Information Trust Institute block of abstract images
Information Trust Institute block of abstract images

3rd ITI Workshop on Dependability and Security: Opportunities and Challenges in Building an Overarching Community

December 5, 2006

Coordinated Science Laboratory
University of Illinois
Urbana, Illinois

Welcome to the web site for the December 5, 2006 ITI Workshop on Dependability and Security! This year's theme is "bringing together industry and academia."


Explosive growth in the number and complexity of computing systems requiring dependability and security in their operation is one of the most striking features of our technological and social landscape. That is particularly true for the critical applications and systems our society and economy depend on to function properly. Dependability and security are here understood as a system's general worthiness of being relied upon and trusted to the extent required, even under extreme conditions. Dependability involves the relevant application and system qualities, including fault tolerance, availability, performability, and robustness. Security, with its classic foundations in cryptography, involves issues relating to intrusion detection and tolerance, authentication, and firewall designs, as well as security-related protocols, modeling, and benchmarking. The interplay between dependability/security and performance is also involved in many critical application domains, such as critical infrastructure protection, aerospace, telecommunications, healthcare, and e-commerce. The expectation that modern, vast computing systems will be highly available and secure despite accidental failures and malicious attacks constitutes a major challenge for researchers, developers, and managers in the computing field.

Design of systems for dependability and security has assumed major importance in both government and commercial sectors, where there is a renewed interest in validation, verification, and measurement of various aspects of security, system survivability, fault tolerance, and performance. Furthermore, dependability, security, and performance have tended to be treated separately, despite the fact that the rigorous discipline of system design and analysis is best addressed by joint consideration of these issues, to allow for appropriate trade-offs.

The 3rd ITI Workshop on Dependability and Security built on the success of the previous workshops, held in 2004 and 2005. This year the workshop focused on the challenges and opportunities involved in the interplay of industry and academia in the field of dependable and secure computing. The workshop is sponsored by the Information Trust Institute (ITI) at Illinois, and will be held in the Coordinated Science Laboratory on the campus of the University of Illinois at Urbana-Champaign.


Registration has closed. Contact Jenny Applequist at applequiatiti [dot] illinois [dot] edu for assistance.


The all-day workshop on Tuesday, December 5, 2006 included four panels of distinguished experts from industry and academia, plus a student poster session. The agenda is below. Follow the hyperlinks to see the slides presented.

7:30 Registration and Continental Breakfast
8:00 Workshop Welcome
8:15-9:45 Panel 1, Core Technologies: George Cybenko (Dartmouth), Virgil Gligor (Univ. Maryland), Fred Schneider (Cornell), Neeraj Suri (TU Darmstadt), Paulo Veríssimo (Univ. Lisboa). Co-chairs: Saurabh Bagchi (Purdue, reporter) and Yuanyuan Zhou (UIUC, moderator).
9:45-10:00 Break
10:00-11:30 Panel 2, Enterprise Computing: E. N. (Mootaz) Elnozahy (IBM), Rich Friedrich (HP), Pratap Pattnaik (IBM), Lawrence Votta (Sun Microsystems). Co-chairs: Sean Smith (Dartmouth College, reporter) and Nikita Borisov (UIUC, moderator).
11:30-1:00 Lunch and Poster Session
1:00-2:30 Panel 3, End-to-End Architectures: Tom Bracewell (Raytheon), Rick Schantz (BBN), Rick Schlichting (AT&T), Paul Steinberg (Motorola), Alan Wood (Sun Microsystems). Co-chairs: Veena Mendiratta (Bell Labs, Lucent Technologies, reporter) and Steve Lumetta (UIUC, moderator).
2:30-2:45 Break
2:45-4:15 Panel 4, Assessment: Lorenzo Alvisi (Univ. Texas at Austin), Jean Arlat (LAAS-CNRS), Ronald Buskey (Motorola), Chad Hanson (Trusted Computer Solutions), Catherine Meadows (NRL). Co-chairs: Emre Kiciman (Microsoft Research, reporter) and Sam King (UIUC, moderator).
4:15-5:30 Closing Discussion on Key Findings. William H. Sanders (UIUC) and Ravi K. Iyer (UIUC), moderators. Presentations summarizing the four panels, followed by plans for the future.


