The Community for Technology Leaders
37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07) (2007)
Edinburgh, UK
June 25, 2007 to June 28, 2007
ISBN: 0-7695-2855-4

Reviewers for DCCS (PDF)

pp. xxi-xxiii
Keynote Address

Science and Engineering: A Collusion of Cultures (Abstract)

Tony Hoare , Microsoft Research Ltd., Cambridge
pp. 2-9
Session 1A: Security Protection: Architectural Approaches

Augmenting Branch Predictor to Secure Program Execution (Abstract)

Yixin Shi , University of Illinois at Chicago, USA
Gyungho Lee , University of Illinois at Chicago, USA
pp. 10-19

A Firewall for Routers: Protecting against Routing Misbehavior (Abstract)

Ying Zhang , University of Michigan, USA
Z. Morley Mao , University of Michigan, USA
Jia Wang , AT&T Labs-Research
pp. 20-29

An Architectural Approach to Preventing Code Injection Attacks (Abstract)

Ryan Riley , Purdue University, USA
Xuxian Jiang , George Mason University, USA
Dongyan Xu , Purdue University, USA
pp. 30-40
Session 1B: Software Fault Tolerance

Failure Resilience for Device Drivers (Abstract)

Jorrit N. Herder , Vrije Universiteit, The Netherlands
Herbert Bos , Vrije Universiteit, The Netherlands
Ben Gras , Vrije Universiteit, The Netherlands
Philip Homburg , Vrije Universiteit, The Netherlands
Andrew S. Tanenbaum , Vrije Universiteit, The Netherlands
pp. 41-50

Fault Tolerance Connectors for Unreliable Web Services (Abstract)

Nicolas Salatge , LAAS-CNRS, France
Jean-Charles Fabre , LAAS-CNRS, France
pp. 51-60

Robustness and Security Hardening of COTS Software Libraries (Abstract)

Martin Su?kraut , Technische Universitat Dresden, Germany
Christof Fetzer , Technische Universitat Dresden, Germany
pp. 61-71
Session 2A: Distributed Consensus

Communication Predicates: A High-Level Abstraction for Coping with Transient and Dynamic Faults (Abstract)

Martin Hutle , Ecole Polytechnique Federale de Lausanne, Switzerland
Andre Schiper , Ecole Polytechnique Federale de Lausanne, Switzerland
pp. 92-101

Synchronous Consensus with Mortal Byzantines (Abstract)

Josef Widder , TU Wien, Austria; Ecole Polytechnique, France
Gunther Gridling , TU Wien, Austria
Bettina Weiss , TU Wien, Austria
Jean-Paul Blanquart , Astrium Satellites, France
pp. 102-112
Session 2B: Practical Experience Reports

Reliability Techniques for RFID-Based Object Tracking Applications (Abstract)

Ahmad Rahmati , Rice University, USA
Lin Zhong , Rice University, USA
Matti Hiltunen , AT&T Labs--Research, USA
Rittwik Jana , AT&T Labs--Research, USA
pp. 113-118

Profiling Attacker Behavior Following SSH Compromises (Abstract)

Daniel Ramsbrock , University of Maryland, USA
Robin Berthier , University of Maryland, USA
Michel Cukier , University of Maryland, USA
pp. 119-124

Dependability Assessment of Grid Middleware (Abstract)

Nik Looker , University of Leeds, UK
Jie Xu , University of Leeds, UK
pp. 125-130

Assessing Robustness of Web-Services Infrastructures (Abstract)

Marco Vieira , University of Coimbra, Portugal
Nuno Laranjeiro , University of Coimbra, Portugal
Henrique Madeira , University of Coimbra, Portugal
pp. 131-136

Protecting Cryptographic Keys from Memory Disclosure Attacks (Abstract)

Keith Harrison , University of Texas at San Antonio, USA
Shouhuai Xu , University of Texas at San Antonio, USA
pp. 137-143
Session 3A: Embedded Systems

Fault Tolerant Planning for Critical Robots (Abstract)

