Dependable Computing Systems Laboratory
Home Projects Publications Presentations People News Activities About DCSL Internal
 
Reading Group
Socials
 
 

Reading Group on Reliable & Secure System Design
2003 - Fall

 
Dates
Topic
Papers Presenter(s)

Presentation

Aug 28 Overview of research in DCSL None Saurabh Bagchi Presentation
Sep 4  

"Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS", Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi, ACSAC '03.

Saurabh Bagchi Presentation
Sep 11  

"Optimizing sensor networks in the energy-latency-density design space"
Curt Schurgers, Vlasios Tsiatsis, Saurabh Ganeriwal, and Mani Srivastava,
IEEE Transactions on Mobile Computing, Jan-Mar 2002.
Available at: http://www.janet.ucla.edu/~curts/papers/TMC02.pdf

Mark Krasniewski

Presentation
Sep 18  

"Observer-a concept for formal on-line validation of distributed systems"
M. Diaz, G. Juanole, J.-P. Courtiat, IEEE Transactions on Software Engg. Dec 1994

Padma Varadharajan

Presentation
Sep 25  

"Survivable Mobile Wireless Networks: Issues, Challenges, and Research Directions"
James P.G. Sterbenz, Rajesh Krishnan, Regina Rosales Hain, Alden W. Jackson, David Levin, Ram Ramanathan, and John Zao, ACM Workshop on Wireless Security (WiSe), 2002.
Available at: http://www.ir.bbn.com/~krash/pubs/sterbenz_wise02.pdf

Nipoon Malhotra

 
Oct 2  

"Route Driven Gossip: Probabilistic Reliable Multicast in Ad Hoc Networks"
Jun Luo, Patrick Th. Eugster, Jean-Pierre Hubaux, Infocom '03.
Available at: http://lcawww.epfl.ch/Publications/luo/luoEH03A.pdf

Padma Varadharajan

 
Oct 9  

Presentation of monitor based detection project

Gunjan Khanna, Padma Varadharajan

 
Oct 16  

Presentation of monitor based detection project

Gunjan Khanna, Padma Varadharajan

 
Oct 23  

Review of presentation for UIUC visit

Saurabh Bagchi

 
Oct 30  

"A taxonomy of wireless micro-sensor network models"

Sameer Tilak, Nael B. Abu-Ghazaleh, Wendi Heinzelman

April 2002, ACM SIGMOBILE Mobile Computing and Communications Review, Vol. 6 Issue 2
Available at: http://citeseer.nj.nec.com/tilak02taxonomy.html

   
Nov 6   "Queries and Aggregation: Computation hierarchy for in-network processing"
Ram Kumar, Vlasios Tsiatsis, Mani B. Srivastava
Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications, September 2003
Available from ACM Digital Library
   
Nov 13  

"Why 6? Defining the Operational Limits of stide, an Anomaly-Based Intrusion Detector."
Kymie M.C. Tan and Roy A. Maxion
IEEE Symposium on Security and Privacy , pages 188-201, Berkeley, California, 12-15 May 2002. Available at: http://www-2.cs.cmu.edu/afs/cs.cmu.edu/user/maxion/www/pubs/TanMaxion02.pdf

   
 
 

2003 - Spring

 

In this group we will be covering papers from a subset of the following topics. A list of papers is given at the end of the write-up:
1. Case studies of intrusion detection systems
    i) Theoretical work, e.g., by Wenke Lee
    ii) Practical work, e.g., the Prelude IDS
2. Security in ad-hoc or sensor networks
    i) Denial of service
    ii) Network layer issues
    iii) Cryptography
3. Case studies of fault tolerant computer systems
    E.g., Tandem's Integrity machine, TNET: a reliable system area network
4. Error detection techniques
    i) Control flow error detection
    ii) Watchdog processors
    iii) Hardware redundancy
5. Recovery techniques
    i) Rollback recovery using checkpoints
    ii) Rollback recovery in message passing multiprocessors
    iii) Forward recovery
6. Software reliability
    i) How often does software fail?
    ii) Why does software fail? (And from that maybe, what can be done about it?)
7. Estimation of reliability
    i) Reliability modeling, e.g., using combinatorial models
    ii) Availability modeling, e.g., using Markov models

 
Dates
Topic
Papers Presenter(s)

Presentation

Feb 4  

"A framework for constructing features and models for intrusion detection systems" by Lee and Stolfo
ACM Transactions on Information and System Security (TISSEC), Volume 3 Issue 4  (November 2000)

Saurabh Bagchi  
Feb 13 Overview of intrusion tolerance research in group

 

Saurabh Bagchi
Hank
 
Feb 20  

Lidong Zhou and Zygmunt J. Haas. Securing Ad Hoc Networks. IEEE Network, 13(6):24-30, 1999.
Anthony Wood, John A. Stankovic, "Denial of Service in Sensor Networks," IEEE Computer, 35(10):54-62, October 2002.

Nipoon Malhotra Presentation
Feb 27
Mar 6
Data Mining Approaches to Intrusion Detection

 

Serdar Cabuk Presentation
Mar 13  

Wenke Lee and Dong Xiang, "Information-Theoretic Measures for Anomaly Detection",
Proceedings of The 2001 IEEE Symposium on Security and Privacy, Oakland, CA, May 2001

Serdar Cabuk  
Apr 3  

"A Software Architecture to support Misuse Intrusion Detection", Sandeep Kumar and Eugene Spafford, Proceedings of the 18th National Information Security Conference, 1995

Hank Presentation
Apr 17 Cryptography protocols for sensor networks

 

Issa Khalil Presentation
Apr 24  

Zhen Xiao and K. Birman, "A Randomized Error Recovery Algorithm for Reliable Multicast", IEEE Infocom April 2001, Alaska.
Zhen Xiao, K.P. Birman, R. van Renesse, "Optimizing buffer management for reliable multicast", Proceedings of the International Conference on Dependable Systems and Networks (DSN 02), June 2002.

Nipoon Malhotra  
 
 
Here is the reading group information for other years:
2011

2010

2009

2008

2007

2006
2005
2004
2002
 
 
465 Northwestern Avenue, West Lafayette, IN 47907   |  dcsl@ecn.purdue.edu   |  +1 765 494 3510
Home |  Projects  |  Publications  |  Presentations  |  People
News  |  Activities |  About DCSL  |  Internal


Last Update: August 4, 2011 10:34 by GMHoward