skip to main content
10.1145/1036921acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
SSRS '03: Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
ACM2003 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS03: Tenth ACM Conference on Computer and Communications Security 2003 Fairfax VA 31 October 2003
ISBN:
978-1-58113-784-2
Published:
31 October 2003
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN
Next Conference
October 13 - 17, 2025
Taipei , Taiwan
Reflects downloads up to 03 Mar 2025Bibliometrics
Skip Abstract Section
Abstract

These proceedings contain the papers selected for presentation at the ACM Workshop on Survivable and Self-Regenerative Systems, held in association with the 10th ACM Computer and Communications Security Conference, October 31, 2003, in Fairfax, VA, USA.

In response to the call for papers, 26 papers were submitted to the workshop. These papers were evaluated on the basis of their significance, novelty, and technical quality. Each paper was reviewed by at least three members of the program committee. The program committee meeting was held electronically. Of the papers submitted, 10 were selected as regular papers and 4 were selected as short papers. The workshop program also included an invited talk by Jay Lala.

Skip Table Of Content Section
Article
A churn-resistant peer-to-peer web caching system

Denial of service attacks on peer-to-peer (p2p) systems can arise from sources otherwise considered non-malicious. We focus on one such commonly prevalent source, called "churn". Churn arises from continued and rapid arrival and failure (or departure) ...

Article
A holistic approach to service survivability

We present SABER (Survivability Architecture: Block, Evade, React), a proposed survivability architecture that blocks, evades and reacts to a variety of attacks by using several security and survivability mechanisms in an automated and coordinated ...

Article
Security analysis of SITAR intrusion tolerance system

Security is an important QoS attribute for characterizing intrusion tolerant computing systems. Frequently however, the security of computing systems is assessed in a qualitative manner based on the presence and absence of certain functional ...

Article
SelectCast: a scalable and self-repairing multicast overlay routing facility

In this paper we describe SelectCast, a self-repairing multicast overlay routing facility for supporting publish/subscribe applications. Select Cast is a peer-to-peer protocol, and lever-ages Astrolabe, a secure distributed information management ...

Article
Tolerating denial-of-service attacks using overlay networks: impact of topology

Proxy-network based overlays have been proposed to protect Internet Applications against Denial-of-Service attacks by hiding an application's location. We study how a proxy network's topology influences the effectiveness of location-hiding. We present ...

Article
ARECA: a highly attack resilient certification authority

Certification Authorities (CA) are a critical component of a PKI. All the certificates issued by a CA will become invalid when the (signing) private key of the CA is compromised. Hence it is a very important issue to protect the private key of an online ...

Article
Attack resistant cache replacement for survivable services

Many distributed services are susceptible to attacks by malicious clients that can significantly degrade their performance. Scalable distributed services make use of a variety of techniques which are vulnerable to such attacks. We explore the ...

Article
A biological programming model for self-healing

Biological systems exhibit remarkable adaptation and robustness in the face of widely changing environments. By adopting properties of biological systems, we hope to design systems that operate adequately even in the presence of catastrophic failures ...

Article
Sliding-window self-healing key distribution

We propose a new method for distributing a common key to a dynamic group over an unreliable channel. In [15], an unconditionally secure "self-healing" protocol that solves this problem and has significant advantages over previous work in this area is ...

Article
Modeling insecurity: policy engineering for survivability

We present an access-control policy specification and verification process that is well-suited to model survivability of information resources under threat of compromise. Our process differs from the traditional policy engineering methodology in many ...

Article
Continual repair for windows using the event log

There is good reason to base intrusion detection on data from the host. Unfortunately, most operating systems do not provide all the data needed in readily available logs. Ironically, perhaps, Window NT and its successor, Windows 2000, provide much of ...

Article
TRIAD: a framework for survivability architecting

High confidence in a system's survivability requires an accurate understanding of the system's threat environment and the impact of that environment on system operations. This paper describes a framework for intrusion-aware design called trustworthy ...

Article
An intrusion tolerant architecture for dynamic content internet servers

This paper describes a generic architecture for intrusion tolerant Internet servers. It aims to build systems that are able to survive attacks in the context of an open network such as the Internet. To do so, the design is based on fault tolerance ...

Article
Self-regenerative software components

Self-regenerative capabilities are a new trend in survivable system design. Self-regeneration ensures the property that a system's vulnerabilities cannot be exploited to the extent that the mission objective is compromised, but instead that the ...

Contributors
  • Pennsylvania State University
  • BBN Technologies
  1. Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security

    Recommendations