SUNDAY, JUNE 25
|
07:30-08:00
| Tutorial Registration [Conference Lobby]
|
08:00-12:00
(30-min coffee break at 10:00)
|
Parallel Tutorials
Tutorial 1 [Room A1]
Reliability-Aware Microprocessor Architectures
Sarita Adve and Pradip Bose,
University of Illinois and IBM TJ Watson Research
- Click for detailed description.
In this tutorial, we present the foundational principles and
methodologies behind the design of microprocessors that meet
market-driven reliability targets, in the face of technological
constraints offered by the late CMOS era. The stress is on
early-stage (pre-RTL) definition at the microarchitecture level,
although relevant details from lower levels of design (e.g.
logic, circuits and below) are also covered where appropriate. In
particular, in order to explain the methodology for modeling the
effects of failures at the microarchitectural level, we delve
into some details of the actual physical failure mechanisms, and
the models that govern their onset and propagation.
We first cover the topic of pre-silicon modeling to estimate
performance, power, temperature and reliability, in the context
of target workloads of interest to the design team. While
estimating failure rates and mean time to failure (MTTF), we
consider the effects of hard (or permanent) failures, as well as
soft (or transient) errors. We address the issues of modeling
accuracy and validation in some detail. In particular, we examine
the basic axioms that guide alternate modeling methodologies, and
discuss the range of validity of these assumptions. We also touch
on the important topic of reliability "metrics": we discuss the
issue of defining appropriate metrics to quantify a given index
of reliability, and the need to guard against fallacies and
pitfalls when trying to interpret a projected reliability value.
Subsequently, we cover the topic of reliability-aware design at
the microarchitectural level. We discuss power-, area- and
performance-efficient approaches to provide temporal and/or
spatial redundancy support in order to meet required reliability
targets. We also discuss adaptive microarchitectures: those that
are designed to change with variations in the workload, with the
goal of maximizing one or more of: reliability, power-temperature
efficiency and performance. In discussing each topic area within
the tutorial, we provide a brief survey of past techniques and
results, before providing in-depth coverage of more recently
published methodologies.
Tutorial 2 [Room A2]
Dependable Computing over Sensor Networks
Shivkant Mishra,
University of Colorado
- Click for detailed description.
Wireless sensor networks are rapidly growing in their importance and
relevance to both the research community and the public at large. In
a wireless sensor network, a distributed collection of sensor nodes
forms a network interconnected by wireless communication links. Each
sensor node acts as information source, sensing and colleting data
samples from its environment. Sensor nodes perform routing functions,
creating a multi-hop wireless networking fabric that relays data
samples to other sensor nodes and to external destinations.
Applications of wireless sensor networks are numerous, diverse, and
growing. They range from habitat monitoring to indoor monitoring of
semiconductor fabrication processes, and from counter-sniper
localization on battlefields to search and rescue operations. In each
of these application scenarios, lives and livelihoods may depend on
the timeliness and correctness of the sensor data obtained from
dispersed sensor nodes.
The main objective of this tutorial is to provide an in-depth
coverage of design and implementation issues in building a dependable
wireless sensor network, and cover the current state-of-the-art of
this promising technology. The tutorial will first provide a basic
introduction to the wireless sensor networks, and then cover five
important technical issues in the design and implementation of a
dependable wireless sensor network. These five issues are
cryptographic key management, secure and intrusion-tolerant routing,
secure in-network processing, secure dynamic reprogramming, and
prevention against traffic analysis attacks.
Because of the importance and sensitivity of tasks performed by
wireless sensor networks, a wireless sensor network is a target of
adversaries. There are many security threats to wireless sensor
networks. An adversary can prevent users from getting correct data
from sensor nodes by modifying the contents of the packets, or
spoofing the identity of the sensor nodes. An adversary can block
communication between a base station and sensor nodes by creating
false routing information, or simply generating jamming signals. An
adversary can gain control of an entire sensor network by spoofing
the identity of a base station. An adversary can compromise a sensor
node, get all information from that node, and can even re-program it
to behave like a malicious node.
The design and implementation of a dependable wireless sensor network
must simultaneously address three research challenges: (1) Resource
constraints of sensor nodes in terms of low power, low memory, slower
CPU, and limited communication bandwidth; (2) Vulnerability of
wireless communication to eavesdropping, unauthorized access,
spoofing, replay, and denial of service attacks; and (3) Added
physical security risk of individual sensor nodes falling into the
wrong hand and be compromised.
This tutorial will discuss some of the latest techniques that have
been proposed to address these research challenges. Finally, a case
study of a search-and-rescue application built using a wireless
sensor network will be done.
Tutorial 3 [Room E]
More Reliable Software Faster and Cheaper
John Musa,
Consultant
- Click for detailed description.
Stressed out by competitive pressures to deliver more reliable
software faster and cheaper? Want to control the process rather
than have it control you? Software reliability engineering
(SRE), a practice primarily developed on the job in industry, can
help. This unique tutorial will teach you the essentials of how
to apply it.
SRE is based on two powerful ideas:
-
Quantitatively characterize expected use and then focus
resources on most used and/or most critical functions. This
increases development efficiency and hence effective resource
pool available to add customer value to product.
-
Further increase customer value by setting quantitative
reliability objectives that precisely balance customer needs
for reliability, timely delivery, and cost; engineer project
strategies to meet them; and track reliability in test as a
release criterion
SRE is a standard, proven best practice. It applies not only to
software reliability but to dependability and safety as well.
You can apply it to any system using software and to members of
software component libraries. And you can start with the next
release.
|
12:00-13:30
| Lunch for Tutorial Attendees
|
13:30-17:30
(30-min coffee break at 15:30)
|
Parallel Tutorials
[Note: Tutorial 4 has been cancelled.]
Tutorial 4
Architecture Level Evaluation of Soft Errors
Shubu Mukherjee,
Intel Corp.
- Click for detailed description.
Tutorial contents:
- The Soft Error problem & Motivation (45 minutes)
- AVF (arch. vulnerability factor) Basics (30 minutes)
- Computing AVF using Statistical Fault Injection (15 minutes)
- Computing AVF using ACE & lifetime analysis (30 minutes)
- Computing AVF of Address-Based Structures (30 minutes)
- Examples & Results (15 minutes)
- AVF Reduction Techniques (30 minutes)
- Future use of AVF techniques (15 minutes)
- Open discussion (15 minutes)
[Note: Tutorial 5 has been cancelled.]
Tutorial 5
Erasure Codes for Fault Tolerant Storage
James S. Plank,
University of Tennessee
- Click for detailed description.
Tutorial contents:
- To introduce you to the various erasure coding techniques.
- Reed Solomon codes.
- Parity-array codes.
- LDPC codes.
- To help you understand their tradeoffs.
- To help you evaluate your coding needs.
- This too is not straightforward.
Tutorial 6 [Room E]
Software Dependability: What You Didn't Learn in Kindergarten
John C. Knight and Elisabeth Strunk,
University of Virginia
- Click for detailed description.
This tutorial will discuss a number of important topics in
software system dependability with a heavy emphasis on their
practical relevance. The focus will be an example application
domain, digital avionics. Starting with a brief summary of that
domain, the tutorial will explore several topics including: (1)
Basic principles of software dependability; (2) the practical use
of formal specification in real systems using Z and VDM; (3) the
practical use of formal verification; (4) static analysis and the
associated role of the programming language; (5) the assessment
of software systems by statistical means and safety cases; and
(6) the role of standards.
This tutorial will be of interest to engineers and managers
engaged in the development of software systems for high-assurance
applications in all domains. No prior technical knowledge is
assumed beyond what the attendee learned in kindergarten.
|
18:00-20:00
|
Conference Registration [Conf. Lobby] & Welcome Reception [Hotel
Lobby]
|
|
MONDAY, JUNE 26
|
08:30-10:00
|
Opening Remarks and Keynote Address
Dr. Ambuj Goyal,
General Manger, Information Management Division, IBM
"Delivering Dependability: A Moving Target"
- Click for detailed description.
Are we thinking broadly enough about dependable systems? Just what
are the most influential factors that contribute to dependability?
Is it the manufacturing process? Is it circuit design? Or
software design? Or network capacity? The answer could be none of
these and most certainly it's changed dramatically from even five
years ago. Technology and best practices around its use have
evolved to the point where dependable systems are gated by factors
that go far beyond one's normal purview. Today, political,
cultural and societal issues may well have an equal if not greater
impact. We must challenge ourselves to consider all the dimensions
of today's world and think about non-obvious relationships. This
keynote will challenge the audience to think outside the box and
consider the realities of today's world and its impact on
dependable systems.
|
10:00-10:30
| Coffee Break
|
10:30-12:00
|
DCCS
Session 1A: Real-Time and Embedded Systems
Chair: Johan Karlsson
Efficient High Hamming Distance CRCs for Embedded Networks
Justin Ray and Philip Koopman
Memory-Conscious Reliable Execution on Embedded Chip Multiprocessors
G. Chen, M. Kandemir and I. Kolcu
Static Analysis to Enforce Safe Value Flow in Embedded Control Systems
Sumant Kowshik, Grigore Rosu and Lui Sha
|
PDS
Session 1B: Dependable Storage
Chair: Zbigniew Kalbarczyk
Dependability Analysis of Virtual Memory Systems
Lakshmi N. Bairavasundaram, Andrea C. Arpaci-Dusseau and Remzi H. Arpaci-Dusseau
Assessment of the Effect of Memory Page Retirement on System RAS Against Hardware Faults
Dong Tang, Peter Carruthers, Zuheir Totari and Michael Shapiro
Designing Dependable Storage Solutions for Shared Application Environments
Shravan Gaonkar, Kimberly Keeton, Arif Merchant and William H. Sanders
|
Industry Session
Session 1C
Moderator: Brendan Murphy
The Other Side of Failure!
Jim Johnson, Standish Group
Dependable Computing: A System Perspective
Wendy Bartlett, Hewlett Packard
- Click for detailed description.
The industrial day has been organized to bring together experts - both
computer system vendors and customers - to discuss the hot topics of
today.
The workshop begins with a consultant's view of availability in the real
world, "The Other Side of Failure!", given by Jim Johnson. Jim is the
Chairman of the Standish Group International. Next, Wendy Bartlett from
Hewlett Packard will give a system vendor's view of what it takes to
deliver dependable computing (hint: it has at least as much to do with
people and processes as with technology), "Dependable Computing: A System
Perspective".
At this point in the proceedings, we'll hear from the people who are
solving their businesses' problems by delivering dependable computing.
|
Workshop 1 on Applied Software Reliability (WASR)
Session 1D
Chair: Sachin Garg
Reliable Multicast for Time-Critical Systems
M. Balakrishnan and K. Birman
Reliability Requirements of Wireless Sensor Networks for Dynamic Structural Monitoring
M. Cinque, D. Cotroneo, G. De Caro and M. Pelella
Reliability Requirements for Infrastructure System Sensor Networks
M. Bigrigg
Panel: "Reliability Requirements for Emerging Applications"
|
12:00-13:30
| Lunch Break
|
13:30-15:30
|
DCCS
Session 2A: Safety-Critical Systems
Chair: Neeraj Suri
The Startup Problem in Fault-Tolerant Time-Triggered Communication
Wilfried Steiner and Hermann Kopetz
A Reconfigurable Generic Dual-Core Architecture
Thomas Kottke and Andreas Steininger
A Dependable System Architecture for Safety-Critical Respiratory-Gated Radiation Therapy
Gregory Sharp and Nagarajan Kandasamy
User Interface Defect Detection by Hesitation Analysis
Robert W. Reeder and Roy A. Maxion
|
PDS
Session 2B: Attack Prevention and Mitigation
Chair: Paulo Verissimo
A Statistical Analysis of Attack Data to Separate Attacks
Michel Cukier, Robin Berthier, Susmit Panjwani and Stephanie Tan
VoIP Intrusion Detection Through Protocol State Machines
Hemant Sengar, Duminda Wijesekera, Haining Wang and Sushil Jajodia
Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter
Chun-Ying Huang, Kuan-Ta Chen and Chin-Laung Lei
Accurate and Automated System Call Policy-Based Intrusion
Prevention
Lap Chung Lam, Wei Li and Tzi-cker Chiueh
|
Industry Session
Session 2C
Moderator: Ram Chillarege
Panel: "Minimizing the Effects of Murphy's Law"
Siddhartha Alladi, Alladi Computing;
Jeremy Winter, MSN;
Fabrizio Petrini, Pacific National Lab;
Robert Cline, Sun Gard;
Rob Lesan, AOL;
Wesley Story, Sprint
- Click for detailed description.
A panel of people who support operational environments will discuss
their successes and challenges in the day-to-day support of their
companies' IT needs in "Minimizing the Effects of Murphy's Law".
It is here where the ultimate performance and dependability of
systems is experienced, and the frailties and surprises of the real
world put them to the test. The panel is comprised of experts from
a diverse set of industries who will share their accomplishments,
challenges, and wisdom.
|
Workshop 1 on Applied Software Reliability (WASR)
Session 2D
Chair: Yennun Huang
Predicting Field Defects Based on Software Test Results
V.B. Mendiratta and J.M. Souza
Providing Automated Detection of Problems in Virtualized Servers using Monitor framework
G. Khanna, S. Bagchi, K. Beaty, A. Kochut and G. Ken
How the Hidden Hand Shapes the Market for Software Reliability
K. Birman, C. Chandersekaran, D. Dolev and R. van Renesse
Model-Centric Development of Highly Available Software Systems
R.W. Buskens and O.J. Gonzalez
Panel: "The Quest for Reliable Software: Paradigms and Factors Driving Industry"
|
15:30-16:00
| Coffee Break
|
16:00-17:30
|
DCCS
Session 3A: Architecture and Operating Systems
Chair: A. J. Kleinosowski
Dynamic Verification of Memory Consistency in Cache-Coherent Multithreaded Computer Architectures
Albert Meixner and Daniel J. Sorin
Automatic Instruction-Level Software-Only Recovery Methods
Jonathan Chang, George A. Reis and David I. August
Exploring Fault-Tolerant Network-on-Chip Architectures
Dongkook Park, Chrysostomos Nicopoulos, Jongman Kim, N. Vijaykrishnan and Chita R. Das
|
PDS
Session 3B: Dependability Models
Chair: Boudewijn Haverkort
BlueGene/L Failure Analysis and Prediction Models
Yinglung Liang, Yanyong Zhang, Morris Jette, Anand Sivasubramaniam and Ramendra Sahoo
Performance Assurance via Software Rejuvenation: Monitoring, Statistics and Algorithms
Alberto Avritzer, Andre Bondi, Michael Grottke, Kishor Trivedi and Elaine J. Weyuker
Automatic Recovery Using Bounded Partially Observable Markov Decision Processes
Kaustubh R. Joshi, Matti A. Hiltunen, William H. Sanders and Richard D. Schlichting
|
Industry Session
Session 3C
Moderator: Lisa Spainhower
Panel: "Tomorrow's Technology: Friend or Foe?"
Brendan Murphy, Microsoft;
Greg Astfalk, Hewlett Packard;
Brent Miller, IBM;
Erik Grimmelmann, SWN Communications
- Click for detailed description.
The workshop closes with a look at the future, with a second panel
on new technology and its evolving influences on the design and
development of dependable systems and solutions, "Tomorrow's
Technology: Friend or Foe?" We will discuss a variety of topics
that relate to how systems are now being designed or might be
designed in the future, such as virtualization and grid computing.
Experts from the industry will share with us their thoughts on how
these technologies are shaping the future of dependable computing.
|
Workshop 1 on Applied Software Reliability (WASR)
Session 3D
Chair: Ken Birman
Big Gap from Academic Response to Industry's Demand for Optimized Engineering Efficacy
C. H. Pham, F. Lin, N. Gupta and K. Ma
Be Good (Reliable) or Be Careful (Fault Tolerant)
H. Hecht
Integrating Software Reliability and Software Engineering in Education (or Software Reliability Begins in the Classroom)
L. Bernstein and C. Kintala
Closing the Gap in Failure Analysis
B. Murphy, M. Garzia and N. Suri
Panel: "Closing the Gap between Academic Research and Industry Needs"
|
17:30-18:30
|
Large Scale Experiments in Dependability: Defining a Research Agenda
- Click for detailed description.
The United States National Science Foundation has traditionally
supported the development of large scale experimental
infrastructure (particle accelerators, telescopes) with the
potential of dramatically advancing science. For the first time,
the NSF is considering funding such an infrastructure to support
research in Computer Science. GENI (Global Environment for Network
Innovations) is an experimental facility whose goal is to enable
the research community to invent and demonstrate a global
communications network and related services that will be
qualitatively better than today's Internet.
While GENI today is currently still a U.S. initiative, researchers
and representatives of funding agencies from Europe, Japan, Korea,
China, and to some extent India have shown enthusiasm and strong
interest in cooperating/collaborating with the US---large
international cooperations are, after all, an established tradition
with large experimental infrastructures of this scale
(accelerators, telescopes, etc.).
Our community has the opportunity to help define the research
agenda for GENI: we are actually urged to do so by contributing
with our ideas to GENI's initial research plan. What are the
research questions in dependability that an experimental
infrastructure like GENI may help answer?
|
|
TUESDAY, JUNE 27
|
08:30-10:00
|
Plenary Panel Session
Moderator: Dr. Jeffrey Voas, SAIC Corporation
"Coordinated, Malicious Cyber and Physical Attacks on National Infrastructures"
- Click for detailed description.
Panelists: Don O'Neill, Bret Michael, Shashi Phoha, Adam L. Young
This panel will look a variety of issues that deal with the joint
threat created by both physical and cyber attacks on national and
global infrastructure. For example, is there a way to model such
events, and if so, what language should be used? Further, the panel
will discuss the current state of the field of computer security, and
explore what existing approaches from the dependability community are
relevant to such a joint threat, e.g., fault tolerance.
|
10:00-10:30
| Coffee Break
|
10:30-12:00
|
DCCS
Session 4A: Byzantine Faults
Chair: Marcos K. Aguilera
Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks
Yair Amir, Claudiu Danilov, Danny Dolev, Jonathan Kirsch, John Lane, Cristina Nita-Rotaru, Josh Olsen and David Zage
Optimal Resilience for Erasure-Coded Byzantine Distributed Storage
Christian Cachin and Stefano Tessaro
Lucky Read/Write Access to Robust Atomic Storage
Rachid Guerraoui, Ron R. Levy and Marko Vukolic
|
PDS
Session 4B: Attack Analysis
Chair: Bill Sanders
Using Attack Injection to Discover New Vulnerabilities
Nuno Neves, João Antunes, Miguel Correia, Paulo Veríssimo and Rui Neves
Assessing the Attack Threat due to IRC Channels
Robert Meyer and Michel Cukier
An Approach for Detecting and Distinguishing Errors versus Attacks
in Sensor Networks
Claudio Basile, Meeta Gupta, Zbigniew Kalbarczyk and Ravi K. Iyer
|
Fast Abstracts
Session 4C
Chair: Bojan Cukic
OCD-FI: On-Chip Debug and Fault Injection
Andri Fidalgo, Gustavo Alves and Josi Ferreira
Defining Steady-State Service Level Agreeability using Semi-Markov Process
Ranjith Vasireddy and Kishor S Trivedi
Optimistic Open Groups for Fault-Tolerant Replication
Wenbo Zhu and Murray Woodside
Automatic Generation Techniques of Soft-Error-Detecting Logic Circuits with Low Delay and Area Overheads
Teruaki Sakata, Teppei Hirotsu, Hiromichi Yamada and Takeshi Kataoka
Verification of a Distributed Consensus Algorithm against Safety Properties with Model Checking
Takafumi Matsuo, Tatsuhiro Tsuchiya and Tohru Kikuno
BUFI: Fault injector for communication buses
David de Andris, Sara Blanc, Pedro Gil, Astrit Ademaj and Klaus Steinhammer
Safety and Reliability of Railway Signaling System Based on IP Network
Keiichi Ito, Takashi Kunifuji, Dai Watanabe and Tomonori Ushiyama
Failure-Aware Resource Selection for Grid Computing
Zhiling Lan and Yawei Li
Tunneling a Local Interconnect Network through a FlexRay network
Kristian Ambrosch and Wilfried Kubinger
|
Workshop 2 on Architecting Dependable Systems (WADS)
Session 4D: Software Architectures and Dependability
Chair: Cristina Gacek
Keynote Talk
Professor Mary Shaw (Carnegie Mellon University)
Discussion
|
12:00-13:30
| Lunch Break
|
13:30-15:30
|
DCCS
Session 5A: Consensus and Leader Election
Chair: Tohru Kikuno
One-Step Consensus with Zero-Degradation
Dan Dobre and Neeraj Suri
Consensus with Byzantine Failures and Little System Synchrony
Marcos K. Aguilera, Carole Delporte-Gallet, Hugues Fauconnier and Sam Toueg
Solving Atomic Broadcast with Indirect Consensus
Richard Ekwall and AndréSchiper
Eventual Leader Election with Weak Assumptions on Initial Knowledge, Communication Reliability, and Synchrony
Antonio Fernández, Ernesto Jiménez and Michel Raynal
|
DCCS
Session 5B: Intrusion Detection and Tolerance
Chair: Mohamed Kaaniche
Hotspots: The Root Causes of Non-Uniformity in Self-Propagating Malware
Evan Cooke, Z. Morley Mao and Farnam Jahanian
A Multi-Resolution Approach for Worm Detection and Containment
Vyas Sekar, Yinglian Xie, Michael K. Reiter and Hui Zhang
Honeypot-Aware Advanced Botnet Construction and Maintenance
Cliff C. Zou and Ryan Cunningham
Barbarians in the Gate: An Experimental Validation of NIC-Based Distributed Firewall Performance and Flood Tolerance
Michael Ihde and William H. Sanders
|
Student Forum
Session 5C
Chair: Christof Fetzer
Power-aware Fault Tolerance Compilation: Using Less Branches to Reduce Power Dissipation and Improve Performance
Gao Long
Increasing Data Resilience of Mobile Devices with a Collaborative Backup Service
Damien Martin-Guillerez
Behavior-Driven Testing of Windows Device Drivers
Constantin Sarbu
Revisiting Fletcher and Adler Checksums
Theresa Maxino
Intrusion Detection in Databases
Josi Fonseca
Towards Dynamically Reconfigurable Hard-Real-Time Communication for Embedded Mechatronic Systems
Andri Luiz de F. Francisco
Multidisciplinary Reliability Modeling for Sensor Network Requirements
Michael W. Bigrigg
A New Approach for Fault Tolerant and Secure Distributed Storage
Arun Subbiah
Dependable and Schedulable Online-Testing Framework for Real-Time Embedded Applications in CLI
Okehee Goh
Application-Transparent Distributed Checkpoint-Recovery for OpenSSI Kernel-Level Single-System-Image Linux Clustering Platform
Aleksander Korzynski
Automatic Generation of Robustness and Security Properties from Program Source Code
Mithun Acharya
|
Workshop 2 on Architecting Dependable Systems (WADS)
Session 5D: Fault Tolerance
Chair: Alexander Romanovsky
Invited Talk: The SAE Architecture Analysis and Description Language (AADL) Standard: A Basis for Architecture-Driven Embedded Systems Engineering
Joyce L Tokar (Pyrrhus Software)
An Evaluation of Fault Tolerant TCP-Splice Based Web Server Architectures
Manish Marwah, Jacob Delgado, Shivakant Mishra and Christof Fetzer
Idealised Fault Tolerant Architectural Element
Rogerio de Lemos
Fault-tolerant Smart Sensor Architecture for Integrated Modular Avionics
Stefan Schneele, Klaus Echtle, Josef Schalk
|
15:30-16:00
| Coffee Break
|
16:00-17:30
|
DCCS
Session 6A: Storage Systems
Chair: James Plank
HoVer Erasure Codes for Disk Arrays
James Lee Hafner
Storage Allocation in Unreliable Peer-to-Peer Systems
John A. Chandy
Reliability for Networked Storage Nodes
KK Rao, James Lee Hafner and Richard A. Golding
|
PDS
Session 6B: Measuring and Modeling
Chair: Michel Cukier
A Component-Level Path Composition Approach for Efficient Transient Analysis of Large CTMCs
Vinh V. Lam, Peter Buchholz and William H. Sanders
Evaluating the Performability of Systems with Background Jobs
Qi Zhang, Alma Riska, Erik Riedel, Ningfang Mi and Evgenia Smirni
A Contribution Towards Solving the Web Workload Puzzle
Katerina Goseva-Popstojanova, Fengbin Li, Xuan Wang and Amit Sangle
|
Fast Abstracts
Session 6C
Chair: Cristina Nita-Rotaru
Fault-Tolerant Algorithms on SoCs - A case study
Andreas Steininger, Matthias Függer, Ulrich Schmid and Gottfried Fuchs
When is the Right Time to Inject an Error?
Andrias Johansson, Constantin Sbrbu and Neeraj Suri
Address Space Layout Permutation
Chongkyung Kil, Jinsuk Jun, Christopher Bookholt and Jun Xu
A Byzantine Resilient Distributed Position Service
Cristina Nita-Rotaru, Josh Olsen and David Zage
Reliability Analysis of Digital Control Equipment for Nuclear Power Plant
Ji-Young Kim, Dong-Young Lee and Joon Lyou
Simplified Automated Fault Injection (SAFI) - A Solution to Facilitate Unit Testing in Large Scaled Test Environment
Nilay Gupta and Christopher Hoang Pham
Error Detection in Service-Oriented Distributed Systems
Andrei Korostelev, Johan Lukkien and Jan Nesvadba
Challenges Related to the Development and Approval of Essential Systems onboard Ships and offshore Vessels
Torbjorn Skramstad and Lars Bratthall
On Exploiting Symmetry To Verify Distributed Protocols
Marco Serafini and Neeraj Suri and Piter Bokor
Locating File Processing Vulnerabilities
Nuno Ferreira Neves
|
Workshop 2 on Architecting Dependable Systems (WADS)
Session 6D: Infrastructure for Dynamic Change
Chair: Rogerio de Lemos
Invited Talk: Dependability Services in the EASIS Software Platform
Martin Hiller (Volvo Technology Corporation)
Impact-Sensitive Framework for Dynamic Change-Management
Tudor Dumitras, Daniela Rosu, Asit Dan and Priya Narasimhan
Discussion
Wrap-up / Future Directions
|
18:00-21:00
| Dinner Cruise
|
|
WEDNESDAY, JUNE 28
|
08:30-10:00
|
Plenary Panel Session
Moderator: Jaynarayan Lala, Raytheon
"Global Dependability Collaborations - Challenges and Successes"
- Click for detailed description.
Panelists: Tom Anderson, University of Newcastle upon Tyne; Helen
Gill, National Science Foundation; Jean-Claude Laprie, LAAS-CNRS;
Rick Schlichting, AT&T Labs; Bill Sanders, University of
Illinois at Urbana-Champaign
It is by now readily apparent that computer systems of massive
scale and complexity are an increasingly important enabling
technology for critical infrastructures and other applications of
significant societal impact. Ensuring the dependability of such
systems is crucial, yet the technical and non-technical challenges
are so daunting that new approaches based on partnerships -- across
countries, across disciplines, and across academia and industry --
are needed.
The goal of the panel is to explore models and mechanisms for
building such partnerships. Panelists will focus on one or more
issues related to this topic depending on their personal
perspectives and expertise. This may include, for example, their
experience in building such partnerships, any special insights
about what is needed to undertake a successful collaboration, and
the role of government programs in nurturing and sustaining such
wide-ranging investigations. The hope is to not just inform the
audience, but also to challenge them to expand their own vision of
the field and to encourage them to consider participating in such
collaborations in the future.
|
10:00-10:30
| Coffee Break
|
10:30-12:00
|
DCCS
Session 7A: Complex and Large Scale Systems
Chair: Elmootazbellah Elnozahy
A Large-Scale Study of Failures in High-Performance-Computing Systems
Bianca Schroeder and Garth A. Gibson
Tracking Probabilistic Correlation of Monitoring Data for Fault Detection and Isolation in Complex Systems
Zhen Guo, Guofei Jiang, Haifeng Chen and Kenji Yoshihira
Efficiently Detecting All Dangling Pointer Uses in Production Servers
Dinakar Dhurjati and Vikram Adve
|
PDS
Session 7B: Multiple-Server Systems
Chair: Paul Ezhilchelvan
Empirical and Analytical Evaluation of Systems with Multiple Unreliable Servers
J. Palmer and I. Mitrani
R-Opus: A Composite Framework for Application Performability and QoS in Shared Resource Pools
Ludmila Cherkasova and Jerry Rolia
Cost-Effective Configuration of Content Resiliency Services Under Correlated Failures
Jinliang Fan, Dimitrios Pendarakis, Zhen Liu and Tianying Chang
|
DCCS
Session 7C: VLSI
Chair: Cristian Constantinescu
In-Register Duplication: Exploiting Narrow-Width Value for Improving Register File Reliability
Jie Hu, Shuai Wang and Sotirios Ziavras
Run-Time Reconfiguration for Emulating Transient Faults in VLSI Systems
David de Andr�s, Juan Carlos Ruiz, Daniel Gil and Pedro Gil
CADRE: Cycle-Accurate Deterministic Replay for Processor Debugging
Smruti Sarangi, Brian Greskamp and Josep Torrellas
|
Workshop 3 on Empirical Evaluation of Dependability and Security (WEEDS)
Session 7D: Empirical Evaluation of DEPENDABILITY
Chair: Ioana Rus
Safety
Experience and Lessons Learned With Quantitative Safety and Dependability Assessment of Industrial Safety Critical Systems
Carl R. Elks and Barry W. Johnson
Fault Injection
A Field Data Study on the Use of Software Metrics to Define Representative Fault Distribution
Regina Moraes, Jo�o Dur�es, Eliane Martins and Henrique Madeira
Reliability
Empirical Testing of the Handling of a Reliability-Aware Storage Device
Michael W. Bigrigg
Discussion
|
12:00-13:30
| Lunch Break
|
13:30-15:30
|
DCCS
Session 8A: Networking
Chair: Farnam Jahanian
Collecting and Analyzing Failure Data of Bluetooth Personal Area Networks
Marcello Cinque, Domenico Cotroneo and Stefano Russo
Improving BGP Convergence Delay for Large-Scale Failures
Amit Sahoo, Krishna Kant and Prasant Mohapatra
Secure Split Assignment Trajectory Sampling: A Malicious Router Detection System
Sihyung Lee, Tina Wong and Hyong S. Kim
A General Framework for Scalability and Performance Analysis of DHT Routing Systems
Joseph S. Kong, Jesse S. A. Bridgewater and Vwani P. Roychowdhury
|
PDS
Session 8B: Distributed Algorithms
Chair: Michael Reiter
High Throughput Uniform Total Order Broadcast for Cluster Environments
Rachid Guerraoui, Ron R. Levy, Bastian Pochon and Vivien Quema
Improving Fault Resilience of Overlay Multicast for Media Streaming
Guang Tan, Stephen A. Jarvis and Daniel P. Spooner
Randomized Intrusion-Tolerant Asynchronous Services
Henrique Moniz, Nuno Ferreira Neves, Miguel Correia and Paulo Veríssimo
A Performance Study on the Signal-on-Fail Approach to Imposing a Total Order in the Streets of Byzantium
Qurat-ul-Ain Inayat and Paul Devadoss Ezhilchelvan
|
Fast Abstracts
Session 8C
Chair: Saurabh Bagchi
An Evolutionary Operational Profiles Approach for Integration Tests
Maria de Fatima Mattiello-Francisco
Comparing Process and Thread Redundancy in CMP on Energy and Reliability
Dakai Zhu and Hakan Aydin
Aspects Made Explicit for Safe Transactional Semantics
Kevin Hoffman and Patrick Eugster
Automated Derivation of Application Aware Error Detectors using Static Analysis
Karthik Pattabiraman, Zbigniew Kalbarczyk and Ravi K. Iyer
The Parsimonious Approach to Constructing Fault-Tolerant Protocols
HariGovind V. Ramasamy, Christian Cachin, Adnan Agbaria and William H. Sanders
FPGA Implementation of the Illinois Reliability and Security Engine
Peter F. Klemperer, Reza Farivar, Giacinto Paolo Saggese, Nithin Nakka, Zbigniew Kalbarczyk and Ravishankar K. Iyer
SPACEDIVE: A Distributed Intrusion Detection System for Voice-over-IP Environments
Vinita Apte, Yu-Sung Wu, Saurabh Bagchi, Sachin Garg and Navjot Singh
Modeling Probabilistic Diagnosis Parameters
Gunjan Khanna, Yu Cheng and Saurabh Bagchi
Modeling Cascading and Escalating Outages in Interdependent Critical Infrastructures
Jean-Claude Laprie, Karama Kanoun and Mohamed Kaaniche
A Self-checking and Reconfigurable Framework for Application Reliability Exploiting Execution Characteristics
Long Wang, Zbigniew Kalbarczyk and Ravi. Iyer
A Discussion of Performance Optimizations for Compiler-Based Buffer Overflow Instrumentation
Timothy Tsai
A Mediator System for Improving Dependability of Web Services
Yuhui Chen and Alexander Romanovsky
Architectural Reconfiguration of Software Systems using Atomic Actions
Rogerio de Lemos
|
Workshop 3 on Empirical Evaluation of Dependability and Security (WEEDS)
Session 8D: Empirical Evaluation of SECURITY
Chair: Michel Cukier
Towards Security Evaluation based on Evidence Information Collection and Impact Analysis
Reijo Savola and Juha R�ning
Empirical Analysis and Statistical Modeling of Attack Processes based on Honeypots
Mohamed Ka�niche, Eric Alata, Vincent Nicomette, Yves Deswarte and Marc Dacier
Can We Quantitatively Assess Security?
Boudewijn R. Haverkort
Compromise Modes and Effects Analysis
Bradley J. Wood, Rico R. Valdez and Justin, M. Parsley
|
15:30-16:00
| Coffee Break
|
16:30-17:30
|
IEEE TC-FTC Business Meeting
|