


default search action
DSN 2009: Estoril/Lisbon, Portugal
- Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2009, Estoril, Lisbon, Portugal, June 29 - July 2, 2009. IEEE Computer Society 2009, ISBN 978-1-4244-4422-9

Invited Talk
- Jacques Bus:

Future prospects of research on security and dependability. 1
Keynote Address
- Gonçalo Quadros:

Dependability - How does the market value it? 2
Session DCCS 1- Network Security
- Roberto Perdisci

, Manos Antonakakis, Xiapu Luo
, Wenke Lee:
WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks. 3-12 - Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, Hai Zhou, Zhi Fu:

Exception triggered DoS attacks on wireless networks. 13-22 - Ying Zhang, Zheng Zhang, Zhuoqing Morley Mao, Y. Charlie Hu:

HC-BGP: A light-weight and flexible scheme for securing prefix ownership. 23-32
Session DCCS 2 - Software Faults
- Jorrit N. Herder, Herbert Bos

, Ben Gras, Philip Homburg, Andrew S. Tanenbaum
:
Fault isolation for device drivers. 33-42 - Julia L. Lawall, Julien Brunel, Nicolas Palix

, René Rydhof Hansen
, Henrik Stuart, Gilles Muller:
WYSIWIB: A declarative approach to finding API protocols and bugs in Linux code. 43-52 - Xiang Yin, John C. Knight, Westley Weimer:

Exploiting refactoring in formal verification. 53-62
Session PDS 1 - Modeling and Evaluation I
- Marijn R. Jongerden

, Boudewijn R. Haverkort
, Henrik C. Bohnenkamp, Joost-Pieter Katoen
:
Maximizing system lifetime by battery scheduling. 63-72 - Ossama Hamouda, Mohamed Kaâniche, Karama Kanoun:

Safety modeling and evaluation of Automated Highway Systems. 73-82 - Eric Rozier, Wendy Belluomini, Veera Deenadhayalan, Jim Hafner, K. K. Rao, Pin Zhou:

Evaluating the impact of Undetected Disk Errors in RAID systems. 83-92
Carter Award Presentation
- José Fonseca

, Marco Vieira
, Henrique Madeira
:
Vulnerability & attack injection for web applications. 93-102
Panel
- Kaustubh R. Joshi, Guy Bunker, Farnam Jahanian, Aad P. A. van Moorsel

, Joseph Weinman:
Dependability in the cloud: Challenges and opportunities. 103-104
Session DCCS 3 - Security
- Hari Kannan, Michael Dalton, Christos Kozyrakis:

Decoupling Dynamic Information Flow Tracking with a dedicated coprocessor. 105-114 - Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Peng Ning, Xiaolan Zhang:

Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. 115-124 - Kevin S. Killourhy, Roy A. Maxion:

Comparing anomaly-detection algorithms for keystroke dynamics. 125-134
Session DCCS 4 - Middleware
- Robert E. Strom, Chitra Dorai:

Providing transactional quality of service in event stream processing middleware. 135-144 - Gabriela Jacques-Silva, Bugra Gedik, Henrique Andrade, Kun-Lung Wu:

Language level checkpointing support for stream processing applications. 145-154 - Filipe Freitas

, Edgar Marques, Rodrigo Rodrigues
, Carlos Ribeiro
, Paulo Ferreira
, Luís E. T. Rodrigues:
Verme: Worm containment in overlay networks. 155-164
Session DCCS 5 - Embedded Systems
- Christopher Szilagyi, Philip Koopman:

Flexible multicast authentication for time-triggered embedded control network applications. 165-174 - Justin Ray, Philip Koopman:

Data management mechanisms for embedded system gateways. 175-184 - Naga Durga Prasad Avirneni, Viswanathan Subramanian, Arun K. Somani:

Low overhead Soft Error Mitigation techniques for high-performance and aggressive systems. 185-194 - Mahdi Fazeli

, Alireza Namazi, Seyed Ghassem Miremadi:
An energy efficient circuit level technique to protect register file from MBUs and SETs in embedded processors. 195-204
Session DCCS 6 - Tools and Demonstrations
- Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, Shih-Yao Dai, Yennun Huang

, Sy-Yen Kuo
:
Xprobe2++: Low volume remote network information gathering tool. 205-210 - Matthias Sand, Stefan Potyra, Volkmar Sieh:

