Export Citations
- Sponsor:
- sigsac
These proceedings contain the papers selected for presentation at the ACM Workshop on Survivable and Self-Regenerative Systems, held in association with the 10th ACM Computer and Communications Security Conference, October 31, 2003, in Fairfax, VA, USA.
In response to the call for papers, 26 papers were submitted to the workshop. These papers were evaluated on the basis of their significance, novelty, and technical quality. Each paper was reviewed by at least three members of the program committee. The program committee meeting was held electronically. Of the papers submitted, 10 were selected as regular papers and 4 were selected as short papers. The workshop program also included an invited talk by Jay Lala.
Proceeding Downloads
A churn-resistant peer-to-peer web caching system
Denial of service attacks on peer-to-peer (p2p) systems can arise from sources otherwise considered non-malicious. We focus on one such commonly prevalent source, called "churn". Churn arises from continued and rapid arrival and failure (or departure) ...
A holistic approach to service survivability
- Angelos D. Keromytis,
- Janak Parekh,
- Philip N. Gross,
- Gail Kaiser,
- Vishal Misra,
- Jason Nieh,
- Dan Rubenstein,
- Sal Stolfo
We present SABER (Survivability Architecture: Block, Evade, React), a proposed survivability architecture that blocks, evades and reacts to a variety of attacks by using several security and survivability mechanisms in an automated and coordinated ...
Security analysis of SITAR intrusion tolerance system
Security is an important QoS attribute for characterizing intrusion tolerant computing systems. Frequently however, the security of computing systems is assessed in a qualitative manner based on the presence and absence of certain functional ...
SelectCast: a scalable and self-repairing multicast overlay routing facility
In this paper we describe SelectCast, a self-repairing multicast overlay routing facility for supporting publish/subscribe applications. Select Cast is a peer-to-peer protocol, and lever-ages Astrolabe, a secure distributed information management ...
Tolerating denial-of-service attacks using overlay networks: impact of topology
Proxy-network based overlays have been proposed to protect Internet Applications against Denial-of-Service attacks by hiding an application's location. We study how a proxy network's topology influences the effectiveness of location-hiding. We present ...
ARECA: a highly attack resilient certification authority
Certification Authorities (CA) are a critical component of a PKI. All the certificates issued by a CA will become invalid when the (signing) private key of the CA is compromised. Hence it is a very important issue to protect the private key of an online ...
Attack resistant cache replacement for survivable services
Many distributed services are susceptible to attacks by malicious clients that can significantly degrade their performance. Scalable distributed services make use of a variety of techniques which are vulnerable to such attacks. We explore the ...
A biological programming model for self-healing
Biological systems exhibit remarkable adaptation and robustness in the face of widely changing environments. By adopting properties of biological systems, we hope to design systems that operate adequately even in the presence of catastrophic failures ...
Sliding-window self-healing key distribution
We propose a new method for distributing a common key to a dynamic group over an unreliable channel. In [15], an unconditionally secure "self-healing" protocol that solves this problem and has significant advantages over previous work in this area is ...
Modeling insecurity: policy engineering for survivability
We present an access-control policy specification and verification process that is well-suited to model survivability of information resources under threat of compromise. Our process differs from the traditional policy engineering methodology in many ...
Continual repair for windows using the event log
There is good reason to base intrusion detection on data from the host. Unfortunately, most operating systems do not provide all the data needed in readily available logs. Ironically, perhaps, Window NT and its successor, Windows 2000, provide much of ...
TRIAD: a framework for survivability architecting
High confidence in a system's survivability requires an accurate understanding of the system's threat environment and the impact of that environment on system operations. This paper describes a framework for intrusion-aware design called trustworthy ...
An intrusion tolerant architecture for dynamic content internet servers
This paper describes a generic architecture for intrusion tolerant Internet servers. It aims to build systems that are able to survive attacks in the context of an open network such as the Internet. To do so, the design is based on fault tolerance ...
Self-regenerative software components
Self-regenerative capabilities are a new trend in survivable system design. Self-regeneration ensures the property that a system's vulnerabilities cannot be exploited to the extent that the mission objective is compromised, but instead that the ...
- Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security