Accepted Papers

Quick Links


  • Helmet: A Resistance Drift Resilient Architecture for Multi-level Cell Phase Change Memory System
      Wangyuan Zhang and Tao Li (University of Florida)
  • Cross-layer Resilience Using Wearout Aware Design Flow
    Bardia Zandian and Murali Annavaram (University of Southern California)
  • Transparent Dynamic Binding with Fault-Tolerant Cache Coherence Protocol for Chip Multiprocessors
    Shuchang Shan, Yu Hu and Xiaowei Li (Institute of Computing Technology, Chinese Academy of Sciences)
  • Fault Tolerant WSN-based Structural Health Monitoring
    Xuefeng Liu, (The Hong Kong Polytechnic University),  Jiannong Cao (The Hong Kong Polytechnic University),  Md. Zakirul Alam Bhuiyan (Department of Computing, Hong Kong Polytechnic University), Steven Lai (Department of Computing, Hong Kong Polytechnic University), Hejun Wu (Dept. of Computer Science, Sun Yat-sen University) and Guojun Wang (School of Information Science and Engineering, Central South)
  • Get Off My Prefix! The Need for Dynamic, Gerontocratic Policies in Inter-domain Routing
    Edmund Wong and Vitaly Shmatikov (The University of Texas at Austin)
  • Online Detection of Multi-Component Interactions in Production Systems
    Adam Oliner and Alex Aiken (Stanford University)
  • HDP Code: A Horizontal-Diagonal Parity Code to Optimize I/O Load Balancing in RAID-6
    Chentao Wu, Xubin He, Guanying Wu (Virginia Commonwealth University), Shenggang Wan, Xiaohua Liu, Qiang Cao and Changsheng Xie (Huazhong University of Science and Technology)
  • LLS: Cooperative Integration of Wear-Leveling and Salvaging for PCM Main Memory
    Lei Jiang, Yu Du, Bruce Childers, Jun Yang and Youtao Zhang (University of Pittsburgh)
  • Efficient Model Checking of Fault-Tolerant Distributed Protocols
    Peter Bokor, Johannes Kinder (TU Darmstadt), Marco Serafini (Yahoo Research), and Neeraj Suri (TU Darmstadt)
  • Uni-Directional Trusted Path: Transaction Confirmation on Just One Device
    Atanas Filyanov (Ruhr-University Bochum), Jonathan McCune (Carnegie-Mellon University), Ahmad-Reza Sadeghi (TU Darmstadt), and Marcel Winandy (Ruhr-University Bochum)
  • Zab: High-performance broadcast for primary-backup systems
    Flavio Junqueira, Benjamin Reed and Marco Serafini (Yahoo Research)
  • An Analysis of Signature Overlaps in Intrusion Detection Systems
    Frederic Massicotte (Communications Research Centre Canada) and Yvan Labiche (Carleton University, Ottawa, Canada)
  • An Empirical Study of the Performance, Security and Privacy Implications of Domain Name Prefetching
    Srinivas Krishnan and Fabian Monrose (UNC-Chapel Hill)
  • Unified Debugging of Distributed Systems with Recon
    Kyu Hyung Lee, Nick Sumner, Xiangyu Zhang and Patrick Eugster (Purdue University)
  • CEC: Continuous Eventual Checkpointing for Data Stream Processing Operators
    Zoe Sebepou and Kostas Magoutis (ICS-Forth)
  • Memory Allocations for Memory Safety and High Availability
    Marc Brunink, Martin Susskraut and Christof Fetzer (TU Dresden)
  • A Methodology for the Generation of Efficient Error Detection Mechanisms
    Matthew Leeke, Saima Arif, Arshad Jhumka and Sarabjot Singh Anand (University of Warwick)
  • Detecting Stealthy P2P Botnets Using Statistical Traffic Fingerprints
    Junjie Zhang (Georgia Tech), Roberto Perdisci (University of Georgia) , Wenke Lee, Unum Sarfraz (Georgia Tech),  and Xiapu Luo (Hong Kong Polytechnic University)
  • Improving Log-Based Field Failure Data Analysis of Multi Nodes Computing Systems
    Antonio Pecchia, Domenico Cotroneo (Federico II University of Naples), Zbigniew Kalbarczyk and Ravishankar K. Iyer (University of Illinois at Urbana-Champaign)
  • Deadline-Aware Scheduling for Software Transactional Memory
    Walther Maldonado, Patrick Marlier, (Pascal Felber University of Neuchatel), Julia Lawall (DIKU), Gilles Muller (INRIA/LIP6) and Etienne Riviere (University of Neuchatel)
  • Applying Game Theory to Analyze Attacks and Defenses in Virtual Coordinate Systems
    Sheila Becker (University of Luxembourg), Jeff Seibert, David Zage, Cristina Nita-Rotaru (Purdue University) and Radu State (University of Luxembourg)