Deterministic high-speed simulation of complex systems including fault-injection. 211-216 - Paulo Sousa

, Alysson Neves Bessani
, Wagner Saback Dantas, Fabio Souto, Miguel Correia
, Nuno Ferreira Neves
:
Intrusion-tolerant self-healing devices for critical infrastructure protection. 217-222 - Luis Marques

, António Casimiro
, Mario Calha
:
Design and development of a proof-of-concept platooning application using the HIDENETS architecture. 223-228
Session PDS 2 - Web Services/Applications and Distributed Protocols
- Luiz Eduardo Buzato, Gustavo M. D. Vieira

, Willy Zwaenepoel:
Dynamic content web applications: Crash, failover, and recovery analysis. 229-238 - Zibin Zheng

, Michael R. Lyu:
A QoS-aware fault tolerant middleware for dependable service composition. 239-248 - Eli Courtwright, Chuan Yue, Haining Wang:

Efficient resource management on template-based web servers. 249-258 - Davide Frey, Rachid Guerraoui

, Anne-Marie Kermarrec
, Maxime Monod, Vivien Quéma:
Stretching gossip with live streaming. 259-264
Session DCCS 7 - Diagnosis
- Xiangyu Tang, Seongmoon Wang:

A self-diagnosis technique using Reed-Solomon codes for self-repairing chips. 265-274 - Yongning Tang, Ehab Al-Shaer:

Sharing end-user negative symptoms for improving overlay network dependability. 275-284 - Miao Jiang, Mohammad Ahmad Munawar, Thomas Reidemeister, Paul A. S. Ward:

Automatic fault detection and diagnosis in complex software systems by information-theoretic monitoring. 285-294
Session PDS 3 - Panel
- Henrique Madeira

, István Majzik
:
From assessment to standardised benchmarking: Will it happen? What could we do about it? 295-296
Session PDS 4 - Networking and Security I
- Duc T. Ha, Guanhua Yan, Stephan J. Eidenbenz

, Hung Q. Ngo:
On the effectiveness of structural detection and defense against P2P-based botnets. 297-306 - Yu-Sung Wu, Saurabh Bagchi, Navjot Singh, Ratsameetip Wita

:
Spam detection in voice-over-IP calls through semi-supervised clustering. 307-316 - Guanhua Yan, Leticia Cuellar, Stephan J. Eidenbenz

, Nicolas W. Hengartner
:
Blue-Watchdog: Detecting Bluetooth worm propagation in public areas. 317-326
Session PDS 5 - Linguistic Analysis and Tracing
- Avik Sinha, Amit M. Paradkar, Palani Kumanan, Branimir Boguraev:

A linguistic analysis engine for natural language use case description and its application to dependability analysis in industrial use cases. 327-336 - Zhihong Zhang, Jianfeng Zhan, Yong Li, Lei Wang, Dan Meng, Bo Sang:

Precise request tracing and performance debugging for multi-tier services of black boxes. 337-346
Session PDS 6 - Tools and Demonstrations
- Peter Kemper:

Report generation for simulation traces with Traviando. 347-352 - Tod Courtney, Shravan Gaonkar, Ken Keefe, Eric Rozier, William H. Sanders:

Möbius 2.3: An extensible tool for dependability, security, and performance evaluation of large and complex system models. 353-358
Session DCCS 8 - Testing and Verification
- Tao Xie, Nikolai Tillmann, Jonathan de Halleux, Wolfram Schulte:

Fitness-guided path exploration in dynamic symbolic execution. 359-368 - Jennifer Black, Philip Koopman:

System safety as an emergent property in composite systems. 369-378 - Paul Dan Marinescu, George Candea:

LFI: A practical and general library-level fault injector. 379-388
Session PDS 7 - Modeling and Evaluation II
- Luc Malrait, Sara Bouchenak, Nicolas Marchand:

Fluid modeling and control for server system performance and availability. 389-398 - Marco Beccuti

, Giuliana Franceschinis, Daniele Codetta Raiteri
, Serge Haddad:
Parametric NdRFT for the derivation of optimal repair strategies. 399-408 - Giuliano Casale, Evgenia Smirni:

MAP-AMVA: Approximate mean value analysis of bursty systems. 409-418
Session PDS 8 - Networking and Security II
- Hemant Sengar:

Overloading vulnerability of VoIP networks. 419-428 - Jing Jin, Xinyuan Wang:

