PRELIMINARY SCHEDULE

 
Monday, 25 June
8:30-12:00 Workshop 1
Open, Resilient, Human-Aware Cyber-Physical Systems
Workshop 2
Fault-Tolerance for HPC at Extreme Scale
Workshop 3
Recent Advances on Intrusion Tolerance and Resilience
Workshop 4
Dependability of Clouds, Data Centers, and Virtual Machine Technology
Tutorial 1
Tool-Supported Model-Based Saftey Analysis of Software Intensive Systems
 
13:30-17:00 Workshop 1 (cont.)
Open, Resilient, Human-Aware Cyber-Physical Systems
Workshop 2 (cont.)
Fault-Tolerance for HPC at Extreme Scale
Workshop 3 (cont.)
Recent Advances on Intrusion Tolerance and Resilience
Workshop 4 (cont.)
Dependability of Clouds, Data Centers, and Virtual Machine Technology
Tutorial 2
From Reliable to Secure Distributed Programming
Tutorial 3
Software Fault Injection for the Assessment of Critical Systems
Tuesday, 26 June
8:30-10:30 PLENARY SESSION
KEYNOTE ADDRESS BY DR. JULIAN M. GOLDMAN
11:00-12:30 DCCS-1 DEPENDABILITY ASSESSMENT
Instrumenting AUTOSAR for Dependability Assessment: A Guidance Framework
Thorsten Piper, Stefan Winter, Paul Manns and Neeraj Suri
Binary Mutation Testing Through Dynamic Translation
Markus Becker, Christoph Kuznik, Mabel Mary Joy, Tao Xie and Wolfgang Müller
DS-Bench Toolset: Tools for Dependability Benchmarking with Simulation and Assurance
Hajime Fujita, Yutaka Matsuno, Toshihiro Hanawa, Mitsuhisa Sato, Shinpei Kato and Yutaka Ishikawa
PDS-1 NETWORKS
Multi-Ring Paxos
Parisa Marandi, Marco Primi and Fernando Pedone
Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks
Srikar Tati, Bong Jun Ko, Guohong Cao, Ananthram Swami and Thomas La Porta
Mitigating the Impact of Ambient Noise on Wireless Mesh Networks Using Adaptive Link-Quality-based Packet Replication
Jesús Friginal, Juan-Carlos Ruiz, David de Andrés and Antonio Bustos
 
14:00-15:30 DCCS-2 STORAGE
Practical Scrubbing: Getting to the bad sector at the right time
George Amvrosiadis, Alina Oprea and Bianca Schroeder
Robust Data Sharing with Key-Value Stores
Cristina Basescu, Christian Cachin, Ittay Eyal, Robert Haas, Alessandro Sorniotti, Marko Vukolic and Ido Zachevsky
A Framework for Efficient Evaluation of the Fault Tolerance of Deduplicated Storage Systems
Eric Davis Rozier and William Sanders
PDS-2 FAULT INJECTION
Error Injection-based Study of Soft Error Propagation in AMD Bulldozer Microprocessor Module
Cristian Constantinescu, Mike Butler and Chris Weller
Understanding Soft Error Propagations Using Efficient Vulnerability-Driven Fault Injection
Xin Xu and Man-Lap Li
Characterization of Error Resiliency of Power Grid Substation Devices
Kuan-Yu Tseng, Daniel Chen, Zbigniew Kalbarczyk and Ravishankar Iyer
 
16:00-17:30 DCCS-3 MONITORING & DIAGNOSIS
Flexible and Efficient Instruction-Grained Run-Time Monitoring
Daniel Deng and Edward Suh
Automatic Fault Characterization via Abnormality-Enhanced Classification
Greg Bronevetsky, Ignacio Laguna, Saurabh Bagchi and Bronis R. de Supinski
Draco: Statistical Diagnosis of Chronic Problems in Large Distributed Systems
Soila Pertet Kavulya, Kaustubh Joshi, Matti Hiltunen, Scott Daniels, Rajeev Gandhi and Priya Narasimhan
PDS-3 PERFORMANCE I
Model-driven Consolidation of Java Workloads on Multicores
Danilo Ansaloni, Lydia Y. Chen, Evgenia Smirni and Walter Binder
Finite Horizon Analysis of Infinite CTMDPs
Peter Buchholz
Toward Comprehensive and Accurate Simulation Performance Prediction of Parallel File Systems
Miguel Erazo, Ting Li, Jason Liu and Stephan Eidenbenz
 
18:00-19:30 BIRDS OF A FEATHER
Wednesday, 27 June
8:30-10:00 DCCS-4 DISTRIBUTED SYSTEMS
Scalable Deferred Update Replication
Daniele Sciascia, Fernando Pedone and Flavio Junqueira
Latent Fault Detection in Large Scale Services
Moshe Gabel, Assaf Schuster, Ran Gilad-Bachrach and Nikolaj Bjorner
Keep Net Working - On a Dependable and Fast Networking Stack
Tomas Hruby, Dirk Vogt, Herbert Bos and Andrew S. Tanenbaum
PDS-4 RELABILITY
A Cost-based Heterogeneous Recovery Scheme for Distributed Storage Systems with RAID-6 Codes
Yunfeng Zhu, Patrick P. C. Lee, Liping Xiang, Yinlong Xu and Lingling Gao
A new symbolic approach for network reliability analysis
Marco Beccuti, Andrea Bobbio, Giuliana Franceschinis and Roberta Terruggia
A Study of Soft Error Consequences in Hard Disk Drives
Timothy Tsai, Nawanol Theera-Ampornpunt and Saurabh Bagchi
 