  •  Communix: A Collaborative Deadlock Immunity Framework
    Horatiu Jula, Pinar Tozun and George Candea (EPFL)  (Tool Description/Demo)
  • CloudVal: A Framework for Validation of Virtualization Environment in Cloud Infrastructure
    Cuong Pham, Daniel Chen, Zbigniew Kalbarczyk, Ravishankar Iyer (University of Illinois at Urbana-Champaign), Soumitra Sarkar and Rafah Hosn (BM T. J. Watson Research Center) (Practical Experience Report)
  • Coercing Clients into Facilitating Failover for Object Delivery
    Wyatt Lloyd and Michael J. Freedman (Princeton University)
  • Phase-based Reboot: Reusing Operating System Execution Phases for Cheap Reboot-based Recovery
    Kazuya Yamakita, Hiroshi Yamada and Kenji Kono (Keio University)
  •  A Combinatorial Approach to Detecting Buffer Overflow Vulnerabilities
    Wenhua Wang, Yu Lei, Dongang Liu, David Kung, Christoph Csallner, Dazhi Zhang (University of Texas at Arlington), Raghu Kacker and Rick Kuhn (National Institute of Technology and Standards)


  • Crash Graphs: An Aggregated View of Multiple Crashes to Improve Crash Triage
    Sunhun Kim (HKUST),Thomas Zimmermann (Microsoft Research) and Nachiappan Nagappan (Microsoft Research)
  • Modeling Stream Processing Applications for Dependability Evaluation
    Gabriela Jacques-Silva (UIUC),Zbigniew Kalbarczyk (UIUC),Bugra Gedik (IBM Research),Henrique Andrade (IBM Research),Kun-Lung Wu (IBM Research) and Ravishankar K. Iyer (UIUC)
  • Amplifying Limited Expert Input to Sanitize Large Network Traces
    Xin Huang (UNC),Fabian Monrose (UNC) and Michael Reiter (UNC)
  • A Scalable Availability Model of Infrastructure-as-a-Service Cloud
    Francesco Longo (U degli Studi di Messina),Rahul Ghosh (Duke U),Vijay K. Naik (IBM T. J. Watson Research) and Kishor S. Trivedi (Duke U)
  • Modeling Time Correlation in Passive Network Loss Tomography
    Jin Cao (Bell Labs),Aiyou Chen (Google Inc) and Patrick P. C. Lee (CUHK)
  • Simple bounds for a transient queue
    Takayuki Osogami (IBM Research) and Rudy Raymond (IBM Research)
  • Approximate Analysis of Blocking Queueing Networks with Temporal Dependence
    Vittoria De Nitto Persone (U of Rome Tor Vergata),Giuliano Casale (Imperial College) and Evgenia Smirni (WM)
  • Fault injection-based assessment of aspect-oriented implementation of fault tolerance
    Ruben Alexandersson (Chalmers U of Tech) and Johan Karlsson (Chalmers U of Tech)
  • Modeling and Evaluating Targeted Attacks in Large Scale Dynamic Systems
    Emmanuelle Anceaume (CNRS/IRISA),Bruno Sericola  (INRIA),Romaric Ludinard (Supelec) and Frederic Tronel (Supelec)
  • WaRR: High Fidelity Web Application Recording and Replaying
    Silviu Andrica (EPFL) and George Candea (EPFL)
  • Hypervisor-Assisted Application Checkpointing in Virtualized Environments
    Min Lee (Getech),A. S. Krishnakumar (Avaya Labs),P. Krishnan (Avaya Labs),Navjot Singh (Avaya Labs) and Shalini Yajnik (Avaya Labs)
  • OS Diversity for Intrusion Tolerance: Myth or Reality?
    Miguel Garcia (U of Lisbon),Alysson Bessani (U of Lisbon),Ilir Gashi (City U of London),Nuno Neves (U of Lisbon),Rafael Obelheiro (State U of Santa Catarina)
  • High Performance State-Machine Replication
    Parisa Marandi (U of Lugano),Marco Primi (U of Lugano) and Fernando Pedone (U of Lugano)
  • Resource and Virtualization Costs up in the Cloud: Models and Design Choices
    Daniel Gmach (HP Labs),Jerry Rolia (HP Labs) and Ludmila Cherkasova (HP Labs)
  • Aaron: An Adaptable Execution Environment
    Marc Brünink (TU Dresden),Andre Schmitt (TU Dresden),Thomas Knauth (TU Dresden),Martin Sü?kraut (TU Dresden),Ute Schiffel  (TU Dresden),Stephan Creutz (TU Dresden) and Christof Fetzer (TU Dresden)
  • Incremental Quantitative Verification for Markov Decision Processes
    Marta Kwiatkowska (Oxford),David Parker (Oxford) and Hongyang Qu (Oxford)
  • A Framework For Early Stage Quality-Fault Tolerance Analysis Of Embedded Control Systems
    Satya Gautam Vadlamudi (IIT Kharagpur),Dipankar Das (GM India Science Lab),Partha Pratim Chakrabarti (IIT Kharagpur) and Purnendu Sinha (GM India Science Lab)