Posters presented

D. M. Nicol, W. H. Sanders, S. Singh, M. Seri, and C. Grier APT: Access Policy Tool
Yuanyuan Zhou, Zhenmin Li, Qingbo Zhu, Shan Lu, Joe Tucek, Spiros Xanthos, Lin Tan, Weihang Jiang, and Xiao Ma ARTS: Available, Robust and Trustworthy Software
Shan Lu, Joseph Tucek, Feng Qin, and Yuanyuan Zhou AVIO: Detecting Atomicity Violation Bugs via Access Interleaving Invariants
Karthik Pattabiraman, William Healey, Shane Ryoo, Zbigniew Kalbarczyk, Ravi Iyer, and Wen-mei Hwu Compiler Analysis Framework for Application-aware Trust
Ragib Hasan, Kazuhiro Minami, Zahid Anwar, Soumyadeb Mitra, and Marianne Winslett Context Based Automated Attribute Generation in Ubiquitous Systems
Roy H. Campbell, Ravinder Shankesi, Sundeep R. Katasani Cyber-Infrastructure Security
K. K. Bhamidipati, A. Naseri, N. A. Neogi, P. G. Voulgaris, and R. K. Iyer Designing Safety and Security into Aerospace Systems
Shravan Gaonkar and William H. Sanders Designing Storage Systems: An Optimization Approach Using Discrete Event Simulation
Shanshan Liu, Jun Park , N. Sri Namachchivaya, Pete Sauer, Kristjan Onu, and Vedran Coralic Detection of Hidden Vortices in Multi-sensor Environments
Ayesha Yasmeen and Elsa L. Gunter Formal Model for Secure Workflow in Assisted Living Project
A. Slagell, K. Lakkaraju, and X. Luo FLAIM: A New Tool for Log Anonymization
P. Klemperer, R. Farivar, P. Dabrowski, Z. Kalbarczyk, and R. Iyer Hardware Support for Providing Application Specific Security and Reliability in SCADA Systems
Yawei Li and Zhiling Lan Improving Failure Resilience of High Performance Applications
Michael Bloem, Tansu Alpcan, and Tamer Basar Intrusion Response as a Resource Allocation Problem
R. H. Campbell, E. M. Chan, C. Y. Jung, P. Reames, R. Bhardwaj, F. David, and J. Carlyle Isolation Using Virtualization on Mobile Devices
W. Conner and K. Nahrstedt Limiting Cheating and DoS Attacks in P2P Networks
Jin Liang, Indranil Gupta, and Klara Nahrstedt Management Overlay Networks (MON)
Zhenmin Li, Qingbo Zhu, Spiros Xanthos, Xiao Ma, Shan Lu, and Yuanyuan Zhou Mining Programmers' Intention for Defects in Large Software
Kaustubh R. Joshi, Matti A. Hiltunen, William H. Sanders, and Richard D. Schlichting Model-Driven Recovery in Distributed Systems
Adam J. Lee, Parisa Tabriz, and Nikita Borisov A Privacy-Preserving Interdomain Audit Framework
Jun H. Park, N. Sri Namachchivaya, William Phillips, and Richard Sowers Reduced Order Detection of Submerged Moving Bodies
Wenbo He, Ying Huang, and Klara Nahrstedt (UIUC) and Whay C. Lee (Motorola) A Scalable Public Key Management Scheme in Wireless Ad Hoc Networks for Mission-critical Applications
Samuel Nelson, Yih-Chun Hu, and Robin Kravets Secure Data Aggregation in Sensor Networks
Kazuhiro Minami and David Kotz Secure Distributed Proving System
Suvda Myagmar, Roy Campbell, and Marianne Winslett Security Issues in Deploying Software-Defined Radios in Power Grids
Rakesh Bobba, Meenal Pant, and Himanshu Khurana SELS: Secure Email List Services
Sruthi Bandhakavi, Charles C. Zhang, and Marianne Winslett Super-Sticky and Declassifiable Release Policies for Flexible Information Dissemination Control
W. Hwu, K. Joshi, R. Iyer, K. Nahrstedt, W. Sanders, and Z. Kalbarczyk Trusted ILLIAC: A Configurable, Application-Aware, High-Performance Platform for Trustworthy Computing