The Community for Technology Leaders
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (2005)
Yokohama, Japan
June 28, 2005 to July 1, 2005
ISBN: 0-7695-2282-3
TABLE OF CONTENTS
Introduction
Introduction

W.C. Carter Award (PDF)

pp. xxiii
Keynote Address
Session 1A: Fault Tolerant Architectures and Algorithms

null (PDF)

pp. null

Assured Reconfiguration of Fail-Stop Systems (Abstract)

M. Anthony Aiello , University of Virginia
Elisabeth A. Strunk , University of Virginia
John C. Knight , University of Virginia
pp. 2-11

NonStop® Advanced Architecture (Abstract)

David Garcia , Hewlett Packard Company
Bill Bruckert , Hewlett Packard Company
David Bernick , Hewlett Packard Company
Jim Smullen , Hewlett Packard Company
Robert Jardine , Hewlett Packard Company
Jim Klecka , Hewlett Packard Company
Paul Del Vigna , Hewlett Packard Company
pp. 12-21
Session 1B: Dependability in VLSI

null (PDF)

pp. null

ReStore: Symptom Based Soft Error Detection in Microprocessors (Abstract)

Nicholas J. Wang , University of Illinois at Urbana-Champaign
Sanjay J. Patel , University of Illinois at Urbana-Champaign
pp. 30-39

On-Line Detection of Control-Flow Errors in SoCs by Means of an Infrastructure IP Core (Abstract)

M. Violante , Politecnico di Torino
M. Rebaudengo , Politecnico di Torino
M. Sonza Reorda , Politecnico di Torino
L. Bolzani , Politecnico di Torino
P. Bernardi , Politecnico di Torino
F. Vargas , Pontif?cia Universidade Cat?lica do Rio Grande do Sul
pp. 50-58
Session 2A: Experimental Validation

null (PDF)

pp. null

User Interface Dependability through Goal-Error Prevention (Abstract)

Robert W. Reeder , Carnegie Mellon University
Roy A. Maxion , Carnegie Mellon University
pp. 60-69

Stability Monitoring and Analysis of Learning in an Adaptive System (Abstract)

Edgar Fuller , West Virginia University
Sampath Yerramalla , West Virginia University
Bojan Cukic , West Virginia University
Martin Mladenovski , West Virginia University
pp. 70-79

Error Propagation Profiling of Operating Systems (Abstract)

Andréas Johansson , Technische Universität Darmstadt
Neeraj Suri , Technische Universität Darmstadt
pp. 86-95
Session 2B: System Security

null (PDF)

pp. null

How Resilient are Distributed f Fault/Intrusion-Tolerant Systems? (Abstract)

Paulo Veríssimo , University of Lisboa
Nuno Ferreira Neves , University of Lisboa
Paulo Sousa , University of Lisboa
pp. 98-107

Towards a Theory of Insider Threat Assessment (Abstract)

Shambhu Upadhyaya , University at Buffalo
Hung Q. Ngo , University at Buffalo
Ramkumar Chinchani , University at Buffalo
Anusha Iyer , University at Buffalo
pp. 108-117

Constructing Multi-Layered Boundary to Defend Against Intrusive Anomalies: An Autonomic Detection Coordinator (Abstract)

Hong Shen , Japan Advanced Institute of Science and Technology
Zonghua Zhang , Japan Advanced Institute of Science and Technology
pp. 118-127

A Model of Stateful Firewalls and Its Properties (Abstract)

Alex X. Liu , University of Texas at Austin
Mohamed G. Gouda , University of Texas at Austin
pp. 128-137
Session 3A: Multicast

null (PDF)

pp. null

GoCast: Gossip-Enhanced Overlay Multicast for Fast and Dependable Group Communication (Abstract)

Christopher Ward , IBM T.J. Watson Research Center
Rong N. Chang , IBM T.J. Watson Research Center
Chunqiang Tang , IBM T.J. Watson Research Center
pp. 140-149

