5th Workshop on Recent Advances in
Intrusion-Tolerant Systems
WRAITS 2011
In conjunction with The 41th IEEE/IFIP International
Conference on Dependable Systems and Networks - DSN 2011
June 27, 2011
OVERVIEW
The 5th edition of the Workshop on Recent Advances on Intrusion-Tolerant
Systems aims to continue the collaborative discourse on the challenges of
building intrusion-tolerant systems and innovative ideas to address them.
Intrusion Tolerance combines theoretical aspects of Fault Tolerance and
Security with the practical aspects of Systems and Software Engineering
distributed (networked) computing systems.
Researchers and practitioners now agree that "intrusion free" or "unattackable"
systems that are of any practical use are infeasible. As recent events such as
April 2010 BGP Hijacking and Stuxnet indicate, networked computer based systems
are increasingly susceptible to security incidents-- be it accidentally or
maliciously induced. We need systems that can withstand, recover from and
continue to provide meaningful service despite such incidents. This year's
workshop will focus on all aspects of
security and dependability that facilitate prevention or minimization of
the impact of such events on computing systems, and enable recovery and
continued function even if the events succeed in causing some damage.
The workshop will provide a forum for researchers and practitioners to
present designs, algorithms and architectures for intrusion tolerance, new
security mechanisms or novel use of existing mechanisms, recent results,
discuss open problems that still need research, and challenging survivability
problems in specific application and domain areas.
Authors are invited to submit papers to the workshop, which will be held
in conjunction with the 41st IEEE/IFIP International Conference on Dependable
Systems and Networks (DSN), June 27-30, 2011. Papers can present ongoing work
and/or speculative/futuristic ideas. Experimental results or other forms of
validation are especially encouraged. The workshop papers will be published in
a supplementary volume of the conference proceedings.
Previous editions: WRAITS 2010,
WRAITS 2009, WRAITS 2008, WRAITS 2007
PROGRAM
8:30-10:00 - Session 1: Distributed
Systems
·
The Time-free approach to Byzantine
Failure Detection in Dynamic Networks
Murilo Santos de Lima,
Fabíola Greve, Luciana Arantes and Pierre Sens
Federal University of Bahia, Brazil and University of
Paris 6, France
·
Managing
Business Health in the Presence of Malicious Attacks
Saman
A. Zonouz, Aashish Sharma, HariGovind V. Ramasamy, Zbigniew T. Kalbarczyk,
Birgit Pfitzmann, Kevin McAuliffe, Ravishankar K. Iyer, William H. Sanders and
Eric Cope
University of Illinois at Urbana-Champaign and IBM
Research, USA
·
From
Byzantine Fault Tolerance to Intrusion Tolerance (a Position Paper)
Alysson
Bessani
University of Lisbon, Portugal
10:30-12:00 - Session 2: Intrusion
Detection and Response
·
Anomaly-based Intrusion Detection in
Software as a Service
Gustavo Nascimento and Miguel
Correia
University of Lisbon, Portugal and Carnegie Mellon
University, USA
·
Combining
Intrusion Detection and Recovery for Enhancing System Dependability
Ajay
Nagarajan, Quyen Nguyen, Robert Banks and Arun Sood
George Mason University and SCIT Labs, USA
·
A
Cloud-based Intrusion Detection and Response System for Mobile Phones
Amir
Houmansadr, Saman A. Zonouz and Robin Berthier
University of Illinois at Urbana-Champaign, USA
13:30-15:00 - Session 3: Security
Assessment/Keynote speech
·
Continuous
Mission-oriented Assessment (CMA) of Assurance
Patrick
Hurley, Partha Pal, Mathew Tan Creti and Amy Fedyk
Air Force Reasearch Lab, BBN Technologies and Purdue
University, USA
·
Keynote speech: Empirical Studies in Cybersecurity
This talk discusses how cybersecurity data
(e.g., incidents, intrusion detection system alerts, network flows and
malicious activity against a large range of honeypots) can be analyzed to
evaluate the security of organizational networks.
University of Maryland, USA
TOPICS
Topics of interest related to advances in intrusion-tolerant systems
include, but are not limited to:
* Adaptive security and adaptation for intrusion tolerance
* Assessment and evaluation of intrusion-tolerant systems
* Assurance and survivability benefits of hardware and software
virtualization
* Automatic recovery and response techniques
* Biologically inspired defenses
* Byzantine fault tolerance
* Diversity and failure independence
* Intrusion tolerance in cyber-physical systems and critical
infrastructures
* Intrusion-tolerant web-scale systems
* Survivability and information assurance in the Cloud
* Theoretical limits/boundaries of intrusion tolerance
* Threat of botnet herds and surviving them
* Real world case studies
More information about the workshop can be obtained by
emailing to wraits11_AT_di.fc.ul.pt
SUBMISSION INSTRUCTIONS
The workshop will accept
two formats of papers: regular papers (maximum 6 pages) and position
papers (maximum 2 pages). Position papers allow researchers to present more
speculative/futuristic ideas to stimulate discussion and further work. Papers
have to adhere to the IEEE Computer Society camera-ready 8.5”x11” two-column
camera-ready format, like regular DSN papers:
Each paper should be submitted as a single PDF file through the submission website: https://www.softconf.com/c/wraits2011.
At least one author of
an accepted paper must register at the conference and present the paper at the
workshop.
IMPORTANT DATES
Submission deadline: March 22, 2010
Author notification: April
15, 2010
Final version: May 1, 2010
WORKSHOP ORGANIZERS
Alysson Bessani, University of Lisboa, Portugal
Partha Pal, BBN Technologies, USA
PROGRAM COMMITTEE
Byung-Gon Chun, Intel Labs Berkeley, USA
Miguel Correia, University of
Lisboa, Portugal
Manuel Costa, Microsoft Research, UK
Ilir Gashi, City University of London, UK
Rüdiger Kapitza, University of Erlangen-Nürnberg, Germany
Patrick Kreidl, MIT, USA
Peng Liu, Penn State University, USA
Marco Serafini, Yahoo! Research, Spain
Arun Sood, George Mason University, USA
Paulo Verissimo, University
of Lisboa, Portugal
Yu-Sung Wu, National Chiao Tung University, Taiwan
Saman Zonouz, University of Illinois, USA
SPONSORS