default search action
DSN 2009: Estoril/Lisbon, Portugal
- Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2009, Estoril, Lisbon, Portugal, June 29 - July 2, 2009. IEEE Computer Society 2009, ISBN 978-1-4244-4422-9
Invited Talk
- Jacques Bus:
Future prospects of research on security and dependability. 1
Keynote Address
- Gonçalo Quadros:
Dependability - How does the market value it? 2
Session DCCS 1- Network Security
- Roberto Perdisci, Manos Antonakakis, Xiapu Luo, Wenke Lee:
WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks. 3-12 - Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, Hai Zhou, Zhi Fu:
Exception triggered DoS attacks on wireless networks. 13-22 - Ying Zhang, Zheng Zhang, Zhuoqing Morley Mao, Y. Charlie Hu:
HC-BGP: A light-weight and flexible scheme for securing prefix ownership. 23-32
Session DCCS 2 - Software Faults
- Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum:
Fault isolation for device drivers. 33-42 - Julia L. Lawall, Julien Brunel, Nicolas Palix, René Rydhof Hansen, Henrik Stuart, Gilles Muller:
WYSIWIB: A declarative approach to finding API protocols and bugs in Linux code. 43-52 - Xiang Yin, John C. Knight, Westley Weimer:
Exploiting refactoring in formal verification. 53-62
Session PDS 1 - Modeling and Evaluation I
- Marijn R. Jongerden, Boudewijn R. Haverkort, Henrik C. Bohnenkamp, Joost-Pieter Katoen:
Maximizing system lifetime by battery scheduling. 63-72 - Ossama Hamouda, Mohamed Kaâniche, Karama Kanoun:
Safety modeling and evaluation of Automated Highway Systems. 73-82 - Eric Rozier, Wendy Belluomini, Veera Deenadhayalan, Jim Hafner, K. K. Rao, Pin Zhou:
Evaluating the impact of Undetected Disk Errors in RAID systems. 83-92
Carter Award Presentation
- José Fonseca, Marco Vieira, Henrique Madeira:
Vulnerability & attack injection for web applications. 93-102
Panel
- Kaustubh R. Joshi, Guy Bunker, Farnam Jahanian, Aad P. A. van Moorsel, Joseph Weinman:
Dependability in the cloud: Challenges and opportunities. 103-104
Session DCCS 3 - Security
- Hari Kannan, Michael Dalton, Christos Kozyrakis:
Decoupling Dynamic Information Flow Tracking with a dedicated coprocessor. 105-114 - Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Peng Ning, Xiaolan Zhang:
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. 115-124 - Kevin S. Killourhy, Roy A. Maxion:
Comparing anomaly-detection algorithms for keystroke dynamics. 125-134
Session DCCS 4 - Middleware
- Robert E. Strom, Chitra Dorai:
Providing transactional quality of service in event stream processing middleware. 135-144 - Gabriela Jacques-Silva, Bugra Gedik, Henrique Andrade, Kun-Lung Wu:
Language level checkpointing support for stream processing applications. 145-154 - Filipe Freitas, Edgar Marques, Rodrigo Rodrigues, Carlos Ribeiro, Paulo Ferreira, Luís E. T. Rodrigues:
Verme: Worm containment in overlay networks. 155-164
Session DCCS 5 - Embedded Systems
- Christopher Szilagyi, Philip Koopman:
Flexible multicast authentication for time-triggered embedded control network applications. 165-174 - Justin Ray, Philip Koopman:
Data management mechanisms for embedded system gateways. 175-184 - Naga Durga Prasad Avirneni, Viswanathan Subramanian, Arun K. Somani:
Low overhead Soft Error Mitigation techniques for high-performance and aggressive systems. 185-194 - Mahdi Fazeli, Alireza Namazi, Seyed Ghassem Miremadi:
An energy efficient circuit level technique to protect register file from MBUs and SETs in embedded processors. 195-204
Session DCCS 6 - Tools and Demonstrations
- Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, Shih-Yao Dai, Yennun Huang, Sy-Yen Kuo:
Xprobe2++: Low volume remote network information gathering tool. 205-210 - Matthias Sand, Stefan Potyra, Volkmar Sieh:
