The Community for Technology Leaders
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (2006)
Philadelphia, Pennsylvania
June 25, 2006 to June 28, 2006
ISBN: 0-7695-2607-1
TABLE OF CONTENTS

Delivering Dependability: A Moving Target (PDF)

A. Goyal , IBM Software Group
pp. xxiii
Introduction
Keynote Address

Delivering Dependability: A Moving Target (PDF)

Ambuj Goyal , IBM Software Group
pp. xxiii
Session 1A: Real-Time and Embedded Systems

Efficient High Hamming Distance CRCs for Embedded Networks (Abstract)

Philip Koopman , Carnegie Mellon University
Justin Ray , Carnegie Mellon University
pp. 3-12

Memory-Conscious Reliable Execution on Embedded Chip Multiprocessors (Abstract)

I. Kolcu , University of Manchester, UK
G. Chen , Pennsylvania State University
M. Kandemir , Pennsylvania State University
pp. 13-22

Static Analysis to Enforce Safe Value Flow in Embedded Control Systems (Abstract)

Sumant Kowshik , University of Illinois at Urbana-Champaign
Grigore Rosu , University of Illinois at Urbana-Champaign
Lui Sha , University of Illinois at Urbana-Champaign
pp. 23-34
Session 2A: Safety-Critical Systems

The Startup Problem in Fault-Tolerant Time-Triggered Communication (Abstract)

Wilfried Steiner , Vienna University of Technology, Austria
Hermann Kopetz , Vienna University of Technology, Austria
pp. 35-44

A Reconfigurable Generic Dual-Core Architecture (Abstract)

Andreas Steininger , Vienna University of Technology
Thomas Kottke , EADS Deutschland GmbH
pp. 45-54

User Interface Defect Detection by Hesitation Analysis (Abstract)

Roy A. Maxion , Carnegie Mellon University
Robert W. Reeder , Carnegie Mellon University
pp. 61-72
Session 3A: Architecture and Operating Systems

Automatic Instruction-Level Software-Only Recovery (Abstract)

George A. Reis , Princeton University, NJ
Jonathan Chang , Princeton University, NJ
David I. August , Princeton University, NJ
pp. 83-92

Exploring Fault-Tolerant Network-on-Chip Architectures (Abstract)

Chrysostomos Nicopoulos , Pennsylvania State University
N. Vijaykrishnan , Pennsylvania State University
Jongman Kim , Pennsylvania State University
Chita R. Das , Pennsylvania State University
Dongkook Park , Pennsylvania State University
pp. 93-104
Session 4A: Byzantine Faults

Scaling Byzantine Fault-Tolerant Replication toWide Area Networks (Abstract)

David Zage , Purdue University,West Lafayette, IN.
Jonathan Kirsch , Johns Hopkins University, Baltimore, MD
Danny Dolev , Hebrew University of Jerusalem, Jerusalem
Josh Olsen , Purdue University,West Lafayette, IN.
Claudiu Danilov , Johns Hopkins University, Baltimore, MD
John Lane , Johns Hopkins University, Baltimore
Cristina Nita-Rotaru , Purdue University,West Lafayette, IN.
Yair Amir , Johns Hopkins University, Baltimore, MD
pp. 105-114

Lucky Read/Write Access to Robust Atomic Storage (Abstract)

Ron R. Levy , EPFL, CH-1015 Lausanne, Switzerland
Rachid Guerraoui , MIT, Cambridge, MA
Marko Vukolic , EPFL, CH-1015 Lausanne, Switzerland
pp. 125-136
Session 5A: Consensus and Leader Election

One-step Consensus with Zero-Degradation (Abstract)

Neeraj Suri , Technische Universitat Darmstadt
Dan Dobre , Technische Universitat Darmstadt
pp. 137-146

Consensus with Byzantine Failures and Little System Synchrony (Abstract)

Hugues Fauconnier , LIAFA, Universite Paris 7, France
Carole Delporte-Gallet , IGM, ESIEE Paris, France
Sam Toueg , University of Toronto
Marcos K. Aguilera , HP Laboratories, Palo Alto, California, USA
pp. 147-155

Solving Atomic Broadcast with Indirect Consensus (Abstract)

Andre Schiper , Ecole Polytechnique Federale de Lausanne (EPFL), Switzerland
Richard Ekwall , Ecole Polytechnique Federale de Lausanne (EPFL), Switzerland
pp. 156-165

Eventual Leader Election with Weak Assumptions on Initial Knowledge, Communication Reliability, and Synchrony (Abstract)

