Dependable Computing Systems Laboratory
Home Projects Publications Presentations People News Activities About DCSL Internal
Reading Group

Reading Group on Reliable & Secure System Design
2003 - Fall

Papers Presenter(s)


Aug 28 Overview of research in DCSL None Saurabh Bagchi Presentation
Sep 4  

"Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS", Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi, ACSAC '03.

Saurabh Bagchi Presentation
Sep 11  

"Optimizing sensor networks in the energy-latency-density design space"
Curt Schurgers, Vlasios Tsiatsis, Saurabh Ganeriwal, and Mani Srivastava,
IEEE Transactions on Mobile Computing, Jan-Mar 2002.
Available at:

Mark Krasniewski

Sep 18  

"Observer-a concept for formal on-line validation of distributed systems"
M. Diaz, G. Juanole, J.-P. Courtiat, IEEE Transactions on Software Engg. Dec 1994

Padma Varadharajan

Sep 25  

"Survivable Mobile Wireless Networks: Issues, Challenges, and Research Directions"
James P.G. Sterbenz, Rajesh Krishnan, Regina Rosales Hain, Alden W. Jackson, David Levin, Ram Ramanathan, and John Zao, ACM Workshop on Wireless Security (WiSe), 2002.
Available at:

Nipoon Malhotra

Oct 2  

"Route Driven Gossip: Probabilistic Reliable Multicast in Ad Hoc Networks"
Jun Luo, Patrick Th. Eugster, Jean-Pierre Hubaux, Infocom '03.
Available at:

Padma Varadharajan

Oct 9  

Presentation of monitor based detection project

Gunjan Khanna, Padma Varadharajan

Oct 16  

Presentation of monitor based detection project

Gunjan Khanna, Padma Varadharajan

Oct 23  

Review of presentation for UIUC visit

Saurabh Bagchi

Oct 30  

"A taxonomy of wireless micro-sensor network models"

Sameer Tilak, Nael B. Abu-Ghazaleh, Wendi Heinzelman

April 2002, ACM SIGMOBILE Mobile Computing and Communications Review, Vol. 6 Issue 2
Available at:

Nov 6   "Queries and Aggregation: Computation hierarchy for in-network processing"
Ram Kumar, Vlasios Tsiatsis, Mani B. Srivastava
Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications, September 2003
Available from ACM Digital Library
Nov 13  

"Why 6? Defining the Operational Limits of stide, an Anomaly-Based Intrusion Detector."
Kymie M.C. Tan and Roy A. Maxion
IEEE Symposium on Security and Privacy , pages 188-201, Berkeley, California, 12-15 May 2002. Available at:


2003 - Spring


In this group we will be covering papers from a subset of the following topics. A list of papers is given at the end of the write-up:
1. Case studies of intrusion detection systems
    i) Theoretical work, e.g., by Wenke Lee
    ii) Practical work, e.g., the Prelude IDS
2. Security in ad-hoc or sensor networks
    i) Denial of service
    ii) Network layer issues
    iii) Cryptography
3. Case studies of fault tolerant computer systems
    E.g., Tandem's Integrity machine, TNET: a reliable system area network
4. Error detection techniques
    i) Control flow error detection
    ii) Watchdog processors
    iii) Hardware redundancy
5. Recovery techniques
    i) Rollback recovery using checkpoints
    ii) Rollback recovery in message passing multiprocessors
    iii) Forward recovery
6. Software reliability
    i) How often does software fail?
    ii) Why does software fail? (And from that maybe, what can be done about it?)
7. Estimation of reliability
    i) Reliability modeling, e.g., using combinatorial models
    ii) Availability modeling, e.g., using Markov models

Papers Presenter(s)


Feb 4  

"A framework for constructing features and models for intrusion detection systems" by Lee and Stolfo
ACM Transactions on Information and System Security (TISSEC), Volume 3 Issue 4  (November 2000)

Saurabh Bagchi  
Feb 13 Overview of intrusion tolerance research in group


Saurabh Bagchi
Feb 20  

Lidong Zhou and Zygmunt J. Haas. Securing Ad Hoc Networks. IEEE Network, 13(6):24-30, 1999.
Anthony Wood, John A. Stankovic, "Denial of Service in Sensor Networks," IEEE Computer, 35(10):54-62, October 2002.

Nipoon Malhotra Presentation
Feb 27
Mar 6
Data Mining Approaches to Intrusion Detection


Serdar Cabuk Presentation
Mar 13  

Wenke Lee and Dong Xiang, "Information-Theoretic Measures for Anomaly Detection",
Proceedings of The 2001 IEEE Symposium on Security and Privacy, Oakland, CA, May 2001

Serdar Cabuk  
Apr 3  

"A Software Architecture to support Misuse Intrusion Detection", Sandeep Kumar and Eugene Spafford, Proceedings of the 18th National Information Security Conference, 1995

Hank Presentation
Apr 17 Cryptography protocols for sensor networks


Issa Khalil Presentation
Apr 24  

Zhen Xiao and K. Birman, "A Randomized Error Recovery Algorithm for Reliable Multicast", IEEE Infocom April 2001, Alaska.
Zhen Xiao, K.P. Birman, R. van Renesse, "Optimizing buffer management for reliable multicast", Proceedings of the International Conference on Dependable Systems and Networks (DSN 02), June 2002.

Nipoon Malhotra  
Here is the reading group information for other years:





465 Northwestern Avenue, West Lafayette, IN 47907   |   |  +1 765 494 3510
Home |  Projects  |  Publications  |  Presentations  |  People
News  |  Activities |  About DCSL  |  Internal

Last Update: August 4, 2011 10:34 by GMHoward