3rd ITI Workshop on Dependability and Security: Opportunities and Challenges in Building an Overarching Community
December 5, 2006
Coordinated Science Laboratory
University of Illinois
Welcome to the web site for the December 5, 2006 ITI Workshop on Dependability and Security! This year's theme is "bringing together industry and academia."
Explosive growth in the number and complexity of computing systems requiring dependability and security in their operation is one of the most striking features of our technological and social landscape. That is particularly true for the critical applications and systems our society and economy depend on to function properly. Dependability and security are here understood as a system's general worthiness of being relied upon and trusted to the extent required, even under extreme conditions. Dependability involves the relevant application and system qualities, including fault tolerance, availability, performability, and robustness. Security, with its classic foundations in cryptography, involves issues relating to intrusion detection and tolerance, authentication, and firewall designs, as well as security-related protocols, modeling, and benchmarking. The interplay between dependability/security and performance is also involved in many critical application domains, such as critical infrastructure protection, aerospace, telecommunications, healthcare, and e-commerce. The expectation that modern, vast computing systems will be highly available and secure despite accidental failures and malicious attacks constitutes a major challenge for researchers, developers, and managers in the computing field.
Design of systems for dependability and security has assumed major importance in both government and commercial sectors, where there is a renewed interest in validation, verification, and measurement of various aspects of security, system survivability, fault tolerance, and performance. Furthermore, dependability, security, and performance have tended to be treated separately, despite the fact that the rigorous discipline of system design and analysis is best addressed by joint consideration of these issues, to allow for appropriate trade-offs.
The 3rd ITI Workshop on Dependability and Security built on the success of the previous workshops, held in 2004 and 2005. This year the workshop focused on the challenges and opportunities involved in the interplay of industry and academia in the field of dependable and secure computing. The workshop is sponsored by the Information Trust Institute (ITI) at Illinois, and will be held in the Coordinated Science Laboratory on the campus of the University of Illinois at Urbana-Champaign.
Registration has closed. Contact Jenny Applequist at applequiiti [dot] illinois [dot] edu for assistance.
The all-day workshop on Tuesday, December 5, 2006 included four panels of distinguished experts from industry and academia, plus a student poster session. The agenda is below. Follow the hyperlinks to see the slides presented.
||Registration and Continental Breakfast
||Panel 1, Core Technologies: George Cybenko (Dartmouth), Virgil Gligor (Univ. Maryland), Fred Schneider (Cornell), Neeraj Suri (TU Darmstadt), Paulo Veríssimo (Univ. Lisboa). Co-chairs: Saurabh Bagchi (Purdue, reporter) and Yuanyuan Zhou (UIUC, moderator).
||Panel 2, Enterprise Computing: E. N. (Mootaz) Elnozahy (IBM), Rich Friedrich (HP), Pratap Pattnaik (IBM), Lawrence Votta (Sun Microsystems). Co-chairs: Sean Smith (Dartmouth College, reporter) and Nikita Borisov (UIUC, moderator).
||Lunch and Poster Session
||Panel 3, End-to-End Architectures: Tom Bracewell (Raytheon), Rick Schantz (BBN), Rick Schlichting (AT&T), Paul Steinberg (Motorola), Alan Wood (Sun Microsystems). Co-chairs: Veena Mendiratta (Bell Labs, Lucent Technologies, reporter) and Steve Lumetta (UIUC, moderator).
||Panel 4, Assessment: Lorenzo Alvisi (Univ. Texas at Austin), Jean Arlat (LAAS-CNRS), Ronald Buskey (Motorola), Chad Hanson (Trusted Computer Solutions), Catherine Meadows (NRL). Co-chairs: Emre Kiciman (Microsoft Research, reporter) and Sam King (UIUC, moderator).
||Closing Discussion on Key Findings. William H. Sanders (UIUC) and Ravi K. Iyer (UIUC), moderators. Presentations summarizing the four panels, followed by plans for the future.
