The Community for Technology Leaders
2009 IEEE/IFIP International Conference on Dependable Systems & Networks (2009)
Lisbon Portugal
June 29, 2009 to July 2, 2009
ISBN: 978-1-4244-4422-9
TABLE OF CONTENTS

Future prospects of research on security and dependability (PDF)

Jacques Bus , Unit, Trust and Security (ICT Programme) DG Information Society and Media, European Commission, Belgium
pp. 1

Dependability - How does the market value it? (PDF)

Goncalo Quadros , CEO Critical Software S.A., Portugal
pp. 2

WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks (PDF)

Roberto Perdisci , Damballa, Inc. Atlanta, GA 30308, USA
Manos Antonakakis , College of Computing, Georgia Institute of Technology, Atlanta, 30332, USA
Xiapu Luo , College of Computing, Georgia Institute of Technology, Atlanta, 30332, USA
Wenke Lee , College of Computing, Georgia Institute of Technology, Atlanta, 30332, USA
pp. 3-12

Exception triggered DoS attacks on wireless networks (PDF)

Yao Zhao , Northwestern University, Evanston IL, USA
Sagar Vemuri , Northwestern University, Evanston IL, USA
Jiazhen Chen , Northwestern University, Evanston IL, USA
Yan Chen , Northwestern University, Evanston IL, USA
Hai Zhou , Northwestern University, Evanston IL, USA
Zhi Fu , Motorola Labs, Schaumburg IL, USA
pp. 13-22

HC-BGP: A light-weight and flexible scheme for securing prefix ownership (PDF)

Ying Zhang , Univ. of Michigan, USA
Zheng Zhang , Purdue Univ., USA
Z. Morley Mao , Univ. of Michigan, USA
Y. Charlie Hu , Purdue Univ., USA
pp. 23-32

Fault isolation for device drivers (PDF)

Jorrit N. Herder , Dept. of Computer Science, VU University Amsterdam, The Netherlands
Herbert Bos , Dept. of Computer Science, VU University Amsterdam, The Netherlands
Ben Gras , Dept. of Computer Science, VU University Amsterdam, The Netherlands
Philip Homburg , Dept. of Computer Science, VU University Amsterdam, The Netherlands
Andrew S. Tanenbaum , Dept. of Computer Science, VU University Amsterdam, The Netherlands
pp. 33-42

WYSIWIB: A declarative approach to finding API protocols and bugs in Linux code (PDF)

Julia L. Lawall , DIKU, University of Copenhagen, Denmark
Julien Brunel , DIKU, University of Copenhagen, Denmark
Nicolas Palix , DIKU, University of Copenhagen, Denmark
Rene Rydhof Hansen , Aalborg University, Denmark
Henrik Stuart , DIKU, University of Copenhagen, Denmark
Gilles Muller , EMN/INRIA-Regal, Paris, France
pp. 43-52

Exploiting refactoring in formal verification (PDF)

Xiang Yin , Department of Computer Science, University of Virginia, USA
John Knight , Department of Computer Science, University of Virginia, USA
Westley Weimer , Department of Computer Science, University of Virginia, USA
pp. 53-62

Maximizing system lifetime by battery scheduling (PDF)

Marijn Jongerden , University of Twente, Centre for Telematics and Information Technology, 7500 AE Enschede, The Netherlands
Boudewijn Haverkort , University of Twente, Centre for Telematics and Information Technology, 7500 AE Enschede, The Netherlands
Henrik Bohnenkamp , RWTH Aachen University, Software Modeling and Verification, 52056, Germany
Joost-Pieter Katoen , University of Twente, Centre for Telematics and Information Technology, 7500 AE Enschede, The Netherlands
pp. 63-72

Safety modeling and evaluation of Automated Highway Systems (PDF)

