The Community for Technology Leaders
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (2007)
Edinburgh, UK
June 25, 2007 to June 28, 2007
ISBN: 0-7695-2855-4
TABLE OF CONTENTS
Introduction

Reviewers for DCCS (PDF)

pp. xxi-xxiii
Keynote Address

Science and Engineering: A Collusion of Cultures (Abstract)

Tony Hoare , Microsoft Research Ltd., Cambridge
pp. 2-9
Session 1A: Security Protection: Architectural Approaches

Augmenting Branch Predictor to Secure Program Execution (Abstract)

Yixin Shi , University of Illinois at Chicago, USA
Gyungho Lee , University of Illinois at Chicago, USA
pp. 10-19

A Firewall for Routers: Protecting against Routing Misbehavior (Abstract)

Ying Zhang , University of Michigan, USA
Jia Wang , AT&T Labs-Research
Z. Morley Mao , University of Michigan, USA
pp. 20-29

An Architectural Approach to Preventing Code Injection Attacks (Abstract)

Xuxian Jiang , George Mason University, USA
Ryan Riley , Purdue University, USA
Dongyan Xu , Purdue University, USA
pp. 30-40
Session 1B: Software Fault Tolerance

Failure Resilience for Device Drivers (Abstract)

Philip Homburg , Vrije Universiteit, The Netherlands
Ben Gras , Vrije Universiteit, The Netherlands
Jorrit N. Herder , Vrije Universiteit, The Netherlands
Herbert Bos , Vrije Universiteit, The Netherlands
Andrew S. Tanenbaum , Vrije Universiteit, The Netherlands
pp. 41-50

Fault Tolerance Connectors for Unreliable Web Services (Abstract)

Jean-Charles Fabre , LAAS-CNRS, France
Nicolas Salatge , LAAS-CNRS, France
pp. 51-60

Robustness and Security Hardening of COTS Software Libraries (Abstract)

Martin Su?kraut , Technische Universitat Dresden, Germany
Christof Fetzer , Technische Universitat Dresden, Germany
pp. 61-71
Session 2A: Distributed Consensus

Communication Predicates: A High-Level Abstraction for Coping with Transient and Dynamic Faults (Abstract)

Martin Hutle , Ecole Polytechnique Federale de Lausanne, Switzerland
Andre Schiper , Ecole Polytechnique Federale de Lausanne, Switzerland
pp. 92-101

Synchronous Consensus with Mortal Byzantines (Abstract)

Bettina Weiss , TU Wien, Austria
Gunther Gridling , TU Wien, Austria
Jean-Paul Blanquart , Astrium Satellites, France
Josef Widder , TU Wien, Austria; Ecole Polytechnique, France
pp. 102-112
Session 2B: Practical Experience Reports

Reliability Techniques for RFID-Based Object Tracking Applications (Abstract)

Rittwik Jana , AT&T Labs--Research, USA
Ahmad Rahmati , Rice University, USA
Lin Zhong , Rice University, USA
Matti Hiltunen , AT&T Labs--Research, USA
pp. 113-118

Profiling Attacker Behavior Following SSH Compromises (Abstract)

Robin Berthier , University of Maryland, USA
Michel Cukier , University of Maryland, USA
Daniel Ramsbrock , University of Maryland, USA
pp. 119-124

Dependability Assessment of Grid Middleware (Abstract)

Jie Xu , University of Leeds, UK
Nik Looker , University of Leeds, UK
pp. 125-130

Assessing Robustness of Web-Services Infrastructures (Abstract)

Nuno Laranjeiro , University of Coimbra, Portugal
Marco Vieira , University of Coimbra, Portugal
Henrique Madeira , University of Coimbra, Portugal
pp. 131-136

Protecting Cryptographic Keys from Memory Disclosure Attacks (Abstract)

Keith Harrison , University of Texas at San Antonio, USA
Shouhuai Xu , University of Texas at San Antonio, USA
pp. 137-143
Session 3A: Embedded Systems

