The Community for Technology Leaders
2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN) (2008)
Anchorage, AK USA
June 24, 2008 to June 27, 2008
ISBN: 978-1-4244-2397-2
TABLE OF CONTENTS

Message from the PDS program chair (PDF)

Kimberly Keeton , Hewlett-Packard Labs, USA
pp. iii

DCCS reviewers (PDF)

pp. ix-x

PDS reviewers (PDF)

pp. xii

Dependability on the last frontier (PDF)

Alex Hills , Carnegie Mellon University, USA
pp. xv

Coverage of a microarchitecture-level fault check regimen in a superscalar processor (PDF)

Vimal Reddy , Qualcomm Inc., USA
Eric Rotenberg , North Carolina State University, USA
pp. 1-10

Analysis and solutions to issue queue process variation (PDF)

Niranjan Soundararajan , Dept. of Computer Science and Engineering, The Pennsylvania State University, University Park, 16802, USA
Aditya Yanamandra , Dept. of Computer Science and Engineering, The Pennsylvania State University, University Park, 16802, USA
Chrysostomos Nicopoulos , Dept. of Computer Science and Engineering, The Pennsylvania State University, University Park, 16802, USA
N. Vijaykrishnan , Dept. of Computer Science and Engineering, The Pennsylvania State University, University Park, 16802, USA
Anand Sivasubramaniam , Dept. of Computer Science and Engineering, The Pennsylvania State University, University Park, 16802, USA
Mary Jane Irwin , Dept. of Computer Science and Engineering, The Pennsylvania State University, University Park, 16802, USA
pp. 11-21

Trace-based microarchitecture-level diagnosis of permanent hardware faults (PDF)

Man-Lap Li , Department of Computer Science, University of Illinois at Urbana-Champaign, USA
Pradeep Ramachandran , Department of Computer Science, University of Illinois at Urbana-Champaign, USA
Swarup K. Sahoo , Department of Computer Science, University of Illinois at Urbana-Champaign, USA
Sarita V. Adve , Department of Computer Science, University of Illinois at Urbana-Champaign, USA
Vikram S. Adve , Department of Computer Science, University of Illinois at Urbana-Champaign, USA
Yuanyuan Zhou , Department of Computer Science, University of Illinois at Urbana-Champaign, USA
pp. 22-31

A study of cognitive resilience in a JPEG compressor (PDF)

Damian Nowroth , Albert-Ludwigs-University, Georges-Köhler-Allee 51, 79110 Freiburg i. Br., Germany
Ilia Polian , Albert-Ludwigs-University, Georges-Köhler-Allee 51, 79110 Freiburg i. Br., Germany
Bernd Becker , Albert-Ludwigs-University, Georges-Köhler-Allee 51, 79110 Freiburg i. Br., Germany
pp. 32-41

Scheduling algorithms for unpredictably heterogeneous CMP architectures (PDF)

Jonathan A. Winter , Computer Systems Laboratory, Cornell University, USA
David H. Albonesi , Computer Systems Laboratory, Cornell University, USA
pp. 42-51

Automated duplicate detection for bug tracking systems (PDF)

Nicholas Jalbert , University of Virginia, Charlottesville, 22904, USA
Westley Weimer , University of Virginia, Charlottesville, 22904, USA
pp. 52-61

Validation of hardware error recovery mechanisms for the SPARC64 V microprocessor (Abstract)

Hisashige Ando , Fujitsu Ltd., Japan
Ryuji Kan , Fujitsu Ltd., Japan
Yoshiharu Tosaka , Fujitsu Laboratories, Japan
Keiji Takahisa , Research Center for Nuclear Physics, Osaka University, Japan
Kichiji Hatanaka , Research Center for Nuclear Physics, Osaka University, Japan
pp. 62-69

Using likely program invariants to detect hardware errors (PDF)