Benjamin Lussier , LAAS-CNRS, France
Matthieu Gallien , LAAS-CNRS, France
Jeremie Guiochet , LAAS-CNRS, France
Felix Ingrand , LAAS-CNRS, France
Marc-Olivier Killijian , LAAS-CNRS, France
David Powell , LAAS-CNRS, France
pp. 144-153

A Tunable Add-On Diagnostic Protocol for Time-Triggered Systems (Abstract)

Marco Serafini , TU Darmstadt, Germany
Neeraj Suri , TU Darmstadt, Germany
Jonny Vinter , SP Sweden
Astrit Ademaj , TU Vienna, Austria
Wolfgang Brandstatter , Audi, Germany
Fulvio Tagliabo , Fiat, Italy
Jens Koch , Airbus Deutschland, Germany
pp. 164-174
Session 3B: Dependability Modeling

Enhanced Reliability Modeling of RAID Storage Systems (Abstract)

Jon G. Elerath , Network Appliance, Inc.
Michael Pecht , University of Maryland, USA
pp. 175-184
Session 4A: Hardware Fault Tolerance: Emerging Challenges

Superscalar Processor Performance Enhancement through Reliable Dynamic Clock Frequency Tuning (Abstract)

Viswanathan Subramanian , Iowa State University, USA
Mikel Bezdek , Iowa State University, USA
Naga D. Avirneni , Iowa State University, USA
Arun Somani , Iowa State University, USA
pp. 196-205

Determining Fault Tolerance of XOR-Based Erasure Codes Efficiently (Abstract)

Jay J. Wylie , Hewlett-Packard Labs
Ram Swaminathan , Hewlett-Packard Labs
pp. 206-215

Fault Tolerant Approaches to Nanoelectronic Programmable Logic Arrays (Abstract)

Wenjing Rao , UC San Diego, USA
Alex Orailoglu , UC San Diego, USA
Ramesh Karri , Polytechnic University
pp. 216-224
Session 4B: VM Rejuvenation and Network Reliability

Concilium: Collaborative Diagnosis of Broken Overlay Routes (Abstract)

James W. Mickens , University of Michigan, USA
Brian D. Noble , University of Michigan, USA
pp. 225-234

R-Sentry: Providing Continuous Sensor Services against Random Node Failures (Abstract)

Shengchao Yu , Rutgers University, USA
Yanyong Zhang , Rutgers University, USA
pp. 235-244

A Fast Rejuvenation Technique for Server Consolidation with Virtual Machines (Abstract)

Kenichi Kourai , Tokyo Institute of Technology, Japan
Shigeru Chiba , Tokyo Institute of Technology, Japan
pp. 245-255
Session 5A: Soft Errors: Analysis and Protection

Architecture-Level Soft Error Analysis: Examining the Limits of Common Assumptions (Abstract)

Xiaodong Li , University of Illinois at Urbana-Champaign, USA
Sarita V. Adve , University of Illinois at Urbana-Champaign, USA
Pradip Bose , IBM T.J. Watson Research Center, USA
Jude A. Rivers , IBM T.J. Watson Research Center, USA
pp. 266-275

Feedback Redundancy: A Power Efficient SEU-Tolerant Latch Design for Deep Sub-Micron Technologies (Abstract)

M. Fazeli , Sharif University of Technology, Iran
A. Patooghy , Sharif University of Technology, Iran
S.G. Miremadi , Sharif University of Technology, Iran
A. Ejlali , Sharif University of Technology, Iran
pp. 276-285

Using Register Lifetime Predictions to Protect Register Files against Soft Errors (Abstract)

Pablo Montesinos , University of Illinois at Urbana-Champaign, USA
Wei Liu , University of Illinois at Urbana-Champaign, USA
Josep Torrellas , University of Illinois at Urbana-Champaign, USA
pp. 286-296
Session 5B: Processor Level Fault Tolerance

Using Process-Level Redundancy to Exploit Multiple Cores for Transient Fault Tolerance (Abstract)