Fault Tolerant Planning for Critical Robots (Abstract)

Jeremie Guiochet , LAAS-CNRS, France
Benjamin Lussier , LAAS-CNRS, France
David Powell , LAAS-CNRS, France
Marc-Olivier Killijian , LAAS-CNRS, France
Matthieu Gallien , LAAS-CNRS, France
Felix Ingrand , LAAS-CNRS, France
pp. 144-153

A Tunable Add-On Diagnostic Protocol for Time-Triggered Systems (Abstract)

Fulvio Tagliabo , Fiat, Italy
Astrit Ademaj , TU Vienna, Austria
Jens Koch , Airbus Deutschland, Germany
Neeraj Suri , TU Darmstadt, Germany
Marco Serafini , TU Darmstadt, Germany
Jonny Vinter , SP Sweden
Wolfgang Brandstatter , Audi, Germany
pp. 164-174
Session 3B: Dependability Modeling

Enhanced Reliability Modeling of RAID Storage Systems (Abstract)

Michael Pecht , University of Maryland, USA
Jon G. Elerath , Network Appliance, Inc.
pp. 175-184
Session 4A: Hardware Fault Tolerance: Emerging Challenges

Superscalar Processor Performance Enhancement through Reliable Dynamic Clock Frequency Tuning (Abstract)

Naga D. Avirneni , Iowa State University, USA
Viswanathan Subramanian , Iowa State University, USA
Mikel Bezdek , Iowa State University, USA
Arun Somani , Iowa State University, USA
pp. 196-205

Determining Fault Tolerance of XOR-Based Erasure Codes Efficiently (Abstract)

Ram Swaminathan , Hewlett-Packard Labs
Jay J. Wylie , Hewlett-Packard Labs
pp. 206-215

Fault Tolerant Approaches to Nanoelectronic Programmable Logic Arrays (Abstract)

Ramesh Karri , Polytechnic University
Wenjing Rao , UC San Diego, USA
Alex Orailoglu , UC San Diego, USA
pp. 216-224
Session 4B: VM Rejuvenation and Network Reliability

Concilium: Collaborative Diagnosis of Broken Overlay Routes (Abstract)

James W. Mickens , University of Michigan, USA
Brian D. Noble , University of Michigan, USA
pp. 225-234

R-Sentry: Providing Continuous Sensor Services against Random Node Failures (Abstract)

Shengchao Yu , Rutgers University, USA
Yanyong Zhang , Rutgers University, USA
pp. 235-244

A Fast Rejuvenation Technique for Server Consolidation with Virtual Machines (Abstract)

Kenichi Kourai , Tokyo Institute of Technology, Japan
Shigeru Chiba , Tokyo Institute of Technology, Japan
pp. 245-255
Session 5A: Soft Errors: Analysis and Protection

Architecture-Level Soft Error Analysis: Examining the Limits of Common Assumptions (Abstract)

Pradip Bose , IBM T.J. Watson Research Center, USA
Sarita V. Adve , University of Illinois at Urbana-Champaign, USA
Xiaodong Li , University of Illinois at Urbana-Champaign, USA
Jude A. Rivers , IBM T.J. Watson Research Center, USA
pp. 266-275

Feedback Redundancy: A Power Efficient SEU-Tolerant Latch Design for Deep Sub-Micron Technologies (Abstract)

A. Ejlali , Sharif University of Technology, Iran
M. Fazeli , Sharif University of Technology, Iran
A. Patooghy , Sharif University of Technology, Iran
S.G. Miremadi , Sharif University of Technology, Iran
pp. 276-285

Using Register Lifetime Predictions to Protect Register Files against Soft Errors (Abstract)

Josep Torrellas , University of Illinois at Urbana-Champaign, USA
Pablo Montesinos , University of Illinois at Urbana-Champaign, USA
Wei Liu , University of Illinois at Urbana-Champaign, USA
pp. 286-296
Session 5B: Processor Level Fault Tolerance

