehavior where an attacker AS injects false routes to the Internet routing system that misleads victim's traffic to ... View full abstract»
-
Fault isolation for device drivers
Publication Year: 2009, Page(s):33 - 42
Cited by: Papers (20) | Patents (2)This work explores the principles and practice of isolating low-level device drivers in order to improve OS dependability. In particular, we explore the operations drivers can perform and how fault propagation in the event a bug is triggered can be prevented. We have prototyped our ideas in an open-source multiserver OS (MINIX 3) that isolates drivers by strictly enforcing least authority and iter... View full abstract»
-
WYSIWIB: A declarative approach to finding API protocols and bugs in Linux code
Publication Year: 2009, Page(s):43 - 52
Cited by: Papers (10) | Patents (2)Eliminating OS bugs is essential to ensuring the reliability of infrastructures ranging from embedded systems to servers. Several tools based on static analysis have been proposed for finding bugs in OS code. They have, however, emphasized scalability over usability, making it difficult to focus the tools on specific kinds of bugs and to relate the results to patterns in the source code. We propos... View full abstract»
-
Exploiting refactoring in formal verification
Publication Year: 2009, Page(s):53 - 62
Cited by: Papers (5)In previous work, we introduced Echo, a new approach to the formal verification of the functional correctness of software. Part of what makes Echo practical is a technique called verification refactoring. The program to be verified is mechanically refactored specifically to facilitate verification. After refactoring, the program is documented with low-level annotations, and a specification is extr... View full abstract»
-
Maximizing system lifetime by battery scheduling
Publication Year: 2009, Page(s):63 - 72
Cited by: Papers (12) | Patents (4)The use of mobile devices is limited by the battery lifetime. Some devices have the option to connect an extra battery, or to use smart battery packs with multiple cells to extend the lifetime. In these cases, scheduling the batteries over the load to exploit recovery properties usually extends the system lifetime. Straightforward scheduling schemes, like round robin or choosing the best battery a... View full abstract»
-
Safety modeling and evaluation of Automated Highway Systems
Publication Year: 2009, Page(s):73 - 82
Cited by: Papers (4)This paper addresses safety modeling and evaluation of automated highway systems, based on the use of platoons of vehicles driven by automated agents. We analyze the impact on safety of the strategy used to coordinate the vehicles' operations, inside each platoon and between platoons, when vehicles enter or exit the highway, or when maneuvers are carried out to recover from failures affecting the ... View full abstract»
-
Evaluating the impact of Undetected Disk Errors in RAID systems
Publication Year: 2009, Page(s):83 - 92
Cited by: Papers (11)Despite the reliability of modern disks, recent studies have made it clear that a new class of faults, UndetectedDisk Errors (UDEs) also known as silent data corruption events, become a real challenge as storage capacity scales. While RAID systems have proven effective in protecting data from traditional disk failures, silent data corruption events remain a significant problem unaddressed by RAID.... View full abstract»