Alex Shye , U. of Colorado at Boulder, USA
Tipp Moseley , U. of Colorado at Boulder, USA
Vijay Janapa Reddi , Harvard University, USA
Joseph Blomstedt , U. of Colorado at Boulder, USA
Daniel A. Connors , U. of Colorado at Boulder, USA
pp. 297-306

Inherent Time Redundancy (ITR): Using Program Repetition for Low-Overhead Fault Tolerance (Abstract)

Vimal Reddy , North Carolina State University, USA
Eric Rotenberg , North Carolina State University, USA
pp. 307-316

Utilizing Dynamically Coupled Cores to Form a Resilient Chip Multiprocessor (Abstract)

Christopher LaFrieda , Cornell University, USA
Engin Ipek , Cornell University, USA
Jose F. Martinez , Cornell University, USA
Rajit Manohar , Cornell University, USA
pp. 317-326

BlackJack: Hard Error Detection with Redundant Threads on SMT (Abstract)

Ethan Schuchman , Purdue University, USA
T.N. Vijaykumar , Purdue University, USA
pp. 327-337
Session 6A: Critical Systems: Risk Analysis and Assurance

Confidence: Its Role in Dependability Cases for Risk Assessment (Abstract)

Robin E. Bloomfield , City University, London, UK
Bev Littlewood , City University, London, UK
David Wright , City University, London, UK
pp. 338-346

Assurance Based Development of Critical Systems (Abstract)

Patrick J. Graydon , University of Virginia, USA
John C. Knight , University of Virginia, USA
Elisabeth A. Strunk , The Aerospace Corporation
pp. 347-357
Session 6B: Security Threats and Novel Detection

Multiprocessors May Reduce System Dependability under File-Based Race Condition Attacks (Abstract)

Jinpeng Wei , Georgia Institute of Technology, USA
Calton Pu , Georgia Institute of Technology, USA
pp. 358-367

Understanding Resiliency of Internet Topology against Prefix Hijack Attacks (Abstract)

Mohit Lad , University of California, Los Angeles, USA
Beichuan Zhang , University of Arizona, USA
Lixia Zhang , DARPA
pp. 368-377

User Discrimination through Structured Writing on PDAs (Abstract)

Rachel R.M. Roberts , Carnegie Mellon University, USA
Roy A. Maxion , Carnegie Mellon University, USA
Kevin S. Killourhy , Carnegie Mellon University, USA
Fahd Arshad , Carnegie Mellon University, USA
pp. 378-388
Session 7A: Timing Model and Network Protocols

How to Choose a Timing Model? (Abstract)

Idit Keidar , Technion, Israel
Alexander Shraer , Technion, Israel
pp. 389-398

Electing an Eventual Leader in an Asynchronous Shared Memory System (Abstract)

Antonio Fernandez , Universidad Rey Juan Carlos, Spain
Ernesto Jimenez , Universidad Politecnica de Madrid, Spain
Michel Raynal , IRISA, Universite de Rennes, France
pp. 399-408

Minimizing Response Time for Quorum-System Protocols over Wide-Area Networks (Abstract)

Florian Oprea , Carnegie Mellon University, USA
Michael K. Reiter , Carnegie Mellon University, USA
pp. 409-418

HyParView: A Membership Protocol for Reliable Gossip-Based Broadcast (Abstract)

Joao Leitao , University of Lisbon, Portugal
Jose Pereira , University of Minho, Portugal
Luis Rodrigues , University of Lisbon, Portugal
pp. 419-429
Session 7B: Security Protection: Algorithmic Approaches

Dynamic Cross-Realm Authentication for Multi-Party Service Interactions (Abstract)

Dacheng Zhang , University of Leeds, UK
Jie Xu , University of Leeds, UK
Xianxian Li , Beihang University, China
pp. 440-449

Enhancing DNS Resilience against Denial of Service Attacks (Abstract)