SMRP: Fast Restoration of Multicast Sessions from Persistent Failures (Abstract)

Jian Wu , University of Michigan
Kang G. Shin , University of Michigan
pp. 150-159

Efficient Byzantine Broadcast in Wireless Ad-Hoc Networks (Abstract)

Vadim Drabkin , Technion - Israel Institute of Technology
Marc Segal , Technion - Israel Institute of Technology
Roy Friedman , Technion - Israel Institute of Technology
pp. 160-169
Session 3B: Wide Area Networks

null (PDF)

pp. null

Internet Routing Anomaly Detection and Visualization (Abstract)

Van Jacobson , Packet Design, Inc.
Tina Wong , Carnegie Mellon University
Cengiz Alaettinoglu , Packet Design, Inc.
pp. 172-181

Assessing the Performance of Erasure Codes in the Wide-Area (Abstract)

James S. Plank , University of Tennessee
Rebecca L. Collins , University of Tennessee
pp. 182-187

Finding Critical Traffic Matrices (Abstract)

Yin Zhang , University of Texas at Austin
Zihui Ge , AT&T Labs - Research
pp. 188-197
Session 4A: Detection and Adaptation

null (PDF)

pp. null

Definition and Specification of Accrual Failure Detectors (Abstract)

Takuya Katayama , Japan Advanced Institute of Science and Technology
Xavier Défago , Japan Advanced Institute of Science and Technology and PRESTO, Japan Science and Technology Agency
Naohiro Hayashibara , Japan Advanced Institute of Science and Technology
Péter Urb? , Japan Advanced Institute of Science and Technology
pp. 206-215

The Effects of Algorithmic Diversity on Anomaly Detector Performance (Abstract)

Kymie M. C. Tan , Carnegie Mellon University
Roy A. Maxion , Carnegie Mellon University
pp. 216-225
Session 4B: FT Communications

null (PDF)

pp. null

On Partial Protection in Groomed Optical WDM Mesh Networks (Abstract)

Mahesh Sivakumar , University of Maryland at Baltimore County
Arun K. Somani , Iowa State University
Jing Fang , Iowa State University
Krishna M. Sivalingam , University of Maryland at Baltimore County
pp. 228-237

Resilient Routing Layers for Recovery in Packet Networks (Abstract)

Audun Fosselie Hansen , Simula Research Laboratory and Telenor R&D
Tarik Čičić , Simula Research Laboratory
Stein Gjessing , Simula Research Laboratory
Olav Lysne , Simula Research Laboratory
Amund Kvalbein , Simula Research Laboratory
pp. 238-247

Perturbation-Resistant and Overlay-Independent Resource Discovery (Abstract)

Indranil Gupta , University of Illinois at Urbana-Champaign
Steven Y. Ko , University of Illinois at Urbana-Champaign
pp. 248-257
Session 5A: Operating Systems and Mechanisms

null (PDF)

pp. null

Cruz: Application-Transparent Distributed Checkpoint-Restart on Standard Operating Systems (Abstract)

Jose Renato Santos , Hewlett-Packard Laboratories
Dinesh Subhraveti , Hewlett-Packard Laboratories
G. (John) Janakiraman , Hewlett-Packard Laboratories
Yoshio Turner , Hewlett-Packard Laboratories
pp. 260-269

Crash Data Collection: A Windows Case Study (Abstract)

David Patterson , University of California at Berkeley
Archana Ganapathi , University of California at Berkeley
pp. 280-285
Session 5B: Networking

null (PDF)

pp. null

Scalable and Robust WLAN Connectivity Using Access Point Array (Abstract)

Fanglu Guo , State University of New York at Stony Brook and Rether Networks Inc.
Tzi-cker Chiueh , State University of New York at Stony Brook and Rether Networks Inc.
pp. 288-297

Ringing out Fault Tolerance. A New Ring Network for Superior Low-Cost Dependability (Abstract)

