![]() |
|
![]() |
|
PRELIMINARY
SCHEDULE |
|
Monday,
25 June |
||||||
8:30-12:00 | Workshop 1 Open, Resilient, Human-Aware Cyber-Physical Systems |
Workshop 2 Fault-Tolerance for HPC at Extreme Scale |
Workshop 3 Recent Advances on Intrusion Tolerance and Resilience |
Workshop 4 Dependability of Clouds, Data Centers, and Virtual Machine Technology |
Tutorial 1 Tool-Supported Model-Based Saftey Analysis of Software Intensive Systems |
|
13:30-17:00 | Workshop 1 (cont.) Open, Resilient, Human-Aware Cyber-Physical Systems |
Workshop 2 (cont.) Fault-Tolerance for HPC at Extreme Scale |
Workshop 3 (cont.) Recent Advances on Intrusion Tolerance and Resilience |
Workshop 4 (cont.) Dependability of Clouds, Data Centers, and Virtual Machine Technology |
Tutorial 2 From Reliable to Secure Distributed Programming |
Tutorial 3 Software Fault Injection for the Assessment of Critical Systems |
Tuesday,
26 June |
||||
8:30-10:30 | PLENARY SESSION KEYNOTE ADDRESS BY DR. JULIAN M. GOLDMAN |
|||
11:00-12:30 | DCCS-1 DEPENDABILITY
ASSESSMENT Instrumenting AUTOSAR for Dependability Assessment: A Guidance Framework Thorsten Piper, Stefan Winter, Paul Manns and Neeraj Suri Binary Mutation Testing Through Dynamic Translation Markus Becker, Christoph Kuznik, Mabel Mary Joy, Tao Xie and Wolfgang Müller DS-Bench Toolset: Tools for Dependability Benchmarking with Simulation and Assurance Hajime Fujita, Yutaka Matsuno, Toshihiro Hanawa, Mitsuhisa Sato, Shinpei Kato and Yutaka Ishikawa |
PDS-1 NETWORKS Multi-Ring Paxos Parisa Marandi, Marco Primi and Fernando Pedone Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks Srikar Tati, Bong Jun Ko, Guohong Cao, Ananthram Swami and Thomas La Porta Mitigating the Impact of Ambient Noise on Wireless Mesh Networks Using Adaptive Link-Quality-based Packet Replication Jesús Friginal, Juan-Carlos Ruiz, David de Andrés and Antonio Bustos |
||
14:00-15:30 | DCCS-2 STORAGE Practical Scrubbing: Getting to the bad sector at the right time George Amvrosiadis, Alina Oprea and Bianca Schroeder Robust Data Sharing with Key-Value Stores Cristina Basescu, Christian Cachin, Ittay Eyal, Robert Haas, Alessandro Sorniotti, Marko Vukolic and Ido Zachevsky A Framework for Efficient Evaluation of the Fault Tolerance of Deduplicated Storage Systems Eric Davis Rozier and William Sanders |
PDS-2 FAULT INJECTION Error Injection-based Study of Soft Error Propagation in AMD Bulldozer Microprocessor Module Cristian Constantinescu, Mike Butler and Chris Weller Understanding Soft Error Propagations Using Efficient Vulnerability-Driven Fault Injection Xin Xu and Man-Lap Li Characterization of Error Resiliency of Power Grid Substation Devices Kuan-Yu Tseng, Daniel Chen, Zbigniew Kalbarczyk and Ravishankar Iyer |
||
16:00-17:30 | DCCS-3 MONITORING
& DIAGNOSIS Flexible and Efficient Instruction-Grained Run-Time Monitoring Daniel Deng and Edward Suh Automatic Fault Characterization via Abnormality-Enhanced Classification Greg Bronevetsky, Ignacio Laguna, Saurabh Bagchi and Bronis R. de Supinski Draco: Statistical Diagnosis of Chronic Problems in Large Distributed Systems Soila Pertet Kavulya, Kaustubh Joshi, Matti Hiltunen, Scott Daniels, Rajeev Gandhi and Priya Narasimhan |
PDS-3 PERFORMANCE
I Model-driven Consolidation of Java Workloads on Multicores Danilo Ansaloni, Lydia Y. Chen, Evgenia Smirni and Walter Binder Finite Horizon Analysis of Infinite CTMDPs Peter Buchholz Toward Comprehensive and Accurate Simulation Performance Prediction of Parallel File Systems Miguel Erazo, Ting Li, Jason Liu and Stephan Eidenbenz |
||
18:00-19:30 | BIRDS OF A FEATHER | |||
Wednesday,
27 June |
||||
8:30-10:00 | DCCS-4 DISTRIBUTED
SYSTEMS Scalable Deferred Update Replication Daniele Sciascia, Fernando Pedone and Flavio Junqueira Latent Fault Detection in Large Scale Services Moshe Gabel, Assaf Schuster, Ran Gilad-Bachrach and Nikolaj Bjorner Keep Net Working - On a Dependable and Fast Networking Stack Tomas Hruby, Dirk Vogt, Herbert Bos and Andrew S. Tanenbaum |
PDS-4 RELABILITY A Cost-based Heterogeneous Recovery Scheme for Distributed Storage Systems with RAID-6 Codes Yunfeng Zhu, Patrick P. C. Lee, Liping Xiang, Yinlong Xu and Lingling Gao A new symbolic approach for network reliability analysis Marco Beccuti, Andrea Bobbio, Giuliana Franceschinis and Roberta Terruggia A Study of Soft Error Consequences in Hard Disk Drives Timothy Tsai, Nawanol Theera-Ampornpunt and Saurabh Bagchi |
||
10:30-12:00 | DCCS-5 ERROR