Vasileios Pappas , T.J. Watson Center, IBM Research
Dan Massey , Colorado State University, USA
Lixia Zhang , UCLA, USA
pp. 450-459

Automatic Cookie Usage Setting with CookiePicker (Abstract)

Chuan Yue , The College of William and Mary
Mengjun Xie , The College of William and Mary
Haining Wang , The College of William and Mary
pp. 460-470
Session 8A: Networking

Greedy Receivers in IEEE 802.11 Hotspots (Abstract)

Mi Kyung Han , The University of Texas at Austin, USA
Brian Overstreet , The University of Texas at Austin, USA
Lili Qiu , The University of Texas at Austin, USA
pp. 471-480

Emergent Structure in Unstructured Epidemic Multicast (Abstract)

Nuno Carvalho , U. Minho, Portugal
Jose Pereira , U. Minho, Portugal
Rui Oliveira , U. Minho, Portugal
Luis Rodrigues , U. Lisboa, Portugal
pp. 481-490

The Case for FEC-Based Reliable Multicast in Wireless Mesh Networks (Abstract)

Dimitrios Koutsonikolas , Purdue University, USA
Y. Charlie Hu , Purdue University, USA
pp. 491-501
Session 8B: Experimental Dependability Assessment

On the Selection of Error Model(s) for OS Robustness Evaluation (Abstract)

Andreas Johansson , TU-Darmstadt, Germany
Neeraj Suri , TU-Darmstadt, Germany
Brendan Murphy , Microsoft Research, UK
pp. 502-511

Experimental Risk Assessment and Comparison Using Software Fault Injection (Abstract)

R. Moraes , UNICAMP, Brazil
J. Duraes , University of Coimbra, Portugal
R. Barbosa , Critical Software SA, Portugal
E. Martins , UNICAMP, Brazil
H. Madeira , University of Coimbra, Portugal
pp. 512-521

Foundations of Measurement Theory Applied to the Evaluation of Dependability Attributes (Abstract)

Andrea Bondavalli , University of Florence, Italy
Andrea Ceccarelli , University of Florence, Italy
Lorenzo Falai , University of Florence, Italy
Michele Vadursi , University of Naples, Italy
pp. 522-533
Session 1C: System Architecture and Software Assessment

A Framework for Architecture-Level Lifetime Reliability Modeling (Abstract)

Jeonghee Shin , IBM T.J. Watson Research Center, USA
Victor Zyuban , IBM T.J. Watson Research Center, USA
Zhigang Hu , IBM T.J. Watson Research Center, USA
Jude A. Rivers , IBM T.J. Watson Research Center, USA
Pradip Bose , IBM T.J. Watson Research Center, USA
pp. 534-543

Processor-Level Selective Replication (Abstract)

Nithin Nakka , Center for Reliable and High Performance Computing
Karthik Pattabiraman , Center for Reliable and High Performance Computing
Ravishankar Iyer , Center for Reliable and High Performance Computing
pp. 544-553

Robustness Testing of the Windows DDK (Abstract)

Manuel Mendonca , University of Lisboa, Portugal
Nuno Neves , University of Lisboa, Portugal
pp. 554-564
Session 2C: Measurement and Monitoring

SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks (Abstract)

Issa Khalil , Purdue University, USA
Saurabh Bagchi , Purdue University, USA
Ness B. Shroff , Purdue University, USA
pp. 565-574

What Supercomputers Say: A Study of Five System Logs (Abstract)

Adam Oliner , Stanford University, USA
Jon Stearley , Sandia National Laboratories, USA
pp. 575-584

How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones (Abstract)

Marcello Cinque , Universita degli Studi di Napoli Federico II, Italy
Domenico Cotroneo , Universita degli Studi di Napoli Federico II, Italy
Zbigniew Kalbarczyk , University of Illinois at Urbana-Champaign, USA
Ravishankar K. Iyer , University of Illinois at Urbana-Champaign, USA
pp. 585-594

A Real-Time Network Traffic Profiling System (Abstract)