Brendan Hall , Honeywell International
Samar Dajani-Brown , Honeywell International
Michael Paulitsch , Honeywell International
Kevin Driscoll , Honeywell International
pp. 298-307

A System Demonstration of ST-TCP (Abstract)

Shivakant Mishra , University of Colorado
Manish Marwah , University of Colorado
Christof Fetzer , Dresden University of Technology
pp. 308-313
Session 6A: Codes

null (PDF)

pp. null

A Data-Centric Approach to Checksum Reuse for Array-Intensive Applications (Abstract)

M. Karakoy , Imperial College
G. Chen , Pennsylvania State University
M. Kandemir , Pennsylvania State University
pp. 316-325

Small Parity-Check Erasure Codes — Exploration and Observations (Abstract)

Rebecca L. Collins , University of Tennessee
Adam L. Buchsbaum , AT&T Labs
Michael G. Thomason , University of Tennessee
James S. Plank , University of Tennessee
pp. 326-335

Using Erasure Codes Efficiently for Storage in a Distributed System (Abstract)

Marcos K. Aguilera , HP Laboratories
Lihao Xu , Washington University in Saint Louis
Ramaprabhu Janakiraman , Washington University in Saint Louis
pp. 336-345

Coverage and the Use of Cyclic Redundancy Codes in Ultra-Dependable Systems (Abstract)

Philip Koopman , Carnegie Mellon University
Michael Paulitsch , Honeywell
Brendan Hall , Honeywell
Kevin Driscoll , Honeywell
Jennifer Morris , Carnegie Mellon University
Elizabeth Latronico , Carnegie Mellon University
pp. 346-355
Session 6B: Critical Infrastructures Protection

null (PDF)

pp. null

Authenticated System Calls (Abstract)

Matti Hiltunen , AT&T Labs-Research
Trevor Jim , AT&T Labs-Research
Mohan Rajagopalan , University of Arizona
Richard Schlichting , AT&T Labs-Research
pp. 358-367

Detecting Stealth Software with Strider GhostBuster (Abstract)

Yi-Min Wang , Microsoft Research
Doug Beck , Microsoft Research
Chad Verbowski , Microsoft Research
Binh Vo , Microsoft Research
Roussi Roussev , Microsoft Research
pp. 368-377

Defeating Memory Corruption Attacks via Pointer Taintedness Detection (Abstract)

Nithin Nakka , University of Illinois at Urbana-Champaign
Shuo Chen , University of Illinois at Urbana-Champaign
Zbigniew Kalbarczyk , University of Illinois at Urbana-Champaign
Ravishankar K. Iyer , University of Illinois at Urbana-Champaign
Jun Xu , North Carolina State University
pp. 378-387

Checking Array Bound Violation Using Segmentation Hardware (Abstract)

Tzi-cker Chiueh , State University of New York at Stony Brook
Lap-chung Lam , State University of New York at Stony Brook
pp. 388-397
Panel: Dependability Benchmarking of Computing Systems

Panel Statement (PDF)

Henrique Madeira , University of Coimbra
Karama Kanoun , LAAS-CNRS
Brendan Murphy , Microsoft
Ira Pramanick , Sun Microsystems
pp. 400
Session 7A: Consensus

null (PDF)

pp. null

Fast Byzantine Consensus (Abstract)

Lorenzo Alvisi , University of Texas at Austin
Jean-Philippe Martin , University of Texas at Austin
pp. 402-411

A Hybrid and Adaptive Model for Fault-Tolerant Distributed Computing (Abstract)

Sérgio Gorender , Federal University of Bahia
Raimundo Mac?do , Federal University of Bahia
Michel Raynal , IRISA, Université de Rennes 1
pp. 412-421

Adaptive Indulgent Consensus (Abstract)

