Information Trust Institute block of abstract images
Information Trust Institute block of abstract images

2nd ITI Workshop on Dependability and Security: Opportunities and Challenges in Building an Overarching Community

December 6, 2005

Coordinated Science Laboratory
University of Illinois
Urbana, Illinois

Welcome to the web site for the December 6, 2005 ITI Workshop on Dependability and Security! This year's theme is critical applications.


Explosive growth in the number and complexity of computing systems requiring dependability and security in their operation is one of the most striking features of our technological and social landscape. That is particularly true for the critical applications and systems our society and economy depend on to function properly. Dependability and security are here understood as a system's general worthiness of being relied upon and trusted to the extent required, even under extreme conditions. Dependability involves the relevant application and system qualities, including fault tolerance, availability, performability, and robustness. Security, with its classic foundations in cryptography, involves issues relating to intrusion detection and tolerance, authentication, and firewall designs, as well as security-related protocols, modeling, and benchmarking. The interplay between dependability/security and performance is also involved in many critical application domains, such as critical infrastructure protection, aerospace, telecommunications, healthcare, and e-commerce. The expectation that modern, vast computing systems will be highly available and secure despite accidental failures and malicious attacks constitutes a major challenge for researchers, developers, and managers in the computing field.

Design of systems for dependability and security has assumed major importance in both government and commercial sectors, where there is a renewed interest in validation, verification, and measurement of various aspects of security, system survivability, fault tolerance, and performance. Furthermore, dependability, security, and performance have tended to be treated separately, despite the fact that the rigorous discipline of system design and analysis is best addressed by joint consideration of these issues, to allow for appropriate trade-offs.

The December 2005 ITI Workshop on Dependability and Security will build on the success of the inaugural workshop held in December 2004. This year the workshop is expected to provide a forum for leading academics and industry researchers to speak to the challenges and opportunities in dependable and secure computing with emphasis on critical applications. The workshop is sponsored by the Information Trust Institute (ITI) at Illinois, and will be held in the Coordinated Science Laboratory on the campus of the University of Illinois at Urbana-Champaign.


7:30 Registration and Continental Breakfast
7:55 Workshop Welcome
8:00-8:45 Keynote Address: Fred Schneider (Cornell)
8:45-10:15 Panel 1, Critical Application Challenges: Catherine Meadows (US Naval Research Lab), Matt Bishop (UC Davis), Paulo Veríssimo (Univ. Lisboa), Carl Landwehr (Univ. Maryland)
10:15-10:30 Break
10:30-12:00 Panel 2, Design Approaches for Critical Applications: Roy Maxion (Carnegie Mellon), Lorenzo Alvisi (Univ. Texas at Austin), Ken Birman (Cornell University), Lawrence Votta (Sun)
12:00-1:45 Lunch and Poster Session
1:45-3:15 Panel 3, Validation Approaches for Critical Applications: Elisa Bertino (Purdue), Andre Schiper (EPFL), Neeraj Suri (TU Darmstadt)
3:15-3:30 Break
3:30-4:30 Closing Discussion on Key Findings


Posters presented

Raja N. Afandi, Jianqing Zhang, Munawar Hafiz and Carl A. Gunter

AMPol: Adaptive Messaging Policy

Roy Campbell and Simha Sundeep Reddy Katasani

Analyzing Security & Dependability of SCADA Systems Using Petri-net based Workflows

Nithin M. Nakka, Zbigniew T. Kalbarczyk, and Ravi K. Iyer

Application Aware Checking - Reliability and Security Engine

Yuanyuan Zhou, Pin Zhou, Feng Qin, and Shan Lu

Architectural Support for Software Debugging

Omid Fatemieh, Rakesh Bobba, Fariba Khan, Carl A. Gunter, and Himanshu Khurana

Attribute Based Messaging


C. R. Burns, J. S. Mejia, P. F. Hokayem, I. I. Hussein, D. M. Stipanovic, and M. W. Spong

Control of Formations of Unmanned Vehicles

Nikhil Chopra, Dongjun Lee, and Mark W. Spong

Distributed Coordination of Multiagent Systems


Karthik Pattabiraman, Giacinto Paolo Saggese, Zbigniew Kalbarczyk, Ravishankar K. Iyer

Dynamic Derivation and Hardware Implementation of Error-Detectors

G. Hashemian and M. C. Loui

Engineering Courage: From "Not My Business" to Positive Responsibility

C. Graeff

Ethical Implications of Biases in Geographic Information Systems

Long Wang, Zbigniew Kalbarczyk, and Ravishankar K. Iyer

Exploiting OS Support for Transparent Failure Detection and Customized Recovery

Tansu Alpcan and Tamer Basar


A Game Theoretic Approach to Network Security

Giacinto Paolo Saggese, Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K. Iyer

Hardware Support for High- Performance, Intrusion- and Fault-Tolerant Systems

R. Chmiel and M. C. Loui

An Integrated Approach to Instruction in Debugging Computer Programs

Zhen Yin, Tansu Alpcan, and Tamer Basar

Intrusion Detection in Trustworthy Networked Systems

Zhenmin Li, Shan Lu, and Yuanyuan Zhou

Mining Large Software for Specification and Bugs

T. Courtney, S. Gaonkar, M. Griffith, M. McQuinn, V. V. Lam, E. W. Rozier, and W. H. Sanders

Möbius: An Integrated Performance/Dependability/Security Evaluation Environment

William Conner, Klara Nahrstedt, Indranil Gupta

Prevention of DoS Attacks in Peer-to-Peer Media Streaming Systems

Jodie P. Boyer, Kaijun Tan, and Carl A. Gunter

Privacy Sensitive Location Information Systems for Smart Buildings

D. M. Nicol, M. Liljenstam, J. Liu, L. Karbiner, Y. Yuan, G. Yan, and C. Grier

Real-time Immersive Network Simulation Environment - RINSE

Feng Qin, Joseph Tucek, Jagadeesan Sundaresan, and Yuanyuan Zhou

Rx: Treating Bugs as Allergies

Klara Nahrstedt and Wenbo He

Secure Communication by Multiple Group-Based Public Keys in Wireless Ad Hoc Network

Michael D. LeMay, Omid Fatemieh, Sundeep Katasani, Nikita Borisov, and Carl A. Gunter

Self-Diagnosing Logical Access Controls

Pradeep Kyasanur and Nitin H. Vaidya

Selfish Misbehavior in Wireless Networks

C. Liu, X. Yan, J. Han, L. Fei, and S. P. Midkiff

SOBER: Statistical Model-based Bug Localization

Ragib Hasan and Marianne Winslett

Synergy: A Trust-aware, Policy-driven Information Dissemination Framework

Erick Rodriguez-Seda, Oscar Martinez-Palafox, Dongjun Lee, and Mark W. Spong

Toward Bilateral Teleoperation over the Internet

A. Lee, M. Winslett, J. Basney, and V. Welch

The Traust Authorization Service

M. Winslett, K. Seamons, R. Hasan, A. Lee, L. Olson, C. Zhang

TrustBuilder: Authorization for Open Systems