Kuai Xu , Yahoo! Inc.
Feng Wang , University of Minnesota, USA
Supratik Bhattacharyya , SnapTell Inc.
Zhi-Li Zhang , University of Minnesota, USA
pp. 595-605
Session 3C: Practical Experience Reports

RAS by the Yard (Abstract)

Alan Wood , Sun Microsystems, Inc.
Swami Nathan , Sun Microsystems, Inc.
pp. 606-611

Web Services Wind Tunnel: On Performance Testing Large-Scale Stateful Web Services (Abstract)

Marcelo De Barros , Microsoft Corporation
Jing Shiau , Microsoft Corporation
Chen Shang , Microsoft Corporation
Kenton Gidewall , Microsoft Corporation
Hui Shi , Microsoft Corporation
Joe Forsmann , Microsoft Corporation
pp. 612-617

Application of Software Watchdog as a Dependability Software Service for Automotive Safety Relevant Systems (Abstract)

Xi Chen , DaimlerChrysler AG, Germany
Juejing Feng , RWTH Aachen University, Germany
Martin Hiller , Volvo Technology, Sweden
Vera Lauer , DaimlerChrysler AG, Germany
pp. 618-624
Session 4C: Distributed Algorithms

Evaluating the Impact of Simultaneous Round Participation and Decentralized Decision on the Performance of Consensus (Abstract)

Livia Sampaio , Universidade Federal de Campina Grande, Brasil
Michel Hurfin , INRIA Rennes, France
Francisco Brasileiro , Universidade Federal de Campina Grande, Brasil
Fabiola Greve , Universidade Federal da Bahia, Brasil
pp. 625-634

On the Cost of Modularity in Atomic Broadcast (Abstract)

Olivier Rutti , EPFL, Switzerland
Sergio Mena , University of York, United Kingdom
Richard Ekwall , EPFL, Switzerland
Andre Schiper , EPFL, Switzerland
pp. 635-644

Eventually k-Bounded Wait-Free Distributed Daemons (Abstract)

Yantao Song , Texas A&M University, USA
Scott M. Pike , Texas A&M University, USA
pp. 645-655
Session 5C: Availability of Distributed Systems

Measuring Availability in Optimistic Partition-Tolerant Systems with Data Constraints (Abstract)

Mikael Asplund , Linkoping University, Sweden
Simin Nadjm-Tehrani , Linkoping University, Sweden
Stefan Beyer , Universidad Politcnica de Valencia, Spain
Pablo Galdamez , Universidad Politcnica de Valencia, Spain
pp. 656-665

Improving Recoverability in Multi-tier Storage Systems (Abstract)

Marcos K. Aguilera , HP Labs, USA
Kimberly Keeton , HP Labs, USA
Arif Merchant , HP Labs, USA
Kiran-Kumar Muniswamy-Reddy , Harvard University, USA
Mustafa Uysal , HP Labs, USA
pp. 677-686

Portable and Efficient Continuous Data Protection for Network File Servers (Abstract)

Ningning Zhu , Stony Brook University
Tzi-cker Chiueh , Stony Brook University
pp. 687-697
Session 6C: Modeling and Evaluation

Variational Bayesian Approach for Interval Estimation of NHPP-Based Software Reliability Models (Abstract)

Hiroyuki Okamura , Hiroshima University, Japan
Michael Grottke , Duke University, USA
Tadashi Dohi , Hiroshima University, Japan
Kishor S. Trivedi , Duke University, USA
pp. 698-707

Dynamic Fault Tree Analysis Using Input/Output Interactive Markov Chains (Abstract)

Hichem Boudali , University of Twente, Netherlands
Pepijn Crouzen , Saarland University, Germany
Marielle Stoelinga , University of Twente, Netherlands
pp. 708-717

Uniformity by Construction in the Analysis of Nondeterministic Stochastic Systems (Abstract)

Holger Hermanns , Universitat des Saarlandes, Germany
Sven Johr , Universitat des Saarlandes, Germany
pp. 718-728
Session 7C: Quality of Service and Error Recovery