Lívia Sampaio , Universidade Federal de Campina Grande
Francisco Brasileiro , Universidade Federal de Campina Grande
pp. 422-431
Session 7B: Hardware and Codesign

null (PDF)

pp. null

Microarchitecture-Based Introspection: A Technique for Transient-Fault Tolerance in Microprocessors (Abstract)

Onur Mutlu , University of Texas at Austin
Yale N. Patt , University of Texas at Austin
Moinuddin K. Qureshi , University of Texas at Austin
pp. 434-443

Reversible Fault-Tolerant Logic (Abstract)

Vwani P. Roychowdhury , University of California at Los Angeles
P. Oscar Boykin , University of Florida
pp. 444-453

Co-Design Based Approach to Improve Robustness in Networked Control Systems (Abstract)

Scott Graham , Air Force Institute of Technology
Sumant Kowshik , University of Illinois at Urbana-Champaign
Girish Baliga , University of Illinois at Urbana-Champaign
Lui Sha , University of Illinois at Urbana-Champaign
pp. 454-463
Session 8A: Dependability Modeling and Prediction

null (PDF)

pp. null

Filtering Failure Logs for a BlueGene/L Prototype (Abstract)

Jose Moreira , IBM T. J. Watson Research Center
Manish Gupta , IBM T. J. Watson Research Center
Anand Sivasubramaniam , Penn State University
Yinglung Liang , Rutgers University
Yanyong Zhang , Rutgers University
Ramendra K. Sahoo , IBM T. J. Watson Research Center
pp. 476-485

Design Time Reliability Analysis of Distributed Fault Tolerance Algorithms (Abstract)

Philip Koopman , Carnegie Mellon University
Elizabeth Latronico , Carnegie Mellon University
pp. 486-495
Session 8B: Intrusion Detection and Tolerance

null (PDF)

pp. null

ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment (Abstract)

Saurabh Bagchi , Purdue University
Eugene Spafford , Purdue University
Yu-Chun Mao , Purdue University
Bingrui Foo , Purdue University
Yu-Sung Wu , Purdue University
pp. 508-517

Neutralization of Errors and Attacks in Wireless Ad Hoc Networks (Abstract)

Zbigniew Kalbarczyk , University of Illinois at Urbana-Champaign
Ravi K. Iyer , University of Illinois at Urbana-Champaign
Claudio Basile , University of Illinois at Urbana-Champaign
pp. 518-527

Modeling and Automated Containment of Worms (Abstract)

Sarah Sellke , Purdue University
Saurabh Bagchi , Purdue University
Ness B. Shroff , Purdue University
pp. 528-537

Fatih: Detecting and Isolating Malicious Routers (Abstract)

Stefan Savage , University of California at San Diego
Keith Marzullo , University of California at San Diego
Alper Tugay Mizrak , University of California at San Diego
Yu-Chung Cheng , University of California at San Diego
pp. 538-547
Session 1C: Software Reliability, Rejuvenation and Optimization

null (PDF)

pp. null

Workshop Abstract (Abstract)

pp. 830
Session 1C: Software Reliability, Rejuvenation and Optimization

On a Method for Mending Time to Failure Distributions (Abstract)

Michael Grottke , Duke University
Kishor S. Trivedi , Duke University
pp. 560-569

A Performability-Oriented Software Rejuvenation Framework for Distributed Applications (Abstract)

Kam S. Tso , IA Tech, Inc.
William H. Sanders , University of Illinois at Urbana-Champaign
Savio N. Chau , Jet Propulsion Laboratory
Ann T. Tai , IA Tech, Inc.
pp. 570-579
Session 2C: Security Evaluation

null (PDF)

pp. null

Optimizing the Pulsing Denial-of-Service Attacks (Abstract)

Rocky K. C. Chang , Hong Kong Polytechnic University
Xiapu Luo , Hong Kong Polytechnic University
pp. 582-591

Towards a Security Benchmark for Database Management Systems (Abstract)

Marco Vieira , University of Coimbra
Henrique Madeira , University of Coimbra
pp. 592-601