Using Process-Level Redundancy to Exploit Multiple Cores for Transient Fault Tolerance (Abstract)

Daniel A. Connors , U. of Colorado at Boulder, USA
Vijay Janapa Reddi , Harvard University, USA
Alex Shye , U. of Colorado at Boulder, USA
Tipp Moseley , U. of Colorado at Boulder, USA
Joseph Blomstedt , U. of Colorado at Boulder, USA
pp. 297-306

Inherent Time Redundancy (ITR): Using Program Repetition for Low-Overhead Fault Tolerance (Abstract)

Vimal Reddy , North Carolina State University, USA
Eric Rotenberg , North Carolina State University, USA
pp. 307-316

Utilizing Dynamically Coupled Cores to Form a Resilient Chip Multiprocessor (Abstract)

Jose F. Martinez , Cornell University, USA
Engin Ipek , Cornell University, USA
Christopher LaFrieda , Cornell University, USA
Rajit Manohar , Cornell University, USA
pp. 317-326

BlackJack: Hard Error Detection with Redundant Threads on SMT (Abstract)

T.N. Vijaykumar , Purdue University, USA
Ethan Schuchman , Purdue University, USA
pp. 327-337
Session 6A: Critical Systems: Risk Analysis and Assurance

Confidence: Its Role in Dependability Cases for Risk Assessment (Abstract)

Robin E. Bloomfield , City University, London, UK
Bev Littlewood , City University, London, UK
David Wright , City University, London, UK
pp. 338-346

Assurance Based Development of Critical Systems (Abstract)

Elisabeth A. Strunk , The Aerospace Corporation
John C. Knight , University of Virginia, USA
Patrick J. Graydon , University of Virginia, USA
pp. 347-357
Session 6B: Security Threats and Novel Detection

Multiprocessors May Reduce System Dependability under File-Based Race Condition Attacks (Abstract)

Jinpeng Wei , Georgia Institute of Technology, USA
Calton Pu , Georgia Institute of Technology, USA
pp. 358-367

Understanding Resiliency of Internet Topology against Prefix Hijack Attacks (Abstract)

Beichuan Zhang , University of Arizona, USA
Lixia Zhang , DARPA
Mohit Lad , University of California, Los Angeles, USA
pp. 368-377

User Discrimination through Structured Writing on PDAs (Abstract)

Rachel R.M. Roberts , Carnegie Mellon University, USA
Kevin S. Killourhy , Carnegie Mellon University, USA
Roy A. Maxion , Carnegie Mellon University, USA
Fahd Arshad , Carnegie Mellon University, USA
pp. 378-388
Session 7A: Timing Model and Network Protocols

How to Choose a Timing Model? (Abstract)

Idit Keidar , Technion, Israel
Alexander Shraer , Technion, Israel
pp. 389-398

Electing an Eventual Leader in an Asynchronous Shared Memory System (Abstract)

Ernesto Jimenez , Universidad Politecnica de Madrid, Spain
Michel Raynal , IRISA, Universite de Rennes, France
Antonio Fernandez , Universidad Rey Juan Carlos, Spain
pp. 399-408

Minimizing Response Time for Quorum-System Protocols over Wide-Area Networks (Abstract)

Florian Oprea , Carnegie Mellon University, USA
Michael K. Reiter , Carnegie Mellon University, USA
pp. 409-418

HyParView: A Membership Protocol for Reliable Gossip-Based Broadcast (Abstract)

Luis Rodrigues , University of Lisbon, Portugal
Jose Pereira , University of Minho, Portugal
Joao Leitao , University of Lisbon, Portugal
pp. 419-429
Session 7B: Security Protection: Algorithmic Approaches

Dynamic Cross-Realm Authentication for Multi-Party Service Interactions (Abstract)

Xianxian Li , Beihang University, China
Dacheng Zhang , University of Leeds, UK
Jie Xu , University of Leeds, UK
pp. 440-449