On the effectiveness of low latency anonymous network in the presence of timing attack. 429-438 - Saman A. Zonouz, Himanshu Khurana, William H. Sanders, Timothy M. Yardley:

RRE: A game-theoretic intrusion Response and Recovery Engine. 439-448
Session DCCS 9 - Hardware
- Peter Tummeltshammer, Andreas Steininger

:
Power supply induced common cause faults-experimental assessment of potential countermeasures. 449-457 - Nicholas Weaver, John H. Kelm, Matthew I. Frank:

Emµcode: Masking hard faults in complex functional units. 458-467 - Chengmo Yang, Alex Orailoglu:

Processor reliability enhancement through compiler-directed register file peak temperature reduction. 468-477 - Derek Graham, Per Strid, Scott Roy, Fernando Rodriguez:

A low-tech solution to avoid the severe impact of transient errors on the IP interconnect. 478-483
Session DCCS 10 - Storage
- Jon G. Elerath:

A simple equation for estimating reliability of an N+1 redundant array of independent disks (RAID). 484-493 - Christian Cachin, Idit Keidar, Alexander Shraer:

Fail-Aware Untrusted Storage. 494-503 - Jianqiang Luo, Lihao Xu, James S. Plank

:
An efficient XOR-scheduling algorithm for erasure codes encoding. 504-513 - Zhen Wang, Mark G. Karpovsky, Konrad J. Kulikowski:

Replacing linear Hamming codes by robust nonlinear codes results in a reliability improvement of memories. 514-523
Session DCCS 11 - Virtual Machines
- Ardalan Kangarlou, Patrick Eugster, Dongyan Xu:

VNsnap: Taking snapshots of virtual networked environments with minimal downtime. 524-533 - Maohua Lu, Tzi-cker Chiueh:

Fast memory state synchronization for virtualization-based fault tolerance. 534-543 - Nicolas Geoffray, Gaël Thomas, Gilles Muller, Pierre Parrend

, Stéphane Frénot, Bertil Folliot:
I-JVM: a Java Virtual Machine for component isolation in OSGi. 544-553
Session PDS 9 - Security Analysis Experiments
- Giovanna Dondossola

, Fabrizio Garrone, Judit Szanto, Geert Deconinck
, T. Loix, Hakem Beitollahi:
ICT resilience of power control systems: experimental results from the CRUTIAL testbeds. 554-559 - Robin Berthier, Jorge Arjona, Michel Cukier:

Analyzing the process of installing rogue software. 560-565 - Marco Vieira

, Nuno Antunes
, Henrique Madeira
:
Using web security scanners to detect vulnerabilities in web services. 566-571
Session PDS 10 - Experiments on Failure Prediction and Error Detection
- Ziming Zheng, Zhiling Lan, Byung-Hoon Park, Al Geist:

System log pre-processing to improve failure prediction. 572-577 - Nikhil Pandit, Zbigniew Kalbarczyk, Ravishankar K. Iyer:

Effectiveness of machine checks for error diagnostics. 578-583 - Galen Lyle, Shelley Cheny, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer:

An end-to-end approach for the automatic derivation of application-aware error detectors. 584-589
Special Tracks
- Miroslaw Malek, Felix Salfner, Kishor S. Trivedi:

Workshop on proactive failure avoidance, recovery and maintenance (PFARM). 590-591 - Karthik Pattabiraman, Zbigniew Kalbarczyk:

Second workshop on Compiler and Architectural Techniques for Application Reliability and Security (CATARS). 592-593 - Luigi Romano:

Fast Abstracts. 593 - Christof Fetzer, Rodrigo Rodrigues:

Fifth Workshop on Hot Topics in System Dependability (HotDep 2009). 594-595 - Jean Arlat, Cristian Constantinescu, Ravishankar K. Iyer, Johan Karlsson, Michael Nicolaidis:

Third workshop on dependable and secure nanocomputing. 596-597 - António Casimiro

, Rogério de Lemos
, Cristina Gacek:
Workshop on Architecting Dependable Systems (WADS 2009). 598-599 - Saurabh Bagchi, Miguel Correia

, Partha P. Pal
:
3rd Workshop on Recent Advances on Intrusion-Tolerant Systems WRAITS 2009. 600-601 - Marco Vieira:

Student Forum. 602

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