Swarup Kumar Sahoo , Department of Computer Science, University of Illinois at Urbana-Champaign, USA
Man-Lap Li , Department of Computer Science, University of Illinois at Urbana-Champaign, USA
Pradeep Ramachandran , Department of Computer Science, University of Illinois at Urbana-Champaign, USA
Sarita V. Adve , Department of Computer Science, University of Illinois at Urbana-Champaign, USA
Vikram S. Adve , Department of Computer Science, University of Illinois at Urbana-Champaign, USA
Yuanyuan Zhou , Department of Computer Science, University of Illinois at Urbana-Champaign, USA
pp. 70-79

Detouring: Translating software to circumvent hard faults in simple cores (PDF)

Albert Meixner , Dept. of Computer Science Dept. of Duke University, USA
Daniel J. Sorin , Electrical and Computer Engineering, Duke University, USA
pp. 80-89

Towards assessing the security of DBMS configurations (PDF)

Afonso Araujo Neto , CISUC, Department of Informatics Engineering, University of Coimbra - Portugal
Marco Vieira , CISUC, Department of Informatics Engineering, University of Coimbra - Portugal
pp. 90-95

Experiences with formal specification of fault-tolerant file systems (PDF)

Roxana Geambasu , University of Washington, USA
Andrew Birrell , Microsoft Research, USA
John MacCormick , Dickinson College, USA
pp. 96-101

Using an assurance case to support independent assessment of the transition to a new GPS ground control system (PDF)

Elisabeth A. Nguyen , The Aerospace Corporation, Chantilly, Virginia, USA
William S. Greenwell , The Aerospace Corporation, Chantilly, Virginia, USA
Myron J. Hecht , The Aerospace Corporation, El Segundo, CA, USA
pp. 102-107

Silent Data Corruption — Myth or reality? (PDF)

Ishwar Parulkar , Sun Microsystems, USA
Rick Harper , IBM Research, USA
Sarah Michalak , LANL, USA
pp. 108-109

End-system tools for enhancing email reliability (PDF)

Tim Moors , University of New South Wales, Australia
Patrick Chu , University of New South Wales, Australia
pp. 110-115

Tempest: Towards early identification of failure-prone binaries (PDF)

Thirumalesh Bhat , Center for Software Excellence, Windows Division, Microsoft Corporation, USA
Nachiappan Nagappan , Microsoft Research, USA
pp. 116-121

Statistical Fault Injection (PDF)

Pradeep Ramachandran , IBM Systems and Technology Group, Poughkeepsie, NY, USA
Prabhakar Kudva , IBM T. J. Watson Research Center, Yorktown Heights, NY, USA
Jeffrey Kellington , IBM Systems and Technology Group, Poughkeepsie, NY, USA
John Schumann , IBM Systems and Technology Group, Poughkeepsie, NY, USA
Pia Sanda , IBM Systems and Technology Group, Poughkeepsie, NY, USA
pp. 122-127

An accurate flip-flop selection technique for reducing logic SER (PDF)

Eric L. Hill , Department of Electrical and Computer Engineering, University of Wisconsin - Madison, USA
Mikko H. Lipasti , Department of Electrical and Computer Engineering, University of Wisconsin - Madison, USA
Kewal K. Saluja , Department of Electrical and Computer Engineering, University of Wisconsin - Madison, USA
pp. 128-136

Combined circuit and microarchitecture techniques for effective soft error robustness in SMT processors (PDF)

Xin Fu , Department of ECE, University of Florida, USA
Tao Li , Department of ECE, University of Florida, USA
Jose Fortes , Department of ECE, University of Florida, USA
pp. 137-146

Reliability of flat XOR-based erasure codes on heterogeneous devices (PDF)

Kevin M. Greenan , Hewlett-Packard Labs, USA
Ethan L. Miller , UCSC, USA
Jay J. Wylie , Hewlett-Packard Labs, USA
pp. 147-156

ConfErr: A tool for assessing resilience to human configuration errors (PDF)

Lorenzo Keller , Ecole Polytechnique Fédérale de Lausanne (EPFL), Switzerland
Prasang Upadhyaya , Ecole Polytechnique Fédérale de Lausanne (EPFL), Switzerland
George Candea , Ecole Polytechnique Fédérale de Lausanne (EPFL), Switzerland
pp. 157-166

Enhanced server fault-tolerance for improved user experience (PDF)