Ossama Hamouda , CNRS; LAAS; Université de Toulouse, 7, Avenue du Colonel Roche, F-31077, France
Mohamed Kaaniche , CNRS; LAAS; Université de Toulouse, 7, Avenue du Colonel Roche, F-31077, France
Karama Kanoun , CNRS; LAAS; Université de Toulouse, 7, Avenue du Colonel Roche, F-31077, France
pp. 73-82

Evaluating the impact of Undetected Disk Errors in RAID systems (PDF)

Eric W. D. Rozier , IBM Almaden Research Center, USA
Wendy Belluomini , IBM Almaden Research Center, USA
Veera Deenadhayalan , IBM Almaden Research Center, USA
Jim Hafner , IBM Almaden Research Center, USA
KK Rao , IBM Almaden Research Center, USA
Pin Zhou , IBM Almaden Research Center, USA
pp. 83-92

Vulnerability & attack injection for web applications (PDF)

Jose Fonseca , CISUC, University of Coimbra, Polytechnic Institute of Guarda, Portugal
Marco Vieira , CISUC, University of Coimbra, Portugal
Henrique Madeira , CISUC, University of Coimbra, Portugal
pp. 93-102

Dependability in the cloud: Challenges and opportunities (PDF)

Kaustubh R. Joshi , A&T Labs - Research, 180 Park Ave, Florham Park, NJ, 07932, USA
Guy Bunker , Scientist and Distinguished Engineer, Symantec Corporation, 350 Brook Dr., Green Park, Reading Berkshire, RG2 6UH, UK
Farnam Jahanian , CSE, Dept. of EECS, Univ. of Michigan, USA
Aad van Moorsel , School of Computing Sci., Newcastle University, Newcastle upon Tyne, NE1 7RU, UK
Joseph Weinman , AT&T Business Solutions, One AT&T Way, Rm. 4D128, Bedminster, NJ 07921, USA
pp. 103-104

Decoupling Dynamic Information Flow Tracking with a dedicated coprocessor (PDF)

Hari Kannan , Computer Systems Laboratory, Stanford University, USA
Michael Dalton , Computer Systems Laboratory, Stanford University, USA
Christos Kozyrakis , Computer Systems Laboratory, Stanford University, USA
pp. 105-114

Remote attestation to dynamic system properties: Towards providing complete system integrity evidence (PDF)

Chongkyung Kil , Department of Computer Science, NC State University, Raleigh, 27695, USA
Emre C. Sezer , Department of Computer Science, NC State University, Raleigh, 27695, USA
Ahmed M. Azab , Department of Computer Science, NC State University, Raleigh, 27695, USA
Peng Ning , Department of Computer Science, NC State University, Raleigh, 27695, USA
Xiaolan Zhang , IBM T.J. Watson Research Center, 19 Skyline Drive, Hawthorne, NY 10532, USA
pp. 115-124

Comparing anomaly-detection algorithms for keystroke dynamics (PDF)

Kevin S. Killourhy , Dependable Systems Laboratory, Computer Science Department, Carnegie Mellon University, 5000 Forbes Ave, Pittsburgh, PA 15213, USA
Roy A. Maxion , Dependable Systems Laboratory, Computer Science Department, Carnegie Mellon University, 5000 Forbes Ave, Pittsburgh, PA 15213, USA
pp. 125-134

Providing transactional quality of service in event stream processing middleware (PDF)

Rob Strom , IBM TJ Watson Research Center, 19 Skyline Drive, Hawthorne, NY, 10598, USA
pp. 135-144

Language level checkpointing support for stream processing applications (PDF)

Gabriela Jacques-Silva , Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, USA
Bugra Gedik , Thomas J. Watson Research Center, IBM Research, USA
Henrique Andrade , Thomas J. Watson Research Center, IBM Research, USA
Kun-Lung Wu , Thomas J. Watson Research Center, IBM Research, USA
pp. 145-154

Verme: Worm containment in overlay networks (PDF)