An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack (Abstract)

Michel Cukier , University of Maryland at College Park
Keith M. Jarrin , University of Maryland at College Park
Susmit Panjwani , University of Maryland at College Park
Stephanie Tan , University of Maryland at College Park
pp. 602-611
Session 3C: Evaluation of QoS and Self-Healing Systems

null (PDF)

pp. null

Experimental Evaluation of the QoS of Failure Detectors on Wide Area Network (Abstract)

Andrea Bondavalli , Università degli Studi di Firenze
Lorenzo Falai , Università degli Studi di Firenze
pp. 624-633

Probabilistic QoS Guarantees for Supercomputing Systems (Abstract)

M. Gupta , IBM T. J. Watson Research Center
J. E. Moreira , IBM T. J. Watson Research Center
R. K. Sahoo , IBM T. J. Watson Research Center
A. J. Oliner , Massachusetts Institute of Technology
L. Rudolph , Massachusetts Institute of Technology
pp. 634-643

Ensembles of Models for Automated Diagnosis of System Performance Problems (Abstract)

Ira Cohen , Hewlett Packard Research Labs
Julie Symons , Hewlett Packard Research Labs
Steve Zhang , Stanford University
Moises Goldszmidt , Hewlett Packard Research Labs
Armando Fox , Stanford University
pp. 644-653
Session 4C: Experimental Evaluation of Fault-Tolerance

null (PDF)

pp. null

A Framework for Node-Level Fault Tolerance in Distributed Real-Time Systems (Abstract)

Joakim Aidemark , Volvo Car Corporation
Peter Folkesson , Chalmers University of Technology
Johan Karlsson , Chalmers University of Technology
pp. 656-665

Experimental Dependability Evaluation of a Fail-Bounded Jet Engine Control System for Unmanned Aerial Vehicles (Abstract)

Jonny Vinter , Chalmers University of Technology
Olof Hannius , Volvo Aero Corporation
Peter Folkesson , Chalmers University of Technology
Johan Karlsson , Chalmers University of Technology
Torbj? Norlander , Volvo Aero Corporation
pp. 666-671

TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks (Abstract)

Mark Krasniewski , Purdue University
Padma Varadharajan , Purdue University
Saurabh Bagchi , Purdue University
Bryan Rabeler , Purdue University
Y. Charlie Hu , Purdue University
pp. 672-681
Session 5C: Performance Evaluation of Networks and Protocols

null (PDF)

pp. null

Improving TCP Performance for Multihop Wireless Networks (Abstract)

Mary K. Vernon , University of Wisconsin - Madison
Sherif M. ElRakabawy , University of Dortmund
Christoph Lindemann , University of Dortmund
pp. 684-693

A Spatial Fluid-Based Framework to Analyze Large-Scale Wireless Sensor Networks (Abstract)

R. Gaeta , Università di Torino
M. Sereno , Università di Torino
C.-F. Chiasserini , Politecnico di Torino
M. Gribaudo , Università di Torino
M. Garetto , Politecnico di Torino
D. Manini , Università di Torino
pp. 694-703

Are You Still There? — A Lightweight Algorithm to Monitor Node Presence in Self-Configuring Networks (Abstract)

Henrik Bohnenkamp , University of Twente
Johan Gorter , University of Twente
Jarno Guidi , Philips Research
Joost-Pieter Katoen , University of Twente and RWTH Aachen University
pp. 704-709
Session 6C: Markovian Models for Performance and Dependability

null (PDF)

pp. null

A Novel Approach for Fitting Probability Distributions to Real Trace Data with the EM Algorithm (Abstract)

Axel Th?mmler , University of Dortmund
Peter Buchholz , University of Dortmund
Mikl? Telek , Budapest University of Technology and Economics
pp. 712-721

Model Checking Markov Reward Models with Impulse Rewards (Abstract)