CODING & SAFETY Heuristics for Optimizing Matrix-Based Erasure Codes for Fault-Tolerant Storage Systems James Plank, Catherine Schuman and Devin Robison Algorithmic Approaches to Low Overhead Fault Detection for Sparse Linear Algebra Joseph Sloan, Rakesh Kumar, Greg Bronevetsky and Tzanio Kolev Perspectives on Software Safety Case Development for Unmanned Aircraft Ewen Denney, Ganesh Pai and Ibrahim Habli |
PDS-5 SECURITY
I Scalable Optimal Countermeasure Selection using Implicit Enumeration on Attack Countermeasure Trees Arpan Roy, Dong-Seong Kim and Kishor Trivedi Security Metric Elicitation in Power Grid Critical Infrastructures by Observing System Administrators' Responsive Behavior Saman A. Zonouz, Amir Houmansadr and Parisa Haghani A Time-Efficient Approach to Cost-Effective Network Hardening Using Attack Graphs Massimiliano Albanese, Sushil Jajodia and Steven Noel |
POSTER SESSION | |
13:30-15:00 | DCCS-6 SECURITY Carter Award Winner Taming Mr Hayes: Mitigating Signaling Based Attacks on Smartphones Collin Mulliner, Steffen Liebergeld, Matthias Lange and Jean-Pierre Seifert A Cross-Layer Approach for IP Network Protection Qiang Zheng, Jing Zhao and Guohong Cao Epiphany: A Location Hiding Architecture for Protecting Critical Services from DDoS Attacks Vamsi Kambhampati, Christos Papadopoulos and Daniel Massey |
PDS-6 DATA ANALYSIS Assessing Time Coalescence Techniques for the Analysis of Supercomputer Logs Catello Di Martino, Marcello Cinque and Domenico Cotroneo Optimization of Data Collection Strategies for Model-Based Evaluation and Decision-Making Robert Cain and Aad van Moorsel Filtering log data: finding the needles in the haystack Li Yu, Ziming Zheng, Zhiling Lan, Terry Jones, Jim Brandt and Ann Gentile |
FAST ABSTRACTS I | |
15:30-17:00 | EMANUEL R. PIORE AWARD LECTURE BY PROFESSOR FRED B. SCHNEIDER -- "BLUEPRINT FOR A SCIENCE OF SECURITY" | |||
17:30-23:00 | BANQUET AND EXCURSION TO "BLUE MAN GROUP" | |||
Thursday,
28 June |
||||
8:30-10:00 | DCCS-7 HARDWARE RDIS: A Recursively Defined Invertible Set Scheme to Tolerate Multiple Stuck-At Faults in Resistive Memory. Rami Melhem, Rakan Maddah and Sangyeun Cho RePRAM: Re-cycling PRAM Faulty Blocks for Extended Lifetime Jie Chen, Guru Venkataramani and H Howie Huang VariaNT: A Microarchitectural Model of Process Variation for Near-Threshold Voltage Computing Ulya R. Karpuzcu, Krishna Kolluru, Nam Sung Kim and Josep Torrellas |
STUDENT FORUM The Hierarchical Microkernel: A Flexible and Robust OS Architecture Stefan Winter Application of Model Revision in Dependable Protocols Reza Hajisheykhi Single Chip Diversity TMR for Increased Reliability in Automotive Applications Omar Hiari Tolerating Intermittent Hardware Faults Rashid Layali Autonomic Approach to Fault and Performance Management in Map-Reduce Clusters Selvi Kadirvel |
||
10:30-12:00 | DCCS-8 MONITORING
& REDUNDANCY Mitigating Random Variation with Spare RIBs: Redundant Intermediate Bitslices David J. Palframan, Nam Sung Kim and Mikko H. Lipasti Lightweight Cooperative Logging for Fault Replication in Concurrent Programs Nuno Machado, Paolo Romano and Luís Rodrigues Confidentiality of Event Data in Policy-based Monitoring Mirko Montanari and Roy Campbell |
PDS-7 PERFORMANCE
II Continuous Authentication for Mouse Dynamics: A Pattern-Growth Approach Chao Shen, Zhongmin Cai and Xiaohong Guan NINEPIN: Non-Invasive and Energy Efficient Performance Isolation in Virtualized Servers Palden Lama and Xiaobo Zhou ExtraTime: Modeling and Analysis of Wearout due to Transistor Aging at Microarchitecture-Level Fabian Oboril and Mehdi Tahoori |
||
13:30-15:00 | DCCS-9 ERROR
DETECTION CFIMon: Detecting Violation of Control Flow Integrity using Performance Counters Yubin Xia, Yutao Liu, Haibo Chen and Binyu Zang BLOCKWATCH: Leveraging Similarity in Parallel Programs for Error Detection Jiesheng Wei and Karthik Pattabiraman Low-cost Program-level Detectors for Reducing Silent Data Corruptions Siva Kumar Sastry Hari, Sarita V. Adve and Helia Naeimi |
PDS-8 SECURITY
II Safeguarding Academic Accounts and Resources with the University Credential Abuse Auditing System Jing Zhang, Robin Berthier, William Rhee, Michael Bailey, Partha Pal, William Sanders and Farnam Jahanian A Dependability Analysis of Hardware-Assisted Polling Integrity Checking Systems Jiang Wang, Kun Sun and Angelos Stavrou An Empirical Study of the Robustness of Inter-component Communication in Android Amiya K. Maji, Fahad A. Arshad, Saurabh Bagchi and Jan S. Rellermeyer |
FAST ABSTRACTS II | |
15:30-17:00 | TECHNICAL COMMITTEE MEETING (OPEN TO ALL) |
Click here for any inquiries..