A Reinforcement Learning Approach to Automatic Error Recovery (Abstract)

Qijun Zhu , Tianjin University, China
Chun Yuan , Microsoft Research Asia, China
pp. 729-738

On the Quality of Service of Crash-Recovery Failure Detectors (Abstract)

Tiejun Ma , University of Edinburgh, UK
Jane Hillston , University of Edinburgh, UK
Stuart Anderson , University of Edinburgh, UK
pp. 739-748

E2EProf: Automated End-to-End Performance Management for Enterprise Systems (Abstract)

Sandip Agarwala , Georiga Institute of Technology, USA
Fernando Alegre , Georiga Institute of Technology, USA
Karsten Schwan , Georiga Institute of Technology, USA
Jegannathan Mehalingham , Delta Air Lines, USA
pp. 749-758

Bounding Peer-to-Peer Upload Traffic in Client Networks (Abstract)

Chun-Ying Huang , National Taiwan University, Taiwan
Chin-Laung Lei , National Taiwan University, Taiwan
pp. 759-769
Session 8C: Stochastic Modeling

Performability Models for Multi-Server Systems with High-Variance Repair Durations (Abstract)

Hans-Peter Schwefel , Aalborg University, Denmark
Imad Antonios , Southern Connecticut State University, USA
pp. 770-779

Computing Battery Lifetime Distributions (Abstract)

Lucia Cloth , University of Twente, Netherlands
Marijn R. Jongerden , University of Twente, Netherlands
Boudewijn R. Haverkort , University of Twente, Netherlands
pp. 780-789

Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms (Abstract)

Elizabeth Van Ruitenbeek , University of Illinois at Urbana-Champaign, USA
Tod Courtney , University of Illinois at Urbana-Champaign, USA
William H. Sanders , University of Illinois at Urbana-Champaign, USA
Fabrice Stevens , France Telecom Research and Development, France
pp. 790-800

DSN 2007 Tutorials (PDF)

Luis Rodrigues , Universidade de Lisboa, Portugal
pp. 801

DSN 2007 Workshops (PDF)

Christof Fetzer , TU Dresden, Germany
pp. 802

Workshop on Dependable Application Support for Self-Organizing Networks (DASSON 2007) (PDF)

Paul Ezhilchelvan , Newcastle University, UK
Michel Raynal , ASAP, IRISA, France
Ajoy Datta , Univ of Nevada, Las Vegas, USA
pp. 803

Third Workshop on Hot Topics in System Dependability HotDep'07 (PDF)

Miguel Castro , Microsoft Research, UK
John Wilkes , Hewlett Packard Laboratories, USA
pp. 804

Workshop on Architecting Dependable Systems (WADS 2007) (PDF)

Rogerio de Lemos , University of Kent, UK
Felicita Di Giandomenico , ISTI-CNR, Italy
Cristina Gacek , Newcastle University, UK
pp. 805-806

Assurance Cases for Security: The Metrics Challenge (PDF)

Robin Bloomfield , Center for Software Reliability
Marcelo Masera , Joint Research Center of the European Commission
Ann Miller , University of Missouri at Rolla, USA
O. Sami Saydjari , Cyber Defense Agency
Charles B. Weinstock , Software Engineering Institute
pp. 807-808

Workshop on Dependable and Secure Nanocomputing (PDF)

Jean Arlat , University of Toulouse, France
Ravishankar K. Iyer , Coordinated Science Laboratory, USA
Michael Nicolaidis , TIMA and iRoc Technologies, France
pp. 809-810

Student Forum (PDF)

Farnam Jahanian , University of Michigan, USA
pp. 811

Fast Abstracts (PDF)

Hiroshi Nakamura , The University of Tokyo, Japan
pp. 812

Industry Session (PDF)

Lisa Spainhower , IBM, USA
pp. 814
Author Index

Author Index (PDF)

pp. 815
82 ms
(Ver 3.1 (10032016))