Enhancing DNS Resilience against Denial of Service Attacks (Abstract)

Dan Massey , Colorado State University, USA
Lixia Zhang , UCLA, USA
Vasileios Pappas , T.J. Watson Center, IBM Research
pp. 450-459

Automatic Cookie Usage Setting with CookiePicker (Abstract)

Chuan Yue , The College of William and Mary
Mengjun Xie , The College of William and Mary
Haining Wang , The College of William and Mary
pp. 460-470
Session 8A: Networking

Greedy Receivers in IEEE 802.11 Hotspots (Abstract)

Mi Kyung Han , The University of Texas at Austin, USA
Brian Overstreet , The University of Texas at Austin, USA
Lili Qiu , The University of Texas at Austin, USA
pp. 471-480

Emergent Structure in Unstructured Epidemic Multicast (Abstract)

Jose Pereira , U. Minho, Portugal
Nuno Carvalho , U. Minho, Portugal
Rui Oliveira , U. Minho, Portugal
Luis Rodrigues , U. Lisboa, Portugal
pp. 481-490

The Case for FEC-Based Reliable Multicast in Wireless Mesh Networks (Abstract)

Y. Charlie Hu , Purdue University, USA
Dimitrios Koutsonikolas , Purdue University, USA
pp. 491-501
Session 8B: Experimental Dependability Assessment

On the Selection of Error Model(s) for OS Robustness Evaluation (Abstract)

Andreas Johansson , TU-Darmstadt, Germany
Neeraj Suri , TU-Darmstadt, Germany
Brendan Murphy , Microsoft Research, UK
pp. 502-511

Experimental Risk Assessment and Comparison Using Software Fault Injection (Abstract)

R. Moraes , UNICAMP, Brazil
H. Madeira , University of Coimbra, Portugal
J. Duraes , University of Coimbra, Portugal
R. Barbosa , Critical Software SA, Portugal
E. Martins , UNICAMP, Brazil
pp. 512-521

Foundations of Measurement Theory Applied to the Evaluation of Dependability Attributes (Abstract)

Andrea Bondavalli , University of Florence, Italy
Andrea Ceccarelli , University of Florence, Italy
Lorenzo Falai , University of Florence, Italy
Michele Vadursi , University of Naples, Italy
pp. 522-533
Session 1C: System Architecture and Software Assessment

A Framework for Architecture-Level Lifetime Reliability Modeling (Abstract)

Zhigang Hu , IBM T.J. Watson Research Center, USA
Jude A. Rivers , IBM T.J. Watson Research Center, USA
Jeonghee Shin , IBM T.J. Watson Research Center, USA
Pradip Bose , IBM T.J. Watson Research Center, USA
Victor Zyuban , IBM T.J. Watson Research Center, USA
pp. 534-543

Processor-Level Selective Replication (Abstract)

Ravishankar Iyer , Center for Reliable and High Performance Computing
Nithin Nakka , Center for Reliable and High Performance Computing
Karthik Pattabiraman , Center for Reliable and High Performance Computing
pp. 544-553

Robustness Testing of the Windows DDK (Abstract)

Manuel Mendonca , University of Lisboa, Portugal
Nuno Neves , University of Lisboa, Portugal
pp. 554-564
Session 2C: Measurement and Monitoring

SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks (Abstract)

Ness B. Shroff , Purdue University, USA
Saurabh Bagchi , Purdue University, USA
Issa Khalil , Purdue University, USA
pp. 565-574

What Supercomputers Say: A Study of Five System Logs (Abstract)

Adam Oliner , Stanford University, USA
Jon Stearley , Sandia National Laboratories, USA
pp. 575-584

How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones (Abstract)

Marcello Cinque , Universita degli Studi di Napoli Federico II, Italy
Zbigniew Kalbarczyk , University of Illinois at Urbana-Champaign, USA
Ravishankar K. Iyer , University of Illinois at Urbana-Champaign, USA
Domenico Cotroneo , Universita degli Studi di Napoli Federico II, Italy
pp. 585-594

