High order bits from SOS discussions:

Fred Schneider (Cornell) 

CARL LANDWEHR - intrusion det

CATEGORY-PRESERVING PRIVACY

SURVIVABILITY ON THE INTERNET

COMMENTS ON SOS-RADS TALK

Wormholes

Martin and Alvisi, fast byzantine consensus:

Forwarding in the face of malicious routers (Savage et al. UCSD)

SECURE SPECULATIVE REMOTE EXECUTION Bennet Yee, Google

Selected notes from DSN 2004

FAB ppr and M-quorums: Dstore guaranees linearizability; delayed-commit is alloed. FAB enforces strict linearizability, which requires that a partial write be eiher committed orrolld back on thevery next read ofthe data (not at soe arbitrary future time). To achieve this,they use m-quorums -- quorums that intersect in m members rather than injust 1. Algss are in the ppr as are some interesting refs.

DEFENSE-CENTRIC ATTACK TAXONOMY

Roy Maxion's grp (see also their STIDE work and the biblio tothis ppr)

CHECKPOINTING INTERNAL DATA STRUCTURES IN MAIN MEM DB'S (Kalbarczyk,Iyer et al)

PROACTIVE RECOVERY IN DISTRIB CORBA APPS

Basically replicates the memory leak/proactive microrejuv sec of Geo's OSDI ppr, but in CORBA ratherthan J2ee.

SECURE DISTRIBUTED DNS (Cachin)

Use optimistic atomic bcast (reqires Byzantine-resistant leader election) to order reads/writes among DNS peers (don't do master-slave dissemination). Client gets N replies and uses majorityvoting to select right one. For signing DNSupdates, use threshold crypto to avoid leaking the secret sining key to a corrupt server.