Joost-Pieter Katoen , RWTH Aachen and University of Twente
Lucia Cloth , University of Twente
Maneesh Khattri , University of Twente
Reza Pulungan , Saarland University
pp. 722-731

A Wavefront Parallelisation of CTMC Solution Using MTBDDs (Abstract)

David Parker , University of Birmingham
Marta Kwiatkowska , University of Birmingham
Yi Zhang , University of Birmingham
pp. 732-741

Lumping Matrix Diagram Representations of Markov Models (Abstract)

William H. Sanders , University of Illinois at Urbana-Champaign
Salem Derisavi , University of Illinois at Urbana-Champaign
Peter Kemper , Universität Dortmund
pp. 742-751
Session 7C: Experimental Microprocessor Evaluation

null (PDF)

pp. null

Microprocessor Sensitivity to Failures: Control vs Execution and Combinational vs Sequential Logic (Abstract)

Ravishankar Iyer , University of Illinois at Urbana-Champaign
Anoop Vetteth , University of Illinois at Urbana-Champaign
Zbigniew Kalbarczyk , University of Illinois at Urbana-Champaign
Giacinto Paolo Saggese , University of Illinois at Urbana-Champaign
pp. 760-769

Engineering Over-Clocking: Reliability-Performance Trade-Offs for High-Performance Register Files (Abstract)

Yehea I. Ismail , Northwestern University
Gokhan Memik , Northwestern University
Arindam Mallik , Northwestern University
Masud H. Chowdhury , University of Illinois at Chicago
pp. 770-779
Session 8C: Replication and Checkpointing Protocol Evaluation

null (PDF)

pp. null

Analysis of Probabilistic Trapezoid Protocol for Data Replication (Abstract)

Mamoru Ohara , Tokyo Metropolitan University
Satoshi Fukumoto , Tokyo Metropolitan University
Tabito Suzuki , Tokyo Metropolitan University
Kazuhiko Iwasaki , Tokyo Metropolitan University
Masayuki Arai , Tokyo Metropolitan University
pp. 782-791

Testing the Dependability and Performance of Group Communication Based Database Replication Protocols (Abstract)

L. Soares , University of Minho
A. Sousa , University of Minho
R. Oliveira , University of Minho
L. Rocha , University of Minho
F. Moura , University of Minho
A. Correia Jr. , University of Minho
J. Pereira , University of Minho
pp. 792-801

Model-Based Failure Analysis of Journaling File Systems (Abstract)

Vijayan Prabhakaran , University of Wisconsin - Madison
Remzi H. Arpaci-Dusseau , University of Wisconsin - Madison
Andrea C. Arpaci-Dusseau , University of Wisconsin - Madison
pp. 802-811

Modeling Coordinated Checkpointing for Large-Scale Supercomputers (Abstract)

Lawrence Votta , Sun Microsystems
Christopher Vick , Sun Microsystems
Karthik Pattabiraman , University of Illinois at Urbana-Champaign
Zbigniew Kalbarczyk , University of Illinois at Urbana-Champaign
Long Wang , University of Illinois at Urbana-Champaign
Alan Wood , Sun Microsystems
Ravishankar K. Iyer , University of Illinois at Urbana-Champaign
pp. 812-821
Workshop on Dependable Software — Tools and Methods

Workshop Abstract (PDF)

Yoshiki Kinoshita , National Institute of Advanced Industrial Science and Technology - Japan
Takuya Katayama , Japan Advanced Institute of Science and Technology
Yutaka Ishikawa , University of Tokyo
pp. 824
Workshop on Hot Topics in System Depend

Workshop Abstract (PDF)

David Oppenheimer , University of California at Berkeley
George Candea , Stanford University
pp. 826-827
Workshop on Assurance of Networking Systems Dependability Service Level Agreements

Workshop Abstract (PDF)

Saida Benlarbi , Alcatel - IP Division
pp. 830
Author Index

Author Index (PDF)

pp. 831-833
90 ms
(Ver 3.1 (10032016))