The Community for Technology Leaders
Foundations of Intrusion Tolerant Systems (2003)
Dec. 2, 2003 to Dec. 2, 2003
ISBN: 0-7695-2057-X
TABLE OF CONTENTS
Introduction

Preface (PDF)

pp. viii

Introduction (PDF)

pp. x

Bibliography (PDF)

pp. 426
Intrusion Tolerant Databases

Architectures for Intrusion Tolerant Database Systems (Abstract)

Peng Liu , Pennsylvania State University
pp. 3
Proof-Carrying Code

Foundational Proof-Carrying Code (Abstract)

Andrew W. Appel , Princeton University
pp. 25

Type-Preserving Compilation of Featherweight Java (Abstract)

Christopher League , Yale University
Zhong Shao , Yale University
Valery Trifonov , Yale University
pp. 35

A Type System for Certified Binaries (Abstract)

Zhong Shao , Yale University
Valery Trifonov , Yale University
Bratin Saha , Yale University
Nikolaos Papaspyrou , Yale University
pp. 60
Certification Authorities

Protecting Privacy Using the Decentralized Label Model (Abstract)

Andrew C. Myers , Cornell University
Barbara Liskov , Massachusetts Institute of Technology.
pp. 89

Enforceable Security Policies (Abstract)

Fred B. Schneider , Cornell University
pp. 117

Untrusted Hosts and Confidentiality: Secure Program Partitioning (Abstract)

Nathaniel Nystrom , Cornell University
Lantian Zheng , Cornell University
Andrew C. Myers , Cornell University
Steve Zdancewic , Cornell University
pp. 138

COCA: A Secure Distributed Online Certification Authority (Abstract)

Robert van Renesse , Cornell University
Lidong Zhou , Microsoft Research
Fred B. Schneider , Cornell University
pp. 152
Intrusion Tolerant Storage

Self-Securing Storage: Protecting Data in Compromised Systems (Abstract)

Craig A.N. Soules , Carnegie Mellon University
Garth R. Goodson , Carnegie Mellon University
Gregory R. Ganger , Carnegie Mellon University
Michael L. Scheinholtz , Carnegie Mellon University
John D. Strunk , Carnegie Mellon University
pp. 195
Linux Security

Linux Security Modules: General Security Support for the Linux Kernel (Abstract)

Crispin Cowan , WireX Communications, Inc.
Greg Kroah-Hartman , IBM Linux Technology Center
Stephen Smalley , Network Associates, Inc.
James Morris , Intercode Pty Ltd
Chris Wright , WireX Communications, Inc.
pp. 213

Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade (Abstract)

Crispin Cowan , Oregon Graduate Institute of Science & Technology
Steve Beattie , Oregon Graduate Institute of Science & Technology
Jonathan Walpole , Oregon Graduate Institute of Science & Technology
Calton Pu , Oregon Graduate Institute of Science & Technology
Perry Wagle , Oregon Graduate Institute of Science & Technology
pp. 227
Group Communications

Quantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems (Abstract)

Michel Cukier , University of Maryland at College Park
HariGovind V. Ramasamy , University of Illinois at Urbana-Champaign
Prashant Pandey , IBM Almaden Research Center
James Lyons , University of Illinois at Urbana-Champaign
William H. Sanders , University of Illinois at Urbana-Champaign
pp. 241

Formal Specification and Verification of a Group Membership Protocol for an Intrusion-Tolerant Group Communication System (Abstract)

William H. Sanders , University of Illinois at Urbana-Champaign
Michel Cukier , University of Maryland at College Park
HariGovind V. Ramasamy , University of Illinois at Urbana-Champaign
pp. 251

Survival by Defense-Enabling (Abstract)

Richard Schantz , BBN Technologies LLC
Franklin Webber , BBN Technologies LLC
Partha Pal , BBN Technologies LLC
pp. 261
System Reconfiguration

Protection of Software-Based Survivability Mechanisms (Abstract)

John Knight , University of Virginia
Jack Davidson , Microsoft Research
Jonathan Hill , University of Virginia
Chenxi Wang , University of Virginia
pp. 273

Design and Evaluation of a Wide-Area Event Notification Service (Abstract)

David S. Rosenblum , University of California at Irvine
Alexander L. Wolf , University of Colorado at Boulder
Antonio Carzaniga , University of Colorado at Boulder
pp. 283
Mobile-Code Security

Making Mobile Code Both Safe and Efficient (Abstract)

Wolfram Amme , University of California at Irvine
Jeffery von Ronne , University of California at Irvine
Matthew Beers , University of California at Irvine
Michael Franz , University of California at Irvine
Peter H. Fröhlich , University of California at Irvine
Vivek Haldar , University of California at Irvine
Sergiy Zhenochin , University of California at Irvine
Peter S. Housel , University of California at Irvine
Fermín Reig , University of California at Irvine
Christian H. Stork , University of California at Irvine
Niall Dalton , University of California at Irvine
Andreas Hartmann , University of California at Irvine
pp. 337
Intrusion Tolerant Servers

SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services (Abstract)

Frank Jou , MCNC
Chandramouli Sargor , CoSine Communications, Inc.
Kishor Trivedi , Duke University
Feiyi Wang , MCNC
Fengmin Gong , IntruVert Network Inc.
pp. 359

The Design and Implementation of an Intrusion Tolerant System (Abstract)

Larry Clough , Teknowledge Corporation
Ed Lawson , Teknowledge Corporation
Ryan Maglich , Teknowledge Corporation
James Just , Teknowledge Corporation
James Reynolds , Teknowledge Corporation
Karl Levitt , University of California at Davis
pp. 368

Learning Unknown Attacks — A Start (Abstract)

Ryan Maglich , Teknowledge Corporation
James E. Just , Global InfoTek, Inc
Melissa Danforth , University of California at Davis
Karl N. Levitt , University of California at Davis
Larry A. Clough , Teknowledge Corporation
Jeff Rowe , University of California at Davis
James C. Reynolds , Teknowledge Corporation
pp. 374

Developing a Heterogeneous Intrusion Tolerant CORBA System (Abstract)

David Bakken , Washington State University
Brent Whitmore , Network Associates, Inc
David Sames , Network Associates, Inc
Gregg Tally , Network Associates, Inc
Brian Niebuhr , Network Associates, Inc
Brian Matt , Network Associates, Inc
pp. 387
Wrappers

Hardening COTS Software with Generic Software Wrappers (Abstract)

Timothy Fraser , Network Associates Labs
Mark Feldman , Network Associates Labs
Lee Badger , Network Associates Labs
pp. 399

Detecting and Countering System Intrusions Using Software Wrappers (Abstract)

Douglas Kilpatrick , Network Associates Labs
Timothy Fraser , Network Associates Labs
Calvin Ko , Network Associates Labs
Lee Badger , Network Associates Labs
pp. 414
Author Index

Author Index (PDF)

pp. 435
90 ms
(Ver )