A Real-Time Network Traffic Profiling System (Abstract)

Zhi-Li Zhang , University of Minnesota, USA
Supratik Bhattacharyya , SnapTell Inc.
Feng Wang , University of Minnesota, USA
Kuai Xu , Yahoo! Inc.
pp. 595-605
Session 3C: Practical Experience Reports

RAS by the Yard (Abstract)

Swami Nathan , Sun Microsystems, Inc.
Alan Wood , Sun Microsystems, Inc.
pp. 606-611

Web Services Wind Tunnel: On Performance Testing Large-Scale Stateful Web Services (Abstract)

Jing Shiau , Microsoft Corporation
Chen Shang , Microsoft Corporation
Marcelo De Barros , Microsoft Corporation
Hui Shi , Microsoft Corporation
Kenton Gidewall , Microsoft Corporation
Joe Forsmann , Microsoft Corporation
pp. 612-617

Application of Software Watchdog as a Dependability Software Service for Automotive Safety Relevant Systems (Abstract)

Vera Lauer , DaimlerChrysler AG, Germany
Xi Chen , DaimlerChrysler AG, Germany
Martin Hiller , Volvo Technology, Sweden
Juejing Feng , RWTH Aachen University, Germany
pp. 618-624
Session 4C: Distributed Algorithms

Evaluating the Impact of Simultaneous Round Participation and Decentralized Decision on the Performance of Consensus (Abstract)

Francisco Brasileiro , Universidade Federal de Campina Grande, Brasil
Livia Sampaio , Universidade Federal de Campina Grande, Brasil
Fabiola Greve , Universidade Federal da Bahia, Brasil
Michel Hurfin , INRIA Rennes, France
pp. 625-634

On the Cost of Modularity in Atomic Broadcast (Abstract)

Olivier Rutti , EPFL, Switzerland
Andre Schiper , EPFL, Switzerland
Sergio Mena , University of York, United Kingdom
Richard Ekwall , EPFL, Switzerland
pp. 635-644

Eventually k-Bounded Wait-Free Distributed Daemons (Abstract)

Yantao Song , Texas A&M University, USA
Scott M. Pike , Texas A&M University, USA
pp. 645-655
Session 5C: Availability of Distributed Systems

Measuring Availability in Optimistic Partition-Tolerant Systems with Data Constraints (Abstract)

Simin Nadjm-Tehrani , Linkoping University, Sweden
Stefan Beyer , Universidad Politcnica de Valencia, Spain
Pablo Galdamez , Universidad Politcnica de Valencia, Spain
Mikael Asplund , Linkoping University, Sweden
pp. 656-665

Improving Recoverability in Multi-tier Storage Systems (Abstract)

Marcos K. Aguilera , HP Labs, USA
Arif Merchant , HP Labs, USA
Kiran-Kumar Muniswamy-Reddy , Harvard University, USA
Mustafa Uysal , HP Labs, USA
Kimberly Keeton , HP Labs, USA
pp. 677-686

Portable and Efficient Continuous Data Protection for Network File Servers (Abstract)

Tzi-cker Chiueh , Stony Brook University
Ningning Zhu , Stony Brook University
pp. 687-697
Session 6C: Modeling and Evaluation

Dynamic Fault Tree Analysis Using Input/Output Interactive Markov Chains (Abstract)

Pepijn Crouzen , Saarland University, Germany
Hichem Boudali , University of Twente, Netherlands
Marielle Stoelinga , University of Twente, Netherlands
pp. 708-717

Uniformity by Construction in the Analysis of Nondeterministic Stochastic Systems (Abstract)

Sven Johr , Universitat des Saarlandes, Germany
Holger Hermanns , Universitat des Saarlandes, Germany
pp. 718-728
Session 7C: Quality of Service and Error Recovery