Ernesto Jimenez , EUI, Universidad Polit?ecnica de Madrid, 28031 Madrid, Spain
Michel Raynal , IRISA, Universite de Rennes, Campus de Beaulieu 35 042 Rennes, France
Antonio Fernandez , LADyR, GSyC, Universidad Rey Juan Carlos, 28933 M?ostoles, Spain
pp. 166-178
Session 5B: Intrusion Detection and Tolerance

Hotspots: The Root Causes of Non-Uniformity in Self-Propagating Malware (Abstract)

Z. Morley Mao , University of Michigan
Farnam Jahanian , University of Michigan
Evan Cooke , University of Michigan
pp. 179-188

A Multi-Resolution Approach forWorm Detection and Containment (Abstract)

Michael K. Reiter , Carnegie Mellon University
Vyas Sekar , Carnegie Mellon University
Yinglian Xie , Carnegie Mellon University
Hui Zhang , Carnegie Mellon University
pp. 189-198

Honeypot-Aware Advanced Botnet Construction and Maintenance (Abstract)

Cliff C. Zou , University of Central Florida
Ryan Cunningham , University of Central Florida
pp. 199-208

Barbarians in the Gate: An Experimental Validation of NIC-based Distributed Firewall Performance and Flood Tolerance (Abstract)

William H. Sanders , University of Illinois at Urbana-Champaign
Michael Ihde , University of Illinois at Urbana-Champaign
pp. 209-216
Session 6A: Storage Systems

HoVer Erasure Codes For Disk Arrays (Abstract)

James Lee Hafner , IBM Almaden Research Center, 650 Harry Road, San Jose
pp. 217-226

Storage Allocation in Unreliable Peer-to-Peer Systems (Abstract)

John A. Chandy , University of Connecticut
pp. 227-236

Reliability for Networked Storage Nodes (Abstract)

James Lee Hafner , IBM Almaden Research Center
Richard A. Golding , IBM Almaden Research Center
KK Rao , IBM Almaden Research Center
pp. 237-248
Session 7A: Complex and Large-Scale Systems

A large-scale study of failures in high-performance computing systems (Abstract)

Garth A. Gibson , Carnegie Mellon University
Bianca Schroeder , Carnegie Mellon University
pp. 249-258

Tracking Probabilistic Correlation of Monitoring Data for Fault Detection in Complex Systems (Abstract)

Zhen Guo , New Jersey Institute of Technology
Kenji Yoshihira , NEC Laboratories America, Princeton, NJ
Haifeng Chen , NEC Laboratories America, Princeton, NJ
Guofei Jiang , NEC Laboratories America, Princeton, NJ
pp. 259-268

Efficiently Detecting All Dangling Pointer Uses in Production Servers (Abstract)

Vikram Adve , University of Illinois at Urbana-Champaign
Dinakar Dhurjati , University of Illinois at Urbana-Champaign
pp. 269-280
Session 7C: VLSI

In-Register Duplication: Exploiting Narrow-Width Value for Improving Register File Reliability (Abstract)

Sotirios G. Ziavras , New Jersey Institute of Technology
Jie Hu , New Jersey Institute of Technology
Shuai Wang , New Jersey Institute of Technology
pp. 281-290

Run-Time Reconfiguration for Emulating Transient Faults in VLSI Systems (Abstract)

Pedro Gil , Technical University of Valencia (UPV), Spain
David de Andres , Technical University of Valencia (UPV), Spain
Daniel Gil , Technical University of Valencia (UPV), Spain
Juan Carlos Ruiz , Technical University of Valencia (UPV), Spain
pp. 291-300

CADRE: Cycle-Accurate Deterministic Replay for Hardware Debugging (Abstract)

Josep Torrellas , University of Illinois
Brian Greskamp , University of Illinois
Smruti R. Sarangi , University of Illinois
pp. 301-312
Session 8A: Networking

Collecting and Analyzing Failure Data of Bluetooth Personal Area Networks (Abstract)

Domenico Cotroneo , Universita di Napoli Federico II
Stefano Russo , Laboratorio ITEM- Consorzio Interuniversitario Nazionale per l?Informatica
Marcello Cinque , Universita di Napoli Federico II
pp. 313-322

Improving BGP Convergence Delay for Large-Scale Failures (Abstract)

Amit Sahoo , UC Davis
Prasant Mohapatra , Intel Corporation, Hillsboro, OR
Krishna Kant , Intel Corporation, Hillsboro, OR
pp. 323-332

Secure Split Assignment Trajectory Sampling: A Malicious Router Detection System (Abstract)

Sihyung Lee , Camegie Mellon University
Tina Wong , Camegie Mellon University
Hyong S. Kim , Camegie Mellon University
pp. 333-342