Manish Marwah , Hewlett-Packard Laboratories, Palo Alto, CA 94304, USA
Shivakant Mishra , Department of Computer Science, University of Colorado, Boulder, 80309 USA
Christof Fetzer , Department of Computer Science, TU-Dresden, Germany D-01062
pp. 167-176

Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware (PDF)

Xu Chen , University of Michigan - Ann Arbor, USA
Jon Andersen , University of Michigan - Ann Arbor, USA
Z. Morley Mao , University of Michigan - Ann Arbor, USA
Michael Bailey , University of Michigan - Ann Arbor, USA
Jose Nazario , Arbor Networks, USA
pp. 177-186

Security through redundant data diversity (PDF)

Anh Nguyen-Tuong , University of Virginia, Department of Computer Science, USA
David Evans , University of Virginia, Department of Computer Science, USA
John C. Knight , University of Virginia, Department of Computer Science, USA
Benjamin Cox , University of Virginia, Department of Computer Science, USA
Jack W. Davidson , University of Virginia, Department of Computer Science, USA
pp. 187-196

Byzantine replication under attack (PDF)

Yair Amir , Johns Hopkins University, Baltimore, MD, USA
Brian Coan , Telcordia Technologies, Piscataway, NJ, USA
Jonathan Kirsch , Johns Hopkins University, Baltimore, MD, USA
John Lane , Johns Hopkins University, Baltimore, MD, USA
pp. 197-206

A robust and lightweight stable leader election service for dynamic systems (PDF)

Nicolas Schiper , University of Lugano, Switzerland
Sam Toueg , University of Toronto, Canada
pp. 207-216

A fast restart mechanism for checkpoint/recovery protocols in networked environments (PDF)

Yawei Li , Department of Computer Science, Illinois Institute of Technology, 60626, USA
Zhiling Lan , Department of Computer Science, Illinois Institute of Technology, 60626, USA
pp. 217-226

Tempest: Soft state replication in the service tier (PDF)

Tudor Marian , Department of Computer Science, Cornell University, Ithaca, NY 14853, USA
Mahesh Balakrishnan , Department of Computer Science, Cornell University, Ithaca, NY 14853, USA
Ken Birman , Department of Computer Science, Cornell University, Ithaca, NY 14853, USA
Robbert van Renesse , Department of Computer Science, Cornell University, Ithaca, NY 14853, USA
pp. 227-236

AGIS: Towards automatic generation of infection signatures (PDF)

Zhuowei Li , Indiana University at Bloomington, USA
XiaoFeng Wang , Indiana University at Bloomington, USA
Zhenkai Liang , Carnegie Mellon University, USA
Michael K. Reiter , University of North Carolina at Chapel Hill, USA
pp. 237-246

Convicting exploitable software vulnerabilities: An efficient input provenance based approach (PDF)

Zhiqiang Lin , Department of Computer Sciences and CERIAS, Purdue University, USA
Xiangyu Zhang , Department of Computer Sciences and CERIAS, Purdue University, USA
Dongyan Xu , Department of Computer Sciences and CERIAS, Purdue University, USA
pp. 247-256

Mapping software faults with web security vulnerabilities (PDF)

Jose Fonseca , CISUC, University of Coimbra, IPG, Portugal
Marco Vieira , CISUC, University of Coimbra, Portugal
pp. 257-266

A fault-tolerant directory-based cache coherence protocol for CMP architectures (PDF)

Ricardo Fernandez-Pascual , Universidad de Murcia, Spain
Jose M. Garcia , Universidad de Murcia, Spain
Manuel E. Acacio , Universidad de Murcia, Spain
Jose Duato , Universidad Politécnica de Valencia, Spain
pp. 267-276

Probabilistic quorum systems in wireless ad hoc networks (PDF)

Roy Friedman , Computer Science Department, Technion - Israel Institute of Technology, Haifa 32000, Israel
Gabriel Kliot , Computer Science Department, Technion - Israel Institute of Technology, Haifa 32000, Israel
Chen Avin , Communication Systems Engineering Dep., Ben Gurion University of The Negev, Beer Sheva, Israel
pp. 277-286

BAR primer (PDF)

Allen Clement , University of Texas at Austin, USA
Harry Li , University of Texas at Austin, USA
Jeff Napper , University of Texas at Austin, USA
Jean-Philippe Martin , Microsoft Research Cambridge, USA
Lorenzo Alvisi , University of Texas at Austin, USA
Mike Dahlin , University of Texas at Austin, USA
pp. 287-296

Improving dependability of network configuration through policy classification (PDF)

Sihyung Lee , Carnegie Mellon University, USA
Tina Wong , Carnegie Mellon University, USA
Hyong S. Kim , Carnegie Mellon University, USA
pp. 297-306

Traffic grooming in WDM mesh networks with guaranteed survivability (PDF)

A. Bari , School of Computer Science, University of Windsor,. 401 Sunset Ave., ON N9B 3P4, Canada
Q. Rahman , School of Computer Science, University of Windsor,. 401 Sunset Ave., ON N9B 3P4, Canada
A Jaekel , School of Computer Science, University of Windsor,. 401 Sunset Ave., ON N9B 3P4, Canada
S. Bandyopadhyay , School of Computer Science, University of Windsor,. 401 Sunset Ave., ON N9B 3P4, Canada
pp. 307-315

Implementation and evaluation of a distributed and cooperative load-balancing mechanism for dependable volunteer computing (PDF)

Yoshitomo Murata , Graduate School of Information Sciences, Tohoku University, Sendai 980-8578, Japan
Tsutomu Inaba , NTT East Corporation, Miyagi 984-8519, Japan
Hiroyuki Takizawa , Graduate School of Information Sciences, Tohoku University, Sendai 980-8578, Japan
Hiroaki Kobayashi , Graduate School of Information Sciences, Tohoku University, Sendai 980-8578, Japan
pp. 316-325

An integrated approach to resource pool management: Policies, efficiency and quality metrics (PDF)

Daniel Gmach , Technische Universität München, 85748 Garching, Germany
Jerry Rolia , Hewlett-Packard Laboratories, Palo Alto, CA, USA
Ludmila Cherkasova , Hewlett-Packard Laboratories, Palo Alto, CA, USA
Guillaume Belrose , Hewlett-Packard Laboratories, Bristol, GB, UK
Tom Turicchi , Hewlett-Packard, ESS Software, Richardson, TX, USA
Alfons Kemper , Technische Universität München, 85748 Garching, Germany
pp. 326-335

Scheduling for performance and availability in systems with temporal dependent workloads (PDF)

Ningfang Mi , Computer Science Department, College of William and Mary, USA
Giuliano Casale , Computer Science Department, College of William and Mary, USA
Evgenia Smirni , Computer Science Department, College of William and Mary, USA
pp. 336-345

Hot-spot prediction and alleviation in distributed stream processing applications (PDF)

Thomas Repantis , Department of Computer Science and Engineering, University of California, Riverside, 92521 USA
Vana Kalogeraki , Department of Computer Science and Engineering, University of California, Riverside, 92521 USA
pp. 346-355

On localization attacks to Internet Threat Monitors: An information-theoretic framework (PDF)

Wei , Department of Computer Science, Texas A&M University, College Station, 77843 USA
Nan Zhang , Department of Computer Science and Engineering, University of Texas at Arlington, 76019-0015, USA
Xinwen Fu , College of Business and Information Systems, Dakota State University, 820 N. Washington Ave. Madison, SD 57042 USA
Riccardo Bettati , Department of Computer Science, Texas A&M University, College Station, 77843 USA
Wei Zhao , Department of Computer Science, Texas A&M University, College Station, 77843 USA
pp. 356-365

Automatic security assessment of critical cyber-infrastructures (PDF)

Zahid Anwar , University of Illinois at Urbana-Champaign, USA
Ravinder Shankesi , University of Illinois at Urbana-Champaign, USA
Roy. H. Campbell , University of Illinois at Urbana-Champaign, USA
pp. 366-375

Evaluating email’s feasibility for botnet command and control (PDF)

Kapil Singh , School of Computer Science, Georgia Institute of Technology, USA
Abhinav Srivastava , School of Computer Science, Georgia Institute of Technology, USA
Jonathon Giffin , School of Computer Science, Georgia Institute of Technology, USA
Wenke Lee , School of Computer Science, Georgia Institute of Technology, USA
pp. 376-385

Scaling file systems to support petascale clusters: A dependability analysis to support informed design choices (PDF)

Shravan Gaonkar , University of Illinois at Urbana-Champaign, USA
Eric Rozier , University of Illinois at Urbana-Champaign, USA
Anthony Tong , University of Illinois at Urbana-Champaign, USA
William H. Sanders , University of Illinois at Urbana-Champaign, USA
pp. 386-391

WS-DREAM: A distributed reliability assessment Mechanism for Web Services (PDF)

Zibin Zheng , Department of Computer Science and Engineering, The Chinese University of Hong Kong, China
Michael R. Lyu , Department of Computer Science and Engineering, The Chinese University of Hong Kong, China
pp. 392-397

A log mining approach to failure analysis of enterprise telephony systems (PDF)

Chinghway Lim , Department of Statistics, University of California, Berkeley, 94720 USA
Navjot Singh , Avaya Labs, 233 Mt. Airy Rd., Basking Ridge, NJ 07920 USA
Shalini Yajnik , Avaya Labs, 233 Mt. Airy Rd., Basking Ridge, NJ 07920 USA
pp. 398-403

Integration and evaluation of Multi-Instance-Precommit schemes within postgreSQL (PDF)

Paolo Romano , DIS, Sapienza Università di Roma, Italy
Francesco Quaglia , DIS, Sapienza Università di Roma, Italy
pp. 404-409

Toward an understanding of the processing delay of peer-to-peer relay nodes (PDF)

Kuan-Ta Chen , Institute of Information Science, Academia Sinica, Taiwan
Jing-Kai Lou , Institute of Information Science, Academia Sinica, Taiwan
pp. 410-419

TCP covert timing channels: Design and detection (PDF)

Xiapu Luo , Department of Computing, The Hong Kong Polytechnic University Hung Hom, Kowloon, Hong Kong, SAR, China
Edmond W. W. Chan , Department of Computing, The Hong Kong Polytechnic University Hung Hom, Kowloon, Hong Kong, SAR, China
Rocky K. C. Chang , Department of Computing, The Hong Kong Polytechnic University Hung Hom, Kowloon, Hong Kong, SAR, China
pp. 420-429

A smart triggering scheme to reduce service interruption during heterogeneous handovers (PDF)

Huaiyu Liu , Communication Technology Lab, Corporate Technology Group, Intel, Hillsboro, OR 97124, USA
Christian Maciocco , Communication Technology Lab, Corporate Technology Group, Intel, Hillsboro, OR 97124, USA
Vijay Kesavan , Communication Technology Lab, Corporate Technology Group, Intel, Hillsboro, OR 97124, USA
Andy Low , British Telecom Labs, Asian Research Center, Malaysia
pp. 430-439

On representing knowledge in the dependability domain: a panel discussion (PDF)

Algirdas Avizienis , University of California, Los Angeles, USA
pp. 440-441

Evaluating availability under quasi-heavy-tailed repair times (PDF)

Sei Kato , IBM Research, Tokyo Research Laboratory 1623-14 Shimotsuruma, Yamato-shi, Kanagawa-ken, 242-8502 Japan
Takayuki Osogami , IBM Research, Tokyo Research Laboratory 1623-14 Shimotsuruma, Yamato-shi, Kanagawa-ken, 242-8502 Japan
pp. 442-451

Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change (PDF)

Ludmila Cherkasova , HPLabs, Palo Alto &, USA
Kivanc Ozonat , HPLabs, Palo Alto &, USA
Ningfang Mi , College of William and Mary, Williamsburg, USA
Julie Symons , HPLabs, Palo Alto &, USA
Evgenia Smirni , College of William and Mary, Williamsburg, USA
pp. 452-461

Survivability quantification of communication services (PDF)

Poul E. Heegaard , Department of Telematics, Norwegian University of Science and Technology, USA
Kishor S. Trivedi , Pratt School of Engineering, Duke University, USA
pp. 462-471