A Reinforcement Learning Approach to Automatic Error Recovery (Abstract)

Chun Yuan , Microsoft Research Asia, China
Qijun Zhu , Tianjin University, China
pp. 729-738

On the Quality of Service of Crash-Recovery Failure Detectors (Abstract)

Stuart Anderson , University of Edinburgh, UK
Tiejun Ma , University of Edinburgh, UK
Jane Hillston , University of Edinburgh, UK
pp. 739-748

E2EProf: Automated End-to-End Performance Management for Enterprise Systems (Abstract)

Fernando Alegre , Georiga Institute of Technology, USA
Sandip Agarwala , Georiga Institute of Technology, USA
Jegannathan Mehalingham , Delta Air Lines, USA
Karsten Schwan , Georiga Institute of Technology, USA
pp. 749-758

Bounding Peer-to-Peer Upload Traffic in Client Networks (Abstract)

Chun-Ying Huang , National Taiwan University, Taiwan
Chin-Laung Lei , National Taiwan University, Taiwan
pp. 759-769
Session 8C: Stochastic Modeling

Performability Models for Multi-Server Systems with High-Variance Repair Durations (Abstract)

Imad Antonios , Southern Connecticut State University, USA
Hans-Peter Schwefel , Aalborg University, Denmark
pp. 770-779

Computing Battery Lifetime Distributions (Abstract)

Lucia Cloth , University of Twente, Netherlands
Boudewijn R. Haverkort , University of Twente, Netherlands
Marijn R. Jongerden , University of Twente, Netherlands
pp. 780-789

Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms (Abstract)

William H. Sanders , University of Illinois at Urbana-Champaign, USA
Tod Courtney , University of Illinois at Urbana-Champaign, USA
Fabrice Stevens , France Telecom Research and Development, France
Elizabeth Van Ruitenbeek , University of Illinois at Urbana-Champaign, USA
pp. 790-800
SPECIAL TRACKS

DSN 2007 Tutorials (PDF)

Luis Rodrigues , Universidade de Lisboa, Portugal
pp. 801

DSN 2007 Workshops (PDF)

Christof Fetzer , TU Dresden, Germany
pp. 802

Workshop on Dependable Application Support for Self-Organizing Networks (DASSON 2007) (PDF)

Ajoy Datta , Univ of Nevada, Las Vegas, USA
Paul Ezhilchelvan , Newcastle University, UK
Michel Raynal , ASAP, IRISA, France
pp. 803

Third Workshop on Hot Topics in System Dependability HotDep'07 (PDF)

Miguel Castro , Microsoft Research, UK
John Wilkes , Hewlett Packard Laboratories, USA
pp. 804

Workshop on Architecting Dependable Systems (WADS 2007) (PDF)

Felicita Di Giandomenico , ISTI-CNR, Italy
Cristina Gacek , Newcastle University, UK
Rogerio de Lemos , University of Kent, UK
pp. 805-806

Assurance Cases for Security: The Metrics Challenge (PDF)

Robin Bloomfield , Center for Software Reliability
Charles B. Weinstock , Software Engineering Institute
Marcelo Masera , Joint Research Center of the European Commission
Ann Miller , University of Missouri at Rolla, USA
O. Sami Saydjari , Cyber Defense Agency
pp. 807-808

Workshop on Dependable and Secure Nanocomputing (PDF)

Ravishankar K. Iyer , Coordinated Science Laboratory, USA
Michael Nicolaidis , TIMA and iRoc Technologies, France
Jean Arlat , University of Toulouse, France
pp. 809-810

Student Forum (PDF)

Farnam Jahanian , University of Michigan, USA
pp. 811

Fast Abstracts (PDF)

Hiroshi Nakamura , The University of Tokyo, Japan
pp. 812

Industry Session (PDF)

Lisa Spainhower , IBM, USA
pp. 814
Author Index

Author Index (PDF)

pp. 815
76 ms
(Ver 3.3 (11022016))