Deterministic high-speed simulation of complex systems including fault-injection. 211-216 - Paulo Sousa, Alysson Neves Bessani, Wagner Saback Dantas, Fabio Souto, Miguel Correia, Nuno Ferreira Neves:
Intrusion-tolerant self-healing devices for critical infrastructure protection. 217-222 - Luis Marques, António Casimiro, Mario Calha:
Design and development of a proof-of-concept platooning application using the HIDENETS architecture. 223-228
Session PDS 2 - Web Services/Applications and Distributed Protocols
- Luiz Eduardo Buzato, Gustavo M. D. Vieira, Willy Zwaenepoel:
Dynamic content web applications: Crash, failover, and recovery analysis. 229-238 - Zibin Zheng, Michael R. Lyu:
A QoS-aware fault tolerant middleware for dependable service composition. 239-248 - Eli Courtwright, Chuan Yue, Haining Wang:
Efficient resource management on template-based web servers. 249-258 - Davide Frey, Rachid Guerraoui, Anne-Marie Kermarrec, Maxime Monod, Vivien Quéma:
Stretching gossip with live streaming. 259-264
Session DCCS 7 - Diagnosis
- Xiangyu Tang, Seongmoon Wang:
A self-diagnosis technique using Reed-Solomon codes for self-repairing chips. 265-274 - Yongning Tang, Ehab Al-Shaer:
Sharing end-user negative symptoms for improving overlay network dependability. 275-284 - Miao Jiang, Mohammad Ahmad Munawar, Thomas Reidemeister, Paul A. S. Ward:
Automatic fault detection and diagnosis in complex software systems by information-theoretic monitoring. 285-294
Session PDS 3 - Panel
- Henrique Madeira, István Majzik:
From assessment to standardised benchmarking: Will it happen? What could we do about it? 295-296
Session PDS 4 - Networking and Security I
- Duc T. Ha, Guanhua Yan, Stephan J. Eidenbenz, Hung Q. Ngo:
On the effectiveness of structural detection and defense against P2P-based botnets. 297-306 - Yu-Sung Wu, Saurabh Bagchi, Navjot Singh, Ratsameetip Wita:
Spam detection in voice-over-IP calls through semi-supervised clustering. 307-316 - Guanhua Yan, Leticia Cuellar, Stephan J. Eidenbenz, Nicolas W. Hengartner:
Blue-Watchdog: Detecting Bluetooth worm propagation in public areas. 317-326
Session PDS 5 - Linguistic Analysis and Tracing
- Avik Sinha, Amit M. Paradkar, Palani Kumanan, Branimir Boguraev:
A linguistic analysis engine for natural language use case description and its application to dependability analysis in industrial use cases. 327-336 - Zhihong Zhang, Jianfeng Zhan, Yong Li, Lei Wang, Dan Meng, Bo Sang:
Precise request tracing and performance debugging for multi-tier services of black boxes. 337-346
Session PDS 6 - Tools and Demonstrations
- Peter Kemper:
Report generation for simulation traces with Traviando. 347-352 - Tod Courtney, Shravan Gaonkar, Ken Keefe, Eric Rozier, William H. Sanders:
Möbius 2.3: An extensible tool for dependability, security, and performance evaluation of large and complex system models. 353-358
Session DCCS 8 - Testing and Verification
- Tao Xie, Nikolai Tillmann, Jonathan de Halleux, Wolfram Schulte:
Fitness-guided path exploration in dynamic symbolic execution. 359-368 - Jennifer Black, Philip Koopman:
System safety as an emergent property in composite systems. 369-378 - Paul Dan Marinescu, George Candea:
LFI: A practical and general library-level fault injector. 379-388
Session PDS 7 - Modeling and Evaluation II
- Luc Malrait, Sara Bouchenak, Nicolas Marchand:
Fluid modeling and control for server system performance and availability. 389-398 - Marco Beccuti, Giuliana Franceschinis, Daniele Codetta Raiteri, Serge Haddad:
Parametric NdRFT for the derivation of optimal repair strategies. 399-408 - Giuliano Casale, Evgenia Smirni:
MAP-AMVA: Approximate mean value analysis of bursty systems. 409-418
Session PDS 8 - Networking and Security II
- Hemant Sengar:
Overloading vulnerability of VoIP networks. 419-428 - Jing Jin, Xinyuan Wang:
On the effectiveness of low latency anonymous network in the presence of timing attack. 429-438 - Saman A. Zonouz, Himanshu Khurana, William H. Sanders, Timothy M. Yardley:
RRE: A game-theoretic intrusion Response and Recovery Engine. 439-448
Session DCCS 9 - Hardware
- Peter Tummeltshammer, Andreas Steininger:
Power supply induced common cause faults-experimental assessment of potential countermeasures. 449-457 - Nicholas Weaver, John H. Kelm, Matthew I. Frank:
Emµcode: Masking hard faults in complex functional units. 458-467 - Chengmo Yang, Alex Orailoglu:
Processor reliability enhancement through compiler-directed register file peak temperature reduction. 468-477 - Derek Graham, Per Strid, Scott Roy, Fernando Rodriguez:
A low-tech solution to avoid the severe impact of transient errors on the IP interconnect. 478-483
Session DCCS 10 - Storage
- Jon G. Elerath:
A simple equation for estimating reliability of an N+1 redundant array of independent disks (RAID). 484-493 - Christian Cachin, Idit Keidar, Alexander Shraer:
Fail-Aware Untrusted Storage. 494-503 - Jianqiang Luo, Lihao Xu, James S. Plank:
An efficient XOR-scheduling algorithm for erasure codes encoding. 504-513 - Zhen Wang, Mark G. Karpovsky, Konrad J. Kulikowski:
Replacing linear Hamming codes by robust nonlinear codes results in a reliability improvement of memories. 514-523
Session DCCS 11 - Virtual Machines
- Ardalan Kangarlou, Patrick Eugster, Dongyan Xu:
VNsnap: Taking snapshots of virtual networked environments with minimal downtime. 524-533 - Maohua Lu, Tzi-cker Chiueh:
Fast memory state synchronization for virtualization-based fault tolerance. 534-543 - Nicolas Geoffray, Gaël Thomas, Gilles Muller, Pierre Parrend, Stéphane Frénot, Bertil Folliot:
I-JVM: a Java Virtual Machine for component isolation in OSGi. 544-553
Session PDS 9 - Security Analysis Experiments
- Giovanna Dondossola, Fabrizio Garrone, Judit Szanto, Geert Deconinck, T. Loix, Hakem Beitollahi:
ICT resilience of power control systems: experimental results from the CRUTIAL testbeds. 554-559 - Robin Berthier, Jorge Arjona, Michel Cukier:
Analyzing the process of installing rogue software. 560-565 - Marco Vieira, Nuno Antunes, Henrique Madeira:
Using web security scanners to detect vulnerabilities in web services. 566-571
Session PDS 10 - Experiments on Failure Prediction and Error Detection
- Ziming Zheng, Zhiling Lan, Byung-Hoon Park, Al Geist:
System log pre-processing to improve failure prediction. 572-577 - Nikhil Pandit, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Effectiveness of machine checks for error diagnostics. 578-583 - Galen Lyle, Shelley Cheny, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
An end-to-end approach for the automatic derivation of application-aware error detectors. 584-589
Special Tracks
- Miroslaw Malek, Felix Salfner, Kishor S. Trivedi:
Workshop on proactive failure avoidance, recovery and maintenance (PFARM). 590-591 - Karthik Pattabiraman, Zbigniew Kalbarczyk:
Second workshop on Compiler and Architectural Techniques for Application Reliability and Security (CATARS). 592-593 - Luigi Romano:
Fast Abstracts. 593 - Christof Fetzer, Rodrigo Rodrigues:
Fifth Workshop on Hot Topics in System Dependability (HotDep 2009). 594-595 - Jean Arlat, Cristian Constantinescu, Ravishankar K. Iyer, Johan Karlsson, Michael Nicolaidis:
Third workshop on dependable and secure nanocomputing. 596-597 - António Casimiro, Rogério de Lemos, Cristina Gacek:
Workshop on Architecting Dependable Systems (WADS 2009). 598-599 - Saurabh Bagchi, Miguel Correia, Partha P. Pal:
3rd Workshop on Recent Advances on Intrusion-Tolerant Systems WRAITS 2009. 600-601 - Marco Vieira:
Student Forum. 602
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.