  • Merging Ultra-low Duty Cycle Networks
    Matthew Dobson (Vrije U),Spyros Voulgaris (Vrije U) and Maarten van Steen (Vrije U)
  • Coerced Cache Eviction and Discreet-Mode Journaling: Dealing with Misbehaving Disks
    Abhishek Rajimwale (Data Domain, Inc),Vijay Chidambaram (UWI),Deepak Ramamurthi (UWI),Andrea Arpaci-Dusseau (UWI) and Remzi Arpaci-Dusseau (UWI)
  • Analysis of Security Data from a Large Computing Organization
    Aashish Sharma (UIUC),Zbigniew Kalbarczyk (UIUC),Jim Barlow (UIUC) and Ravi Iyer (UIUC)
  • Impact of Temperature on Hard Disk Drive Reliability in Large Datacenters
    Sriram Sankar (Microsoft),Mark Shaw (Microsoft) and Kushagra Vaid (Microsoft)
  • Characterization of Logical Masking and Error Propagation in Combinational Circuits and Effects on System Vulnerability
    Nishant George (U of Virginia) and John Lach (U of Virginia)
  • Toward Dependability Benchmarking of Partitioning Operating Systems
    Raul Barbosa (U of Coimbra),Johan Karlsson (Chalmers U of Tech),Qiu Yu (Chalmers U of Tech) and Xiaozhen Mao (Chalmers U of Tech)
  • Modeling and Analysis of the Impact of Failures in Electric Power Systems Organized in Interconnected Regions
    Silvano Chiaradonna (ISTI-CNR),Felicita Di Giandomenico (ISTI-CNR) and Nicola Nostro (ISTI-CNR)
  • How Secure are Networked Office Devices?
    Edward Condon (U of Maryland),Zaina Afoulki (Ecole Nationale Superieure d'Ingenieurs de Bourges),Emily Cummins (RIT) and Michel Cukier (U of Maryland)
  • A Combinatorial Approach to Network Covert Communications with Applications in Web Leaks
    Xiapu Luo (HKPolyU),Peng Zhou (HKPolyU),Edmond W. W. Chan (HKPolyU),Rocky K. C. Chang (HKPolyU) and Wenke Lee (Gatech)


  • A Cloud-based Intrusion Detection and Response System for Mobile Phones
    Amir Houmansadr, Saman A. Zonouz and Robin Berthier
  • Anomaly-based Intrusion Detection in Software as a Service
    Gustavo Nascimento and Miguel Correia
  • Combining Intrusion Detection and Recovery for Enhancing System Dependability
    Ajay Nagarajan, Quyen Nguyen, Robert Banks and Arun Sood
  • Continuous Mission-Oriented Assessment (CMA) of Assurance
    Patrick Hurley, Partha Pal, Mathew Tan Creti and Amy Fedyk
  • From Byzantine Fault Tolerance to Intrusion Tolerance (a Position Paper)
    Alysson Bessani
  • Managing Business Health in the Presence of Malicious Attacks
    Saman A. Zonouz, Aashish Sharma, HariGovind V. Ramasamy, Zbigniew T. Kalbarczyk, Birgit Pfitzmann, Kevin McAuliffe, Ravishankar K. Iyer, William H. Sanders and Eric Cope
  • The Time-Free Approach to Byzantine Failure Detection in Dynamic Networks
    Murilo Santos de Lima, Fabíola Greve, Luciana Arantes and Pierre Sens
  • Level of Confidence Evaluation and Its Usage for Roll-back Recovery with Checkpointing Optimization
    Dimitar Nikolov(1), Urban Ingelsson(1), Virendra Singh(2), Erik Larsson(1); (1) Linköping University, Sweden; (2) Indian Institute of Science, Bangalore, India
  • Study of the Effects of SET Induced Faults on Submicron Technologies
    Alireza Rohani, Hans G. Kerkhoff; University of Twente, Enschede, The Netherlands
  • Investigating the Impact of Process Variations on an Asynchronous Time-Triggered-Protocol Controller
    Markus Ferringer; Vienna University of Technology, Austria
  • Comparing the Effects of Intermittent and Transient Hardware Faults on Programs
    Jiesheng Wei, Layali Rashid, Karthik Pattabiraman, Sathish Gopalakrishnan; The University of British Columbia, Vancouver, Canada
  • A Digitalized Management Mechanism for Low-cost Low-Power Multiple-Voltage 3D Designs
    Ming-Hsuan Wu, Pin-Jui Lai, Chia-Hao Ku, Ching-Hwa Cheng(2); (1) Feng Chia University, Taichung Taiwan; (2) National Chung-Cheng University, Chiayi; Taiwan
  • An Efficient and Reliable 1.5-way Processor by Fusion of Space and Time Redundancies
    Jun Yao, Ryoji Watanabe, Kazuhiro Yoshimura, Takashi Nakada, Hajime Shimada, Yasuhiko Nakashima ; Nara Institute of Science and Technology, Japan
  • A Non-Volatile Microcontroller with Integrated Floating-Gate Transistors
    Wing-Kei Yu, Shantanu Rajwade, Sung-En Wang, Bob Lian, G. Edward Suh, