The Community for Technology Leaders
Workshop on Open Resilient human-aware Cyber-physical Systems (WORCS 2012). Workshop on Fault Tolerance for HPC at Extreme Scale (FTXS 2012). 6th Workshop on Recent Advances in Intrusion Tolerance and reSilience (WRAITS 2012) (2012)
Boston, MA
June 25, 2012 to June 28, 2012
ISSN: 2325-6648
ISBN: 978-1-4673-2264-5
TABLE OF CONTENTS

Message from the DCCS program chair (PDF)

Philip Koopman , Carnegie Mellon University, USA
pp. 1

William C. Carter Award (PDF)

Collin Mulliner , Technische Universität Berlin, Germany
pp. 1

WORCS committees (PDF)

pp. 1-2

Workshop on open resilient human-aware Cyber-physical systems (PDF)

Mohamed Kaaniche , CNRS, LAAS, 7 avenue du colonel Roche, F-31400, Toulouse, France
Michael Harrison , Queen Mary University of London, UK
Hermann Kopetz , Vienna University of Technology, Austria
Daniel Siewiorek , Carnegie Mellon University, USA
pp. 1-2

Invited talk: Challenges in Medical Cyber-Physical Systems (Abstract)

Insup Lee , Computer and Information Science, School of Engineering and Applied Science, University of Pennsylvania, Philadelphia, 19104, USA
pp. 1

Invited talk: Virtual coaches in health care (PDF)

Daniel P. Siewiorek , Buhl University Professor of Electrical and Computer Engineering and Computer Science, Quality of life Technology Center, Human-Computer Interaction Institute, Carnegie Mellon University, Newell-Simon Hall 4515, 5000 Forbes Avenue, Pittsburgh, PA 15213-3890 USA
pp. 1

Invited talk: A model and simulation for user-centric automation devices and systems (PDF)

Jane W. S. Liu , Institute of Information Science, Academia Sinica, No 128, Academia Road, Section 2, Nankang, Taipei 11529, Taiwan
pp. 1

Smart checklists for human-intensive medical systems (PDF)

George S. Avrunin , Department of Computer Science, University of Massachusetts Amherst, USA
Lori A. Clarke , Department of Computer Science, University of Massachusetts Amherst, USA
Leon J. Osterweil , Department of Computer Science, University of Massachusetts Amherst, USA
Julian M. Goldman , Massachusetts General Hospital, Boston, USA
Tracy Rausch , DocBox, Inc., Waltham, MA USA
pp. 1-6

Towards resiliency in embedded medical monitoring devices (PDF)

Homa Alemzadeh , Center for Reliable and High Performance Computing, University of Illinois at Urbana-Champaign, 1308 W. Main St., 61801, USA
Catello Di Martino , Center for Reliable and High Performance Computing, University of Illinois at Urbana-Champaign, 1308 W. Main St., 61801, USA
Zhanpeng Jin , Department of Electrical and Computer Engineering, Binghamton University, State University of New York, USA
Zbigniew T. Kalbarczyk , Center for Reliable and High Performance Computing, University of Illinois at Urbana-Champaign, 1308 W. Main St., 61801, USA
Ravishankar K. Iyer , Center for Reliable and High Performance Computing, University of Illinois at Urbana-Champaign, 1308 W. Main St., 61801, USA
pp. 1-6

A rigorous approach to the design of resilient cyber-physical systems through co-simulation (PDF)

John Fitzgerald , School of Computing Science, Newcastle University, Newcastle upon Tyne, United Kingdom, NE1 7RU
Ken Pierce , School of Computing Science, Newcastle University, Newcastle upon Tyne, United Kingdom, NE1 7RU
Carl Gamble , School of Computing Science, Newcastle University, Newcastle upon Tyne, United Kingdom, NE1 7RU
pp. 1-6

Physical attack protection with human-secure virtualization in data centers (PDF)

Jakub Szefer , Department of Electrical Engineering, Princeton University, USA
Pramod Jamkhedkar , Department of Electrical Engineering, Princeton University, USA
Yu-Yuan Chen , Department of Electrical Engineering, Princeton University, USA
Ruby B. Lee , Department of Electrical Engineering, Princeton University, USA
pp. 1-6

MILS-related information flow control in the avionic domain: A view on security-enhancing software architectures (PDF)

Kevin Muller , EADS Innovation Works, Munich, Germany
Michael Paulitsch , EADS Innovation Works, Munich, Germany
Sergey Tverdyshev , SYSGO AG, Klein-Winternheim, Germany
Holger Blasum , SYSGO AG, Klein-Winternheim, Germany
pp. 1-6

Chaotic-identity maps for robustness estimation of exascale computations (PDF)

Nageswara S. V. Rao , Computer Science and Mathematics Division, Oak Ridge National Laboratory, TN 37831, USA
pp. 1-6

Asynchronous checkpoint migration with MRNet in the Scalable Checkpoint / Restart Library (PDF)

Kathryn Mohror , Lawrence Livermore National Laboratory, USA
Adam Moody , Lawrence Livermore National Laboratory, USA
Bronis R. de Supinski , Lawrence Livermore National Laboratory, USA
pp. 1-6

Does partial replication pay off? (PDF)

Jon Stearley , Computer Science Research Institute, Sandia National Laboratories, USA
Kurt Ferreira , Computer Science Research Institute, Sandia National Laboratories, USA
David Robinson , Computer Science Research Institute, Sandia National Laboratories, USA
Jim Laros , Computer Science Research Institute, Sandia National Laboratories, USA
Kevin Pedretti , Computer Science Research Institute, Sandia National Laboratories, USA
Dorian Arnold , Computer Science Department, University Of New Mexico, USA
Patrick Bridges , Computer Science Department, University Of New Mexico, USA
Rolf Riesen , IBM Research, Ireland
pp. 1-6

Energy considerations in checkpointing and fault tolerance protocols (PDF)

M. el Mehdi Diouri , Laboratoire de l'Informatique du Parallélisme, CNRS, ENS Lyon, INRIA, Université Lyon 1, FRANCE
Olivier Gluck , Laboratoire de l'Informatique du Parallélisme, CNRS, ENS Lyon, INRIA, Université Lyon 1, FRANCE
Laurent Lefevre , Laboratoire de l'Informatique du Parallélisme, CNRS, ENS Lyon, INRIA, Université Lyon 1, FRANCE
Franck Cappello , Laboratoire de Recherche en Informatique, INRIA, Paris, FRANCE
pp. 1-6

A programming model for resilience in extreme scale computing (PDF)

Saurabh Hukerikar , Information Sciences Institute, University of Southern California, Marina del Rey, 90292, USA
Pedro C. Diniz , Information Sciences Institute, University of Southern California, Marina del Rey, 90292, USA
Robert F. Lucas , Information Sciences Institute, University of Southern California, Marina del Rey, 90292, USA
pp. 1-6

ROSE::FTTransform - A source-to-source translation framework for exascale fault-tolerance research (PDF)

Jacob Lidman , Lawrence Livermore National Laboratory, CA, USA
Daniel J. Quinlan , Lawrence Livermore National Laboratory, CA, USA
Chunhua Liao , Lawrence Livermore National Laboratory, CA, USA
Sally A. McKee , Department of Computer Science and Engineering, Chalmers University of Technology, Gothenburg, Sweden
pp. 1-6

A message-logging protocol for multicore systems (PDF)

Esteban Meneses , Department of Computer Science, University of Illinois at Urbana-Champaign, 61801, USA
Xiang Ni , Department of Computer Science, University of Illinois at Urbana-Champaign, 61801, USA
Laxmikant V. Kale , Department of Computer Science, University of Illinois at Urbana-Champaign, 61801, USA
pp. 1-6

An evaluation of difference and threshold techniques for efficient checkpoints (PDF)

Sean Hogan , University of Chicago, USA
Jeff R. Hammond , Argonne National Laboratory, USA
Andrew A. Chien , University of Chicago, USA
pp. 1-6

On the complexity of scheduling checkpoints for computational workflows (PDF)

Yves Robert , Ecole Normale Supérieure de Lyon & INRIA, France
Frederic Vivien , Ecole Normale Supérieure de Lyon & INRIA, France
Dounia Zaidouni , Ecole Normale Supérieure de Lyon & INRIA, France
pp. 1-6

Design and implementation of a hardware checkpoint/restart core (PDF)

Ashwin A. Mendon , Reconfigurable Computing Systems Lab, University of North Carolina at Charlotte, USA
Ron Sass , Reconfigurable Computing Systems Lab, University of North Carolina at Charlotte, USA
Zachary K. Baker , Los Alamos National Lab, NM, USA
Justin L. Tripp , Los Alamos National Lab, NM, USA
pp. 1-6

A scalable double in-memory checkpoint and restart scheme towards exascale (PDF)

Gengbin Zheng , Department of Computer Science, University of Illinois at Urbana-Champaign, 61801, USA
Xiang Ni , Department of Computer Science, University of Illinois at Urbana-Champaign, 61801, USA
Laxmikant V. Kale , Department of Computer Science, University of Illinois at Urbana-Champaign, 61801, USA
pp. 1-6

6th workshop on recent advances in intrusion tolerance and reSilience (WRAITS 2012) (PDF)

Ilir Gashi , Centre for Software Reliability, City University London, United Kingdom
O. Patrick Kreidl , School of Engineering, University of North Florida, Jacksonville, U.S.A.
pp. 1-2

Avoiding common security flaws in composed service-oriented systems (PDF)

Michael Atighetchi , Raytheon BBN Technologies, Cambridge, MA, USA
Partha Pal , Raytheon BBN Technologies, Cambridge, MA, USA
Joseph Loyall , Raytheon BBN Technologies, Cambridge, MA, USA
Asher Sinclair , US Air Force Research Laboratory, Rome, NY, USA
pp. 1-6

Improving resilience of SOA services along space-time dimensions (PDF)

Quyen L. Nguyen , International Cyber Center and Department of Computer Science, George Mason University, Fairfax, VA 22030, USA
Arun Sood , International Cyber Center and Department of Computer Science, George Mason University, Fairfax, VA 22030, USA
pp. 1-6

People-oriented cyber security (PDF)

Greg Frazier , Apogee Research, LLC, USA
pp. 1

A model for security analysis of smart meters (PDF)

Farid Molazem Tabrizi , ECE Department University of British Columbia, Vancouver, Canada
Karthik Pattabiraman , ECE Department University of British Columbia, Vancouver, Canada
pp. 1-6

On limitations of using cloud storage for data replication (PDF)

Christian Cachin , IBM Research - Zurich, Säumerstr. 4, CH-8803 Rüschlikon, Switzerland
Birgit Junker , Open Systems AG, Räffelstrasse 29, CH-8045 Zurich, Switzerland
Alessandro Sorniotti , IBM Research - Zurich, Säumerstr. 4, CH-8803 Rüschlikon, Switzerland
pp. 1-6

Towards incorporating human intelligence into online security solutions (PDF)

Saman Zonouz , Electrical and Computer Engineering Department, University of Miami, USA
Robin Berthier , Information Trust Institute, University of Illinois, USA
Negin Arhami , Computer Science Department, University of Miami, USA
pp. 1-2

A security analysis of Amazon's Elastic Compute Cloud service (PDF)

Engin Kirda , Northeastern University, Boston, MA, USA
pp. 1

The TClouds architecture: Open and resilient cloud-of-clouds computing (PDF)

Paulo Verissimo , Universidade de Lisboa, Faculdade de Ciências - LaSIGE, Portugal
Alysson Bessani , Universidade de Lisboa, Faculdade de Ciências - LaSIGE, Portugal
Marcelo Pasin , Universidade de Lisboa, Faculdade de Ciências - LaSIGE, Portugal
pp. 1-6

Toward a high availability cloud: Techniques and challenges (PDF)

Cuong Pham , Center for Reliable and High-Performance Computing, University of Illinois at Urbana-Champaign, 1308 W. Main Street, 61801, USA
Phuong Cao , Center for Reliable and High-Performance Computing, University of Illinois at Urbana-Champaign, 1308 W. Main Street, 61801, USA
Zbigniew Kalbarczyk , Center for Reliable and High-Performance Computing, University of Illinois at Urbana-Champaign, 1308 W. Main Street, 61801, USA
Ravishankar K. Iyer , Center for Reliable and High-Performance Computing, University of Illinois at Urbana-Champaign, 1308 W. Main Street, 61801, USA
pp. 1-6

Dependability as a cloud service - a modular approach (PDF)

Jan S. Rellermeyer , IBM Research, Austin Research Lab, TX 78758, USA
Saurabh Bagchi , Purdue University, School of Electrical and Computer Engineering, West Lafayette, IN 47907, USA
pp. 1-6

Osprey: Operating system for predictable clouds (PDF)

Jan Sacha , Bell Laboratories, Alcatel-Lucent, Antwerp, Belgium
Jeff Napper , Bell Laboratories, Alcatel-Lucent, Antwerp, Belgium
Sape Mullender , Bell Laboratories, Alcatel-Lucent, Antwerp, Belgium
Jim McKie , Bell Laboratories, Alcatel-Lucent, Murray Hill, NJ, USA
pp. 1-6

Defending against VM rollback attack (PDF)

Yubin Xia , Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University, China
Yutao Liu , Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University, China
Haibo Chen , Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University, China
Binyu Zang , School of Computer Science, Fudan University, China
pp. 1-5

TinyChecker: Transparent protection of VMs against hypervisor failures with nested virtualization (PDF)

Cheng Tan , Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University, China
Yubin Xia , Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University, China
Haibo Chen , Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University, China
Binyu Zang , School of Computer Science, Fudan University, China
pp. 1-6

Utilizing linear subspaces to improve cloud security (PDF)

David Zage , Cyber Analysis Research & Development Solutions, Sandia National Laboratories, Albuquerque, NM, USA 87185-9300
James Obert , Cyber Analysis Research & Development Solutions, Sandia National Laboratories, Albuquerque, NM, USA 87185-9300
pp. 1-6

Evidence of log integrity in policy-based security monitoring (PDF)

Mirko Montanari , Information Trust Institute, University of Illinois at Urbana-Champaign, USA
Jun Ho Huh , Information Trust Institute, University of Illinois at Urbana-Champaign, USA
Derek Dagit , Information Trust Institute, University of Illinois at Urbana-Champaign, USA
Rakesh B. Bobba , Information Trust Institute, University of Illinois at Urbana-Champaign, USA
Roy H. Campbell , Information Trust Institute, University of Illinois at Urbana-Champaign, USA
pp. 1-6

TRONE: Trustworthy and Resilient Operations in a Network Environment (PDF)

Antonio Casimiro , University of Lisbon, Portugal
Paulo Verissimo , University of Lisbon, Portugal
Diego Kreutz , University of Lisbon, Portugal
Filipe Araujo , University of Coimbra, Portugal
Raul Barbosa , University of Coimbra, Portugal
Samuel Neves , University of Coimbra, Portugal
Bruno Sousa , University of Coimbra, Portugal
Marilia Curado , University of Coimbra, Portugal
Carlos Silva , Portugal Telecom, Portugal
Rajeev Gandhi , Electrical & Computer Engineering Department, Carnegie Mellon University, USA
Priya Narasimhan , Electrical & Computer Engineering Department, Carnegie Mellon University, USA
pp. 1-6

An independent verification of errors and vulnerabilities in SaaS cloud (PDF)

Rajeshwari Ganesan , Infosys Labs, Bangalore India
Santonu Sarkar , Infosys Labs, Bangalore India
Naveen Tewari , Infosys Labs, Bangalore India
pp. 1-6

A study of fault-tolerance characteristics of data center networks (PDF)

Yang Liu , Department of Computer Science and Engineering, Hong Kong University of Science and Technology, China
Dong Lin , Department of Computer Science and Engineering, Hong Kong University of Science and Technology, China
Jogesh Muppala , Department of Computer Science and Engineering, Hong Kong University of Science and Technology, China
Mounir Hamdi , Department of Computer Science and Engineering, Hong Kong University of Science and Technology, China
pp. 1-6

Models for dependability and sustainability analysis of data center cooling architectures (PDF)

Gustavo Callou , Informatics Center, Federal University of Pernambuco - Recife, Brazil
Paulo Maciel , Informatics Center, Federal University of Pernambuco - Recife, Brazil
Dietmar Tutsch , Automation/Computer Science, University of Wuppertal, Germany
Julian Araujo , Informatics Center, Federal University of Pernambuco - Recife, Brazil
pp. 1-6
100 ms
(Ver 3.3 (11022016))