Filipe Freitas , INESC-ID / Technical University of Lisbon, Portugal
Edgar Marques , INESC-ID / Technical University of Lisbon, Portugal
Rodrigo Rodrigues , Max Planck Institute for Software Systems (MPI-SWS), Germany
Carlos Ribeiro , INESC-ID / Technical University of Lisbon, Portugal
Paulo Ferreira , INESC-ID / Technical University of Lisbon, Portugal
Luis Rodrigues , INESC-ID / Technical University of Lisbon, Portugal
pp. 155-164

Flexible multicast authentication for time-triggered embedded control network applications (PDF)

Christopher Szilagyi , ECE Department, Carnegie Mellon University, USA
Philip Koopman , ECE Department, Carnegie Mellon University, USA
pp. 165-174

Data management mechanisms for embedded system gateways (PDF)

Justin Ray , Carnegie Mellon University, Pittsburgh, Pennsylvania, USA
Philip Koopman , Carnegie Mellon University, Pittsburgh, Pennsylvania, USA
pp. 175-184

Low overhead Soft Error Mitigation techniques for high-performance and aggressive systems (PDF)

Naga Durga Prasad Avirneni , Dependable Computing and Networking Laboratory, Iowa State University, Ames, USA
Viswanathan Subramanian , Dependable Computing and Networking Laboratory, Iowa State University, Ames, USA
Arun K. Somani , Dependable Computing and Networking Laboratory, Iowa State University, Ames, USA
pp. 185-194

An energy efficient circuit level technique to protect register file from MBUs and SETs in embedded processors (PDF)

M. Fazeli , Department of Computer Engineering, Sharif University of Technology, Tehran, Iran
A. Namazi , Department of Computer Engineering, Sharif University of Technology, Tehran, Iran
S.G. Miremadi , Department of Computer Engineering, Sharif University of Technology, Tehran, Iran
pp. 195-204

Xprobe2++: Low volume remote network information gathering tool (PDF)

Fedor V. Yarochkin , Department of Electrical Engineering, National Taiwan University, No. 1, Sec. 4, Roosvelt Road, Taipei, 10617 Taiwan
Ofir Arkin , Department of Electrical Engineering, National Taiwan University, No. 1, Sec. 4, Roosvelt Road, Taipei, 10617 Taiwan
Meder Kydyraliev , Department of Electrical Engineering, National Taiwan University, No. 1, Sec. 4, Roosvelt Road, Taipei, 10617 Taiwan
Shih-Yao Dai , Department of Electrical Engineering, National Taiwan University, No. 1, Sec. 4, Roosvelt Road, Taipei, 10617 Taiwan
Yennun Huang , Department of Electrical Engineering, National Taiwan University, No. 1, Sec. 4, Roosvelt Road, Taipei, 10617 Taiwan
Sy-Yen Kuo , Department of Electrical Engineering, National Taiwan University, No. 1, Sec. 4, Roosvelt Road, Taipei, 10617 Taiwan
pp. 205-210

Deterministic high-speed simulation of complex systems including fault-injection (PDF)

Matthias Sand , Friedrich-Alexander-Universität Erlangen-Nürnberg, Department Informatik 3 (Computer Architecture), Martensstr. 3, 91058, Germany
Stefan Potyra , Friedrich-Alexander-Universität Erlangen-Nürnberg, Department Informatik 3 (Computer Architecture), Martensstr. 3, 91058, Germany
Volkmar Sieh , Friedrich-Alexander-Universität Erlangen-Nürnberg, Department Informatik 3 (Computer Architecture), Martensstr. 3, 91058, Germany
pp. 211-216

Intrusion-tolerant self-healing devices for critical infrastructure protection (PDF)

Paulo Sousa , University of Lisboa, Faculdade de Ciências, LASIGE - Portugal
Alysson N. Bessani , University of Lisboa, Faculdade de Ciências, LASIGE - Portugal
Wagner S. Dantas , University of Lisboa, Faculdade de Ciências, LASIGE - Portugal
Fabio Souto , University of Lisboa, Faculdade de Ciências, LASIGE - Portugal
Miguel Correia , University of Lisboa, Faculdade de Ciências, LASIGE - Portugal
Nuno F. Neves , University of Lisboa, Faculdade de Ciências, LASIGE - Portugal
pp. 217-222

