5th Workshop on Recent Advances in Intrusion-Tolerant Systems

WRAITS 2011

In conjunction with The 41th IEEE/IFIP International Conference on Dependable Systems and Networks - DSN 2011

June 27, 2011

Hong Kong, China

http://wraits11.di.fc.ul.pt/

OVERVIEW

The 5th edition of the Workshop on Recent Advances on Intrusion-Tolerant Systems aims to continue the collaborative discourse on the challenges of building intrusion-tolerant systems and innovative ideas to address them. Intrusion Tolerance combines theoretical aspects of Fault Tolerance and Security with the practical aspects of Systems and Software Engineering distributed (networked) computing systems.

 

Researchers and practitioners now agree that "intrusion free" or "unattackable" systems that are of any practical use are infeasible. As recent events such as April 2010 BGP Hijacking and Stuxnet indicate, networked computer based systems are increasingly susceptible to security incidents-- be it accidentally or maliciously induced. We need systems that can withstand, recover from and continue to provide meaningful service despite such incidents. This year's workshop will focus on all aspects of

security and dependability that facilitate prevention or minimization of the impact of such events on computing systems, and enable recovery and continued function even if the events succeed in causing some damage.

 

The workshop will provide a forum for researchers and practitioners to present designs, algorithms and architectures for intrusion tolerance, new security mechanisms or novel use of existing mechanisms, recent results, discuss open problems that still need research, and challenging survivability problems in specific application and domain areas.

 

Authors are invited to submit papers to the workshop, which will be held in conjunction with the 41st IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 27-30, 2011. Papers can present ongoing work and/or speculative/futuristic ideas. Experimental results or other forms of validation are especially encouraged. The workshop papers will be published in a supplementary volume of the conference proceedings.

Previous editions: WRAITS 2010, WRAITS 2009, WRAITS 2008, WRAITS 2007

 

PROGRAM

8:30-10:00 - Session 1: Distributed Systems

 

·         The Time-free approach to Byzantine Failure Detection in Dynamic Networks

Murilo Santos de Lima, Fabíola Greve, Luciana Arantes and Pierre Sens

Federal University of Bahia, Brazil and University of Paris 6, France

 

·         Managing Business Health in the Presence of Malicious Attacks

Saman A. Zonouz, Aashish Sharma, HariGovind V. Ramasamy, Zbigniew T. Kalbarczyk, Birgit Pfitzmann, Kevin McAuliffe, Ravishankar K. Iyer, William H. Sanders and Eric Cope

University of Illinois at Urbana-Champaign and IBM Research, USA

 

·         From Byzantine Fault Tolerance to Intrusion Tolerance (a Position Paper)

Alysson Bessani

University of Lisbon, Portugal

 

10:30-12:00 - Session 2: Intrusion Detection and Response

 

·         Anomaly-based Intrusion Detection in Software as a Service

Gustavo Nascimento and Miguel Correia

University of Lisbon, Portugal and Carnegie Mellon University, USA

 

·         Combining Intrusion Detection and Recovery for Enhancing System Dependability

Ajay Nagarajan, Quyen Nguyen, Robert Banks and Arun Sood

George Mason University and SCIT Labs, USA

 

·         A Cloud-based Intrusion Detection and Response System for Mobile Phones

Amir Houmansadr, Saman A. Zonouz and Robin Berthier

University of Illinois at Urbana-Champaign, USA

 

13:30-15:00 - Session 3: Security Assessment/Keynote speech

 

·         Continuous Mission-oriented Assessment (CMA) of Assurance

Patrick Hurley, Partha Pal, Mathew Tan Creti and Amy Fedyk

Air Force Reasearch Lab, BBN Technologies and Purdue University, USA

 

·         Keynote speech: Empirical Studies in Cybersecurity

This talk discusses how cybersecurity data (e.g., incidents, intrusion detection system alerts, network flows and malicious activity against a large range of honeypots) can be analyzed to evaluate the security of organizational networks.

Michel Cukier

University of Maryland, USA

 

 

TOPICS

Topics of interest related to advances in intrusion-tolerant systems include, but are not limited to:

 

* Adaptive security and adaptation for intrusion tolerance

* Assessment and evaluation of intrusion-tolerant systems

* Assurance and survivability benefits of hardware and software virtualization

* Automatic recovery and response techniques

* Biologically inspired defenses

* Byzantine fault tolerance

* Diversity and failure independence

* Intrusion tolerance in cyber-physical systems and critical infrastructures

* Intrusion-tolerant web-scale systems

* Survivability and information assurance in the Cloud

* Theoretical limits/boundaries of intrusion tolerance

* Threat of botnet herds and surviving them

* Real world case studies

More information about the workshop can be obtained by emailing to wraits11_AT_di.fc.ul.pt 

 

SUBMISSION INSTRUCTIONS

The workshop will accept two formats of papers: regular papers (maximum 6 pages) and position papers (maximum 2 pages). Position papers allow researchers to present more speculative/futuristic ideas to stimulate discussion and further work. Papers have to adhere to the IEEE Computer Society camera-ready 8.5”x11” two-column camera-ready format, like regular DSN papers:

Each paper should be submitted as a single PDF file through the submission website: https://www.softconf.com/c/wraits2011.

At least one author of an accepted paper must register at the conference and present the paper at the workshop.

 

IMPORTANT DATES

Submission deadline: March 22, 2010

Author notification: April 15, 2010

Final version: May 1, 2010

 

WORKSHOP ORGANIZERS

Alysson Bessani, University of Lisboa, Portugal
Partha Pal, BBN Technologies, USA

 

PROGRAM COMMITTEE

Byung-Gon Chun, Intel Labs Berkeley, USA

Miguel Correia, University of Lisboa, Portugal

Manuel Costa, Microsoft Research, UK

Ilir Gashi, City University of London, UK

Rüdiger Kapitza, University of Erlangen-Nürnberg, Germany

Patrick Kreidl, MIT, USA

Peng Liu, Penn State University, USA

Marco Serafini, Yahoo! Research, Spain

Arun Sood, George Mason University, USA

Paulo Verissimo, University of Lisboa, Portugal

Yu-Sung Wu, National Chiao Tung University, Taiwan

Saman Zonouz, University of Illinois, USA

 

SPONSORS

lasige-logo