A General Framework for Scalability and Performance Analysis of DHT Routing Systems (Abstract)

Joseph S. Kong , University of California, Los Angeles
Vwani P. Roychowdhury , University of California, Los Angeles
Jesse S. A. Bridgewater , University of California, Los Angeles
pp. 343-354
Session 1B: Dependable Storage

Dependability Analysis of Virtual Memory Systems (Abstract)

Lakshmi N. Bairavasundaram , University of Wisconsin, Madison
Andrea C. Arpaci-Dusseau , University of Wisconsin, Madison
Remzi H. Arpaci-Dusseau , University of Wisconsin, Madison
pp. 355-364

Assessment of the Effect of Memory Page Retirement on System RAS Against Hardware Faults (Abstract)

Michael W. Shapiro , Sun Microsystems, Inc.
Zuheir Totari , Sun Microsystems, Inc.
Peter Carruthers , Sun Microsystems, Inc.
Dong Tang , Sun Microsystems, Inc.
pp. 365-370

Designing dependable storage solutions for shared application environments (Abstract)

Arif Merchant , Hewlett Packard Labs, Palo Alto, California
Shravan Gaonkar , University of Illinois at Urbana-Champaign
Kimberly Keeton , Hewlett Packard Labs, Palo Alto, California
William H. Sanders , University of Illinois at Urbana-Champaign
pp. 371-382
Session 2B: Attack Prevention and Mitigation

A Statistical Analysis of Attack Data to Separate Attacks (Abstract)

Robin Berthier , University of Maryland, College Park, MD
Michel Cukier , University of Maryland, College Park, MD
Stephanie Tan , University of Maryland, College Park, MD
Susmit Panjwani , University of Maryland, College Park, MD
pp. 383-392

VoIP Intrusion Detection Through Interacting Protocol State Machines (Abstract)

Sushil Jajodia , College of William and Mary, Williamsburg, VA
Hemant Sengar , George Mason University
Duminda Wijesekera , George Mason University
Haining Wang , College of William and Mary, Williamsburg, VA
pp. 393-402

Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter (Abstract)

Chin-Laung Lei , National Taiwan University
Chun-Ying Huang , National Taiwan University
Kuan-Ta Chen , National Taiwan University
pp. 403-412

Accurate and Automated System Call Policy-Based Intrusion Prevention (Abstract)

Lap Chung Lam , Stony Brook University
Wei Li , Stony Brook University
Tzi-cker Chiueh , Stony Brook University
pp. 413-424
Session 3B: Dependability Models

BlueGene/L Failure Analysis and Prediction Models (Abstract)

Anand Sivasubramaniam , Penn State University
Yanyong Zhang , Rutgers University
Morris Jette , Lawrence Livermore National Laboratory
Ramendra Sahoo , IBM T. J. Watson Research Center
Yinglung Liang , Rutgers University
pp. 425-434

Performance Assurance via Software Rejuvenation: Monitoring, Statistics and Algorithms (Abstract)

Kishor S. Trivedi , Duke University
Michael Grottke , Duke University
Alberto Avritzer , Siemens Corporate Research, Princeton, NJ
Elaine J. Weyuker , Duke University
Andre Bondi , Siemens Corporate Research, Princeton, NJ
pp. 435-444

Automatic Recovery Using Bounded Partially Observable Markov Decision Processes (Abstract)

Matti A. Hiltunen , AT&T Labs Research 180 Park Ave. Florham Park, NJ
William H. Sanders , University of Illinois at Urbana-Champaign
Kaustubh R. Joshi , University of Illinois at Urbana-Champaign
Richard D. Schlichting , AT&T Labs Research 180 Park Ave. Florham Park, NJ
pp. 445-456
Session 4B: Attack Analysis

Using Attack Injection to Discover New Vulnerabilities (Abstract)

Joao Antunes , Fac. de Ci.encias da Univ. de Lisboa
Rui Neves , Univ. Tecnica de Lisboa
Nuno Neves , Fac. de Ci.encias da Univ. de Lisboa
Paulo Verissimo , Fac. de Ci.encias da Univ. de Lisboa
Miguel Correia , Fac. de Ci.encias da Univ. de Lisboa
pp. 457-466

Assessing the Attack Threat due to IRC Channels (Abstract)

Robert Meyer , University of Maryland
Michel Cukier , University of Maryland
pp. 467-472

An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks (Abstract)