Design and development of a proof-of-concept platooning application using the HIDENETS architecture (PDF)

Luis Marques , Faculdade de Ciências da Universidade de Lisboa. Bloco C6, Campo Grande, 1749-016, Portugal
Antonio Casimiro , Faculdade de Ciências da Universidade de Lisboa. Bloco C6, Campo Grande, 1749-016, Portugal
Mario Calha , Faculdade de Ciências da Universidade de Lisboa. Bloco C6, Campo Grande, 1749-016, Portugal
pp. 223-228

Dynamic content web applications: Crash, failover, and recovery analysis (PDF)

Luiz E. Buzato , IC, Unicamp, Campinas, Brasil
Gustavo M. D. Vieira , IC, Unicamp, Campinas, Brasil
Willy Zwaenepoel , SCCS, EPFL, Lausanne, Switzerland
pp. 229-238

A QoS-aware fault tolerant middleware for dependable service composition (PDF)

Zibi Zheng , Department of Computer Science and Engineering, The Chinese University of Hong Kong, China
Michael R. Lyu , Department of Computer Science and Engineering, The Chinese University of Hong Kong, China
pp. 239-248

Efficient resource management on template-based web servers (PDF)

Eli Courtwright , Department of Computer Science, The College of William and Mary, Williamsburg, VA 23187, USA
Chuan Yue , Department of Computer Science, The College of William and Mary, Williamsburg, VA 23187, USA
Haining Wang , Department of Computer Science, The College of William and Mary, Williamsburg, VA 23187, USA
pp. 249-258

Stretching gossip with live streaming (PDF)

Davide Frey , INRIA Rennes-Bretagne Atlantique, France
Rachid Guerraoui , Ecole Polytechnique Fédérale de Lausanne, Switzerland
Anne-Marie Kermarrec , INRIA Rennes-Bretagne Atlantique, France
Maxime Monod , Ecole Polytechnique Fédérale de Lausanne, Switzerland
Vivien Quema , CNRS, France
pp. 259-264

A self-diagnosis technique using Reed-Solomon codes for self-repairing chips (PDF)

Xiangyu Tang , Link_A_Media_Devices, USA
Seongmoon Wang , NEC Labs. America, Princeton NJ, USA
pp. 265-274

Sharing end-user negative symptoms for improving overlay network dependability (PDF)

Yongning Tang , School of Information Technology, Illinois State University, Normal 61790, USA
Ehab Al-Shaer , School of Computing, DePaul University, Chicago IL 60604, USA
pp. 275-284

Automatic fault detection and diagnosis in complex software systems by information-theoretic monitoring (PDF)

Miao Jiang , Shoshin Distributed Systems Group, E&CE Department, University of Waterloo, Ontario N2L 3G1, Canada
Mohammad A. Munawar , Shoshin Distributed Systems Group, E&CE Department, University of Waterloo, Ontario N2L 3G1, Canada
Thomas Reidemeister , Shoshin Distributed Systems Group, E&CE Department, University of Waterloo, Ontario N2L 3G1, Canada
Paul A.S. Ward , Shoshin Distributed Systems Group, E&CE Department, University of Waterloo, Ontario N2L 3G1, Canada
pp. 285-294

From assessment to standardised benchmarking: Will it happen? What could we do about it? (PDF)

Henrique Madeira , CISUC, University of Coimbra, Portugal
Istvan Majzik , Budapest University of Technology, Hungary
pp. 295-296

On the effectiveness of structural detection and defense against P2P-based botnets (PDF)