SymPLFIED: Symbolic program-level fault injection and error detection framework (PDF)

Karthik Pattabiraman , Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, USA
Nithin Nakka , Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, USA
Zbigniew Kalbarczyk , Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, USA
Ravishankar Iyer , Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, USA
pp. 472-481

A characterization of instruction-level error derating and its implications for error detection (PDF)

Jeffrey J. Cook , Department of Electrical and Computer Engineering, USA
Craig Zilles , Department of Computer Science University of Illinois at Urbana-Champaign, USA
pp. 482-491

Enhancing data availability in disk drives through background activities (PDF)

Ningfang Mi , Computer Science Dept., College of William and Mary, Williamsburg, VA 23187, USA
Alma Riska , Seagate Research, 1251 Waterfront Place, Pittsburgh, PA 15222, USA
Evgenia Smirni , Computer Science Dept., College of William and Mary, Williamsburg, VA 23187, USA
Erik Riedel , Seagate Research, 1251 Waterfront Place, Pittsburgh, PA 15222, USA
pp. 492-501

Analyzing the effects of disk-pointer corruption (PDF)

Lakshmi N. Bairavasundaram , University of Wisconsin-Madison, USA
Meenali Rungta , Google, Inc., USA
Nitin Agrawa , University of Wisconsin-Madison, USA
Andrea C. Arpaci-Dusseau , University of Wisconsin-Madison, USA
Remzi H. Arpaci-Dusseau , University of Wisconsin-Madison, USA
Michael M. Swift , University of Wisconsin-Madison, USA
pp. 502-511

Architectural dependability evaluation with Arcade (PDF)

H. Boudali , University of Twente, Department of Computer Science, Enschede, NL, The Netherlands
P. Crouzen , Saarland University, Department of Computer Science, Saarbrücken, D, Germany
B. R. Haverkort , University of Twente, Department of Computer Science, Enschede, NL, The Netherlands
M. Kuntz , University of Twente, Department of Computer Science, Enschede, NL, The Netherlands
M.I.A. Stoelinga , University of Twente, Department of Computer Science, Enschede, NL, The Netherlands
pp. 512-521

A recurrence-relation-based reward model for performability evaluation of embedded systems (PDF)

Ann T. Tai , IA Tech, Inc., Los Angeles, CA 90094, USA
Kam S. Tso , IA Tech, Inc., Los Angeles, CA 90094, USA
William H. Sanders , University of Illinois, Urbana, 61801, USA
pp. 532-541

International Workshop on Resilience Assessment and Dependability Benchmarking (RADB 2008) (PDF)

Andrea Bondavalli , University of Firenze, Italy
Istvan Majzik , BUTE, Hungary
Aad van Moorsel , Newcastle University, UK
pp. 542-543

Workshop on compiler and architectural techniques for application reliability and security (CATARS) (PDF)

Karthik Pattabiraman , University of Illinois at Urbana-Champaign, 1308 W Main St, 61801, USA
Shuo Chen , Microsoft Research, One Microsoft Way, Redmond, WA 98052, USA
Zbigniew Kalbarczyk , University of Illinois at Urbana-Champaign, 1308 W Main St, 61801, USA
pp. 544-545

Second workshop on dependable and secure nanocomputing (PDF)

Jean Arlat , LAAS-CNRS & Univ. de Toulouse 7, Avenue du Colonel Roche, 31077 Cedex 04 - France
Cristian Constantinescu , AMD 2950 E Harmony Rd. Fort Collins, CO 80528 - USA
Ravishankar K. Iyer , Coordinated Science Laboratory, 1308 West Main Street, Urbana, IL 61801 - USA
Michael Nicolaidis , TIMA 46, Avenue Felix Viallet, 38031 Grenoble - France
pp. 546-547

Workshop on Architecting Dependable Systems (WADS 2008) (PDF)

Rogerio de Lemos , University of Kent, UK
Jean-Charles Fabre , LAAS-CNRS, France
Cristina Gacek , Newcastle University, UK
pp. 548-549
84 ms
(Ver 3.3 (11022016))