Claudio Basile , Bell Laboratories, Holmdel, NJ
Zbigniew Kalbarczyk , University of Illinois at Urbana-Champaign, IL 61801
Meeta Gupta , Harvard University, Cambridge, MA
Ravi K. Iyer , University of Illinois at Urbana-Champaign, IL 61801
pp. 473-484
Session 6B: Measuring and Modeling

A Component-Level Path Composition Approach for Efficient Transient Analysis of Large CTMCs (Abstract)

William H. Sanders , University of Illinois at Urbana-Champaign
Vinh V. Lam , University of Illinois at Urbana-Champaign
Peter Buchholz , Informatik IV, Universitat Dortmund, Germany
pp. 485-494

Evaluating the Performability of Systems with Background Jobs (Abstract)

Evgenia Smirni , College of William and Mary, Williamsburg, VA
Ningfang Mi , College of William and Mary, Williamsburg, VA
Qi Zhang , College of William and Mary, Williamsburg, VA
Erik Riedel , Seagate Research, 1251 Waterfront Place, Pittsburgh, PA
Alma Riska , Seagate Research, 1251 Waterfront Place, Pittsburgh, PA
pp. 495-504

A Contribution Towards Solving the Web Workload Puzzle (Abstract)

Katerina Goseva-Popstojanova , West Virginia University, Morgantown, WV
Xuan Wang , West Virginia University, Morgantown, WV
Amit Sangle , West Virginia University, Morgantown, WV
Fengbin Li , West Virginia University, Morgantown, WV
pp. 505-516
Session 7B: Multiple-Server Systems

Empirical and Analytical Evaluation of Systems with Multiple Unreliable Servers (Abstract)

I. Mitrani , University of Newcastle upon Tyne, UK
J. Palmer , University of Newcastle upon Tyne, UK
pp. 517-525

R-Opus: A Composite Framework for Application Performability and QoS in Shared Resource Pools (Abstract)

Ludmila Cherkasova , Hewlett-Packard Labs, Palo Alto, CA, USA
Jerome Rolia , Hewlett-Packard Labs, Palo Alto, CA, USA
pp. 526-535

Cost-Effective Configuration of Content Resiliency Services Under Correlated Failures (Abstract)

Zhen Liu , IBM T. J. Watson Research Center
Jinliang Fan , Georgia Institute of Technology
Tianying Chang , Georgia Institute of Technology
Dimitrios Pendarakis , IBM T. J. Watson Research Center
pp. 536-548
Session 8B: Distributed Algorithms

High Throughput Total Order Broadcast for Cluster Environments (Abstract)

Vivien Quema , INRIA, France
Bastian Pochon , IC EPFL, Switzerland
Rachid Guerraoui , IC EPFL, Switzerland
Ron R. Levy , IC EPFL, Switzerland
pp. 549-557

Improving the Fault Resilience of Overlay Multicast for Media Streaming (Abstract)

Daniel P. Spooner , University of Warwick, UK
Guang Tan , University of Warwick, UK
Stephen A. Jarvis , University of Warwick, UK
pp. 558-567

Randomized Intrusion-Tolerant Asynchronous Services (Abstract)

Paulo Verissimo , University of Lisboa, Portugal
Miguel Correia , University of Lisboa, Portugal
Henrique Moniz , University of Lisboa, Portugal
Nuno Ferreira Neves , University of Lisboa, Portugal
pp. 568-577

A Performance Study on the Signal-On-Fail Approach to Imposing Total Order in the Streets of Byzantium (Abstract)

Qurat-ul-Ain Inayat , University of Newcastle, Newcastle upon Tyne, UK
Paul Devadoss Ezhilchelvan , University of Newcastle, Newcastle upon Tyne, UK
pp. 578-590
Special Tracks

Workshop on Applied Software Reliability (WASR) (PDF)

Claudio Basile , Bell Labs - Lucent, USA
Adnan Agbaria , ISI, USA
pp. 591

Workshop on Architecting Dependable Systems (WADS) (PDF)

Alexander Romanovsky , University of Newcastle upon Tyne, UK
Rog?rio de Lemos , University of Kent at Canterbury, UK
Cristina Gacek , University of Newcastle upon Tyne, UK
pp. 592

Workshop on Empirical Evaluation of Dependability and Security (WEEDS) (PDF)

Michel Cukier , University of Maryland, USA
Ioana Rus , Fraunhofer Center Maryland, USA
pp. 593

Student Forum (PDF)

Christof Fetzer , TU Dresden, Germany
pp. 594

Fast Abstracts (PDF)

Saurabh Bagchi , Purdue University, USA
pp. 595
Author Index

Author Index (PDF)

pp. 596
DSN 2007 Call for Papers
88 ms
(Ver )