Duc T. Ha , Dept of Computer Science and Engineering, University at Buffalo, New York 14200, USA
Guanhua Yan , Information Sciences (CCS-3), Los Alamos National Laboratory, NM 87545, USA
Stephan Eidenbenz , Information Sciences (CCS-3), Los Alamos National Laboratory, NM 87545, USA
Hung Q. Ngo , Dept of Computer Science and Engineering, University at Buffalo, New York 14200, USA
pp. 297-306

Spam detection in voice-over-IP calls through semi-supervised clustering (PDF)

Yu-Sung Wu , School of Electrical & Computer Eng., Purdue University, West Lafayette, IN 47907, USA
Saurabh Bagchi , School of Electrical & Computer Eng., Purdue University, West Lafayette, IN 47907, USA
Navjot Singh , Avaya Labs, 233 Mt. Airy Rd., Basking Ridge, NJ 07920, USA
Ratsameetip Wita , Chulalongkorn University, Thailand
pp. 307-316

Blue-Watchdog: Detecting Bluetooth worm propagation in public areas (PDF)

Guanhua Yan , Los Alamos National Laboratory, USA
Leticia Cuellar , Los Alamos National Laboratory, USA
Stephan Eidenbenz , Los Alamos National Laboratory, USA
Nicolas Hengartner , Los Alamos National Laboratory, USA
pp. 317-326

A linguistic analysis engine for natural language use case description and its application to dependability analysis in industrial use cases (PDF)

Avik Sinha , IBM T. J. Watson Research Center, Hawthorne, New York, USA
Amit Paradkar , IBM T. J. Watson Research Center, Hawthorne, New York, USA
Palani Kumanan , IBM T. J. Watson Research Center, Hawthorne, New York, USA
Branimir Boguraev , IBM T. J. Watson Research Center, Hawthorne, New York, USA
pp. 327-336

Precise request tracing and performance debugging for multi-tier services of black boxes (PDF)

Zhihong Zhang , Institute of Computing Technology, Chinese Academy of Sciences, China
Jianfeng Zhan , Institute of Computing Technology, Chinese Academy of Sciences, China
Yong Li , Institute of Computing Technology, Chinese Academy of Sciences, China
Lei Wang , Institute of Computing Technology, Chinese Academy of Sciences, China
Dan Meng , Institute of Computing Technology, Chinese Academy of Sciences, China
Bo Sang , Institute of Computing Technology, Chinese Academy of Sciences, China
pp. 337-346

Report generation for simulation traces with Traviando (PDF)

Peter Kemper , College of William and Mary, Department of Computer Science, Williamsburg, VA 23187, USA
pp. 347-352

Möbius 2.3: An extensible tool for dependability, security, and performance evaluation of large and complex system models (PDF)

Tod Courtney , Coordinated Science Laboratory, Information Trust Institute, Department of Electrical and Computer Engineering, and Department of Computer Science, University of Illinois at Urbana-Champaign, USA
Shravan Gaonkar , Coordinated Science Laboratory, Information Trust Institute, Department of Electrical and Computer Engineering, and Department of Computer Science, University of Illinois at Urbana-Champaign, USA
Ken Keefe , Coordinated Science Laboratory, Information Trust Institute, Department of Electrical and Computer Engineering, and Department of Computer Science, University of Illinois at Urbana-Champaign, USA
Eric W. D. Rozier , Coordinated Science Laboratory, Information Trust Institute, Department of Electrical and Computer Engineering, and Department of Computer Science, University of Illinois at Urbana-Champaign, USA
William H. Sanders , Coordinated Science Laboratory, Information Trust Institute, Department of Electrical and Computer Engineering, and Department of Computer Science, University of Illinois at Urbana-Champaign, USA
pp. 353-358

Fitness-guided path exploration in dynamic symbolic execution (PDF)

Tao Xie , Department of Computer Science, North Carolina State University, 27695-8206, USA
Nikolai Tillmann , Microsoft Research, One Microsoft Way, Redmond, WA, 98074, USA
Jonathan de Halleux , Microsoft Research, One Microsoft Way, Redmond, WA, 98074, USA
Wolfram Schulte , Microsoft Research, One Microsoft Way, Redmond, WA, 98074, USA
pp. 359-368

System safety as an emergent property in composite systems (PDF)

Jennifer Black , Carnegie Mellon University, Pittsburgh, PA USA
Philip Koopman , Carnegie Mellon University, Pittsburgh, PA USA
pp. 369-378

LFI: A practical and general library-level fault injector (PDF)

Paul D. Marinescu , School of Computer and Communication Sciences, EPFL, Lausanne, Switzerland
George Candea , School of Computer and Communication Sciences, EPFL, Lausanne, Switzerland
pp. 379-388

Fluid modeling and control for server system performance and availability (PDF)

Luc Malrait , NeCS Control Theory, Research Group, INRIA - Gipsa Lab, Grenoble, France
Sara Bouchenak , SARDES Distributed Systems, Research Group, Univ. of Grenoble I - INRIA, France
Nicolas Marchand , NeCS Control Theory, Research Group, CNRS - Gipsa Lab, Grenoble, France
pp. 389-398

MAP-AMVA: Approximate mean value analysis of bursty systems (PDF)

Giuliano Casale , SAP Research, CEC Belfast, UK
Evgenia Smirni , College of William & Mary, Williamsburg, VA, USA
pp. 409-418

Overloading vulnerability of VoIP networks (PDF)

Hemant Sengar , Technology Development Dept., NuVox Communications, Greenville, SC, USA
pp. 419-428

On the effectiveness of low latency anonymous network in the presence of timing attack (PDF)

Jing Jin , Department of Computer Science, George Mason University, Fairfax, VA 22030, USA
Xinyuan Wang , Department of Computer Science, George Mason University, Fairfax, VA 22030, USA
pp. 429-438

RRE: A game-theoretic intrusion Response and Recovery Engine (PDF)

Saman A. Zonouz , University of Illinois at Urbana-Champaign, USA
Himanshu Khurana , University of Illinois at Urbana-Champaign, USA
William H. Sanders , University of Illinois at Urbana-Champaign, USA
Timothy M. Yardley , University of Illinois at Urbana-Champaign, USA
pp. 439-448

Power supply induced common cause faults-experimental assessment of potential countermeasures (PDF)

Peter Tummeltshammer , Vienna University of Technology - Embedded Computing Systems Group, Treitlstrasse 3, A-1040, Austria
Andreas Steininger , Vienna University of Technology - Embedded Computing Systems Group, Treitlstrasse 3, A-1040, Austria
pp. 449-457

Emμcode: Masking hard faults in complex functional units (PDF)

Nicholas Weaver , Center for Reliable and High-Performance Computing, Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, 1308 W. Main Street, 61801, USA
John H. Kelm , Center for Reliable and High-Performance Computing, Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, 1308 W. Main Street, 61801, USA
Matthew I. Frank , Center for Reliable and High-Performance Computing, Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, 1308 W. Main Street, 61801, USA
pp. 458-467

Processor reliability enhancement through compiler-directed register file peak temperature reduction (PDF)

Chengmo Yang , Computer Science and Engineering Department, University of California, San Diego, 9500 Gilman Drive, La Jolla, 92093, USA
Alex Orailoglu , Computer Science and Engineering Department, University of California, San Diego, 9500 Gilman Drive, La Jolla, 92093, USA
pp. 468-477

A low-tech solution to avoid the severe impact of transient errors on the IP interconnect (PDF)

Derek Graham , Institute for System Level Integration, UK
Per Strid , ARM Ltd, UK
Scott Roy , University of Glasgow, UK
Fernando Rodriguez , University of Glasgow, UK
pp. 478-483

Fail-Aware Untrusted Storage (PDF)

Christian Cachin , IBM Zurich Research Laboratory, CH-8803 Rüschlikon, Switzerland
Idit Keidar , Department of Electrical Engineering, Technion Haifa 32000, Israel
Alexander Shraer , Department of Electrical Engineering, Technion Haifa 32000, Israel
pp. 494-503

An efficient XOR-scheduling algorithm for erasure codes encoding (PDF)

Jianqiang Luo , Wayne State University, USA
Lihao Xu , Wayne State University, USA
James S. Plank , University of Tennessee, USA
pp. 504-513

Replacing linear Hamming codes by robust nonlinear codes results in a reliability improvement of memories (PDF)

Zhen Wang , Boston University, Reliable Computing Laboratory, 8 Saint Mary's Street, MA, USA
Mark G. Karpovsky , Boston University, Reliable Computing Laboratory, 8 Saint Mary's Street, MA, USA
Konrad J. Kulikowski , Boston University, Reliable Computing Laboratory, 8 Saint Mary's Street, MA, USA
pp. 514-523

VNsnap: Taking snapshots of virtual networked environments with minimal downtime (PDF)

Ardalan Kangarlou , Department of Computer Science, Purdue University, West Lafayette, IN 47907, USA
Patrick Eugster , Department of Computer Science, Purdue University, West Lafayette, IN 47907, USA
Dongyan Xu , Department of Computer Science, Purdue University, West Lafayette, IN 47907, USA
pp. 524-533

Fast memory state synchronization for virtualization-based fault tolerance (PDF)

Maohua Lu , Stony Brook University, USA
Tzi-cker Chiueh , Stony Brook University, USA
pp. 534-543

I-JVM: a Java Virtual Machine for component isolation in OSGi (PDF)

Nicolas Geoffray , UPMC/LIP6, France
Gael Thomas , UPMC/LIP6, France
Gilles Muller , EMN, INRIA-Regal, 104 avenue du Président Kennedy, 75016 Paris, France
Pierre Parrend , FZI Karlsruhe, Haid-und-Neu-Str. 10-14, 76131, Germany
Stephane Frenot , INSA Lyon CITI, INRIA-Ares, 20 avenue Albert Einstein, 69621 Villeurbanne Cedex, France
Bertil Folliot , UPMC/LIP6, France
pp. 544-553

ICT resilience of power control systems: experimental results from the CRUTIAL testbeds (PDF)

G. Dondossola , CESI RICERCA, Power System Development Department, Via Rubattino 54 20134 Milan (I), Italy
G. Garrone , CESI RICERCA, Power System Development Department, Via Rubattino 54 20134 Milan (I), Italy
J. Szanto , CESI RICERCA, Power System Development Department, Via Rubattino 54 20134 Milan (I), Italy
G. Deconinck , K.U.Leuven ESAT / ELECTA, Kasteelpark Arenberg 10 BE-3001 (B), Belgium
T. Loix , K.U.Leuven ESAT / ELECTA, Kasteelpark Arenberg 10 BE-3001 (B), Belgium
H. Beitollahi , K.U.Leuven ESAT / ELECTA, Kasteelpark Arenberg 10 BE-3001 (B), Belgium
pp. 554-559

Analyzing the process of installing rogue software (PDF)

Robin Berthier , Center for Risk and Reliability, Department of Mechanical Engineering, University of Maryland, College Park, USA
Jorge Arjona , Escuela Técnica Superior de Ingenieros de Telecomunicación, Universidad Politecnica of Valencia, Spain
Michel Cukier , Center for Risk and Reliability, Department of Mechanical Engineering, University of Maryland, College Park, USA
pp. 560-565

Using web security scanners to detect vulnerabilities in web services (PDF)

Marco Vieira , CISUC, Department of Informatics Engineering, University of Coimbra-Portugal
Nuno Antunes , CISUC, Department of Informatics Engineering, University of Coimbra-Portugal
Henrique Madeira , CISUC, Department of Informatics Engineering, University of Coimbra-Portugal
pp. 566-571

System log pre-processing to improve failure prediction (PDF)

Ziming Zheng , Illinois Institute of Technology, USA
Zhiling Lan , Illinois Institute of Technology, USA
Byung H. Park , Oak Ridge National Laboratory, USA
Al Geist , Oak Ridge National Laboratory, USA
pp. 572-577

Effectiveness of machine checks for error diagnostics (PDF)

Nikhil Pandit , Center for Reliable and High-Performance Computing, University of Illinois at Urbana Champaign, 1308 West Main Street, 61801 USA
Zbigniew Kalbarczyk , Center for Reliable and High-Performance Computing, University of Illinois at Urbana Champaign, 1308 West Main Street, 61801 USA
Ravishankar K Iyer , Center for Reliable and High-Performance Computing, University of Illinois at Urbana Champaign, 1308 West Main Street, 61801 USA
pp. 578-583

An end-to-end approach for the automatic derivation of application-aware error detectors (PDF)

Galen Lyle , Center for Reliable and High Performance Computing, University of Illinois (Urbana-Champaign), USA
Shelley Chen , SAIC, Champaign, IL, USA
Karthik Pattabiraman , Center for Reliable and High Performance Computing, University of Illinois (Urbana-Champaign), USA
Zbigniew Kalbarczyk , Center for Reliable and High Performance Computing, University of Illinois (Urbana-Champaign), USA
Ravishankar Iyer , Center for Reliable and High Performance Computing, University of Illinois (Urbana-Champaign), USA
pp. 584-589

Workshop on proactive failure avoidance, recovery and maintenance (PFARM) (PDF)

Miroslaw Malek , Humboldt-Universität zu Berlin, Germany
Felix Salfner , Humboldt-Universität zu Berlin, Germany
Kishor S. Trivedi , Duke University, Durham, USA
pp. 590-591

Second workshop on Compiler and Architectural Techniques for Application Reliability and Security (CATARS) (PDF)

Karthik Pattabiraman , Microsoft Research, One Microsoft Way, Redmond, WA-98052, USA
Zbigniew Kalbarczyk , University of Illinois at Urbana-Champaign, 1308 W Main St, 61801, USA
pp. 592-593

Fifth Workshop on Hot Topics in System Dependability (HotDep 2009) (PDF)

Christof Fetzer , TU Desden, Germany
Rodrigo Rodrigues , MPI-SWS, Saarbrücken, Germany
pp. 594-595

Third workshop on dependable and secure nanocomputing (PDF)

Jean Arlat , LAAS-CNRS and Université de Toulouse, 7, Avenue du Colonel Roche 31077-France
Cristian Constantinescu , AMD, 2950 E Harmony Rd., Fort Collins, CO 80528-USA
Ravishankar K. Iyer , Coordinated Science Laboratory, UIUC, 1308 West Main Street, Urbana, IL 61801-USA
Johan Karlsson , Dept. of Computer Science & Eng., Chalmers University of Technology, 41296 Göteborg-Sweden
Michael Nicolaidis , TIMA (CNRS, Grenoble INP, UJF), 46, Avenue Felix Viallet, 38031, France
pp. 596-597

Workshop on Architecting Dependable Systems (WADS 2009) (PDF)

Antonio Casimiro , University of Lisbon, Portugal
Rogerio de Lemos , University of Coimbra, Portugal
Cristina Gacek , Newcastle University, UK
pp. 598-599

3rd Workshop on Recent Advances on Intrusion-Tolerant Systems WRAITS 2009 (PDF)

Saurabh Bagchi , Purdue University, USA
Miguel Correia , University of Lisboa, Portugal
Partha Pal , BBN Technologies, USA
pp. 600-601

Student Forum (PDF)

Marco Vieira , CISUC, Department of Informatics Engineering, University of Coimbra-Portugal
pp. 602

Fast Abstracts (PDF)

Luigi Romano , Department of Technology, University of Naples Parthenope - Italy
pp. 593
87 ms
(Ver 3.3 (11022016))