|D. M. Nicol, W. H. Sanders, S. Singh, M. Seri, and C. Grier
||APT: Access Policy Tool
|Yuanyuan Zhou, Zhenmin Li, Qingbo Zhu, Shan Lu, Joe Tucek, Spiros Xanthos, Lin Tan, Weihang Jiang, and Xiao Ma
||ARTS: Available, Robust and Trustworthy Software
|Shan Lu, Joseph Tucek, Feng Qin, and Yuanyuan Zhou
||AVIO: Detecting Atomicity Violation Bugs via Access Interleaving Invariants
|Karthik Pattabiraman, William Healey, Shane Ryoo, Zbigniew Kalbarczyk, Ravi Iyer, and Wen-mei Hwu
||Compiler Analysis Framework for Application-aware Trust
|Ragib Hasan, Kazuhiro Minami, Zahid Anwar, Soumyadeb Mitra, and Marianne Winslett
||Context Based Automated Attribute Generation in Ubiquitous Systems
|Roy H. Campbell, Ravinder Shankesi, Sundeep R. Katasani
|K. K. Bhamidipati, A. Naseri, N. A. Neogi, P. G. Voulgaris, and R. K. Iyer
||Designing Safety and Security into Aerospace Systems
|Shravan Gaonkar and William H. Sanders
||Designing Storage Systems: An Optimization Approach Using Discrete Event Simulation
|Shanshan Liu, Jun Park , N. Sri Namachchivaya, Pete Sauer, Kristjan Onu, and Vedran Coralic
||Detection of Hidden Vortices in Multi-sensor Environments
|Ayesha Yasmeen and Elsa L. Gunter
||Formal Model for Secure Workflow in Assisted Living Project
|A. Slagell, K. Lakkaraju, and X. Luo
||FLAIM: A New Tool for Log Anonymization
|P. Klemperer, R. Farivar, P. Dabrowski, Z. Kalbarczyk, and R. Iyer
||Hardware Support for Providing Application Specific Security and Reliability in SCADA Systems
|Yawei Li and Zhiling Lan
||Improving Failure Resilience of High Performance Applications
|Michael Bloem, Tansu Alpcan, and Tamer Basar
||Intrusion Response as a Resource Allocation Problem
|R. H. Campbell, E. M. Chan, C. Y. Jung, P. Reames, R. Bhardwaj, F. David, and J. Carlyle
||Isolation Using Virtualization on Mobile Devices
|W. Conner and K. Nahrstedt
||Limiting Cheating and DoS Attacks in P2P Networks
|Jin Liang, Indranil Gupta, and Klara Nahrstedt
||Management Overlay Networks (MON)
|Zhenmin Li, Qingbo Zhu, Spiros Xanthos, Xiao Ma, Shan Lu, and Yuanyuan Zhou
||Mining Programmers' Intention for Defects in Large Software
|Kaustubh R. Joshi, Matti A. Hiltunen, William H. Sanders, and Richard D. Schlichting
||Model-Driven Recovery in Distributed Systems
|Adam J. Lee, Parisa Tabriz, and Nikita Borisov
||A Privacy-Preserving Interdomain Audit Framework
|Jun H. Park, N. Sri Namachchivaya, William Phillips, and Richard Sowers
||Reduced Order Detection of Submerged Moving Bodies
|Wenbo He, Ying Huang, and Klara Nahrstedt (UIUC) and Whay C. Lee (Motorola)
||A Scalable Public Key Management Scheme in Wireless Ad Hoc Networks for Mission-critical Applications
|Samuel Nelson, Yih-Chun Hu, and Robin Kravets
||Secure Data Aggregation in Sensor Networks
|Kazuhiro Minami and David Kotz
||Secure Distributed Proving System
|Suvda Myagmar, Roy Campbell, and Marianne Winslett
||Security Issues in Deploying Software-Defined Radios in Power Grids
|Rakesh Bobba, Meenal Pant, and Himanshu Khurana
||SELS: Secure Email List Services
|Sruthi Bandhakavi, Charles C. Zhang, and Marianne Winslett
||Super-Sticky and Declassifiable Release Policies for Flexible Information Dissemination Control
|W. Hwu, K. Joshi, R. Iyer, K. Nahrstedt, W. Sanders, and Z. Kalbarczyk
||Trusted ILLIAC: A Configurable, Application-Aware, High-Performance Platform for Trustworthy Computing