10:30-12:00 DCCS-5 ERROR CODING & SAFETY
Heuristics for Optimizing Matrix-Based Erasure Codes for Fault-Tolerant Storage Systems
James Plank, Catherine Schuman and Devin Robison
Algorithmic Approaches to Low Overhead Fault Detection for Sparse Linear Algebra
Joseph Sloan, Rakesh Kumar, Greg Bronevetsky and Tzanio Kolev
Perspectives on Software Safety Case Development for Unmanned Aircraft
Ewen Denney, Ganesh Pai and Ibrahim Habli
PDS-5 SECURITY I
Scalable Optimal Countermeasure Selection using Implicit Enumeration on Attack Countermeasure Trees
Arpan Roy, Dong-Seong Kim and Kishor Trivedi
Security Metric Elicitation in Power Grid Critical Infrastructures by Observing System Administrators' Responsive Behavior
Saman A. Zonouz, Amir Houmansadr and Parisa Haghani
A Time-Efficient Approach to Cost-Effective Network Hardening Using Attack Graphs
Massimiliano Albanese, Sushil Jajodia and Steven Noel
POSTER SESSION
13:30-15:00 DCCS-6 SECURITY

Carter Award Winner
Taming Mr Hayes: Mitigating Signaling Based Attacks on Smartphones

Collin Mulliner, Steffen Liebergeld, Matthias Lange and Jean-Pierre Seifert

A Cross-Layer Approach for IP Network Protection
Qiang Zheng, Jing Zhao and Guohong Cao
Epiphany: A Location Hiding Architecture for Protecting Critical Services from DDoS Attacks
Vamsi Kambhampati, Christos Papadopoulos and Daniel Massey
PDS-6 DATA ANALYSIS
Assessing Time Coalescence Techniques for the Analysis of Supercomputer Logs
Catello Di Martino, Marcello Cinque and Domenico Cotroneo
Optimization of Data Collection Strategies for Model-Based Evaluation and Decision-Making
Robert Cain and Aad van Moorsel
Filtering log data: finding the needles in the haystack
Li Yu, Ziming Zheng, Zhiling Lan, Terry Jones, Jim Brandt and Ann Gentile
FAST ABSTRACTS I
15:30-17:00 EMANUEL R. PIORE AWARD LECTURE BY PROFESSOR FRED B. SCHNEIDER -- "BLUEPRINT FOR A SCIENCE OF SECURITY"
17:30-23:00 BANQUET AND EXCURSION TO "BLUE MAN GROUP"
Thursday, 28 June
8:30-10:00 DCCS-7 HARDWARE
RDIS: A Recursively Defined Invertible Set Scheme to Tolerate Multiple Stuck-At Faults in Resistive Memory.
Rami Melhem, Rakan Maddah and Sangyeun Cho
RePRAM: Re-cycling PRAM Faulty Blocks for Extended Lifetime
Jie Chen, Guru Venkataramani and H Howie Huang
VariaNT: A Microarchitectural Model of Process Variation for Near-Threshold Voltage Computing
Ulya R. Karpuzcu, Krishna Kolluru, Nam Sung Kim and Josep Torrellas
STUDENT FORUM
The Hierarchical Microkernel: A Flexible and Robust OS Architecture
Stefan Winter
Application of Model Revision in Dependable Protocols
Reza Hajisheykhi
Single Chip Diversity TMR for Increased Reliability in Automotive Applications
Omar Hiari
Tolerating Intermittent Hardware Faults
Rashid Layali
Autonomic Approach to Fault and Performance Management in Map-Reduce Clusters
Selvi Kadirvel
 
10:30-12:00 DCCS-8 MONITORING & REDUNDANCY
Mitigating Random Variation with Spare RIBs: Redundant Intermediate Bitslices
David J. Palframan, Nam Sung Kim and Mikko H. Lipasti
Lightweight Cooperative Logging for Fault Replication in Concurrent Programs
Nuno Machado, Paolo Romano and Luís Rodrigues
Confidentiality of Event Data in Policy-based Monitoring
Mirko Montanari and Roy Campbell
PDS-7 PERFORMANCE II
Continuous Authentication for Mouse Dynamics: A Pattern-Growth Approach
Chao Shen, Zhongmin Cai and Xiaohong Guan
NINEPIN: Non-Invasive and Energy Efficient Performance Isolation in Virtualized Servers
Palden Lama and Xiaobo Zhou
ExtraTime: Modeling and Analysis of Wearout due to Transistor Aging at Microarchitecture-Level
Fabian Oboril and Mehdi Tahoori
 
13:30-15:00 DCCS-9 ERROR DETECTION
CFIMon: Detecting Violation of Control Flow Integrity using Performance Counters
Yubin Xia, Yutao Liu, Haibo Chen and Binyu Zang
BLOCKWATCH: Leveraging Similarity in Parallel Programs for Error Detection
Jiesheng Wei and Karthik Pattabiraman
Low-cost Program-level Detectors for Reducing Silent Data Corruptions
Siva Kumar Sastry Hari, Sarita V. Adve and Helia Naeimi
PDS-8 SECURITY II
Safeguarding Academic Accounts and Resources with the University Credential Abuse Auditing System
Jing Zhang, Robin Berthier, William Rhee, Michael Bailey, Partha Pal, William Sanders and Farnam Jahanian
A Dependability Analysis of Hardware-Assisted Polling Integrity Checking Systems
Jiang Wang, Kun Sun and Angelos Stavrou
An Empirical Study of the Robustness of Inter-component Communication in Android
Amiya K. Maji, Fahad A. Arshad, Saurabh Bagchi and Jan S. Rellermeyer
FAST ABSTRACTS II
15:30-17:00 TECHNICAL COMMITTEE MEETING (OPEN TO ALL)

Click here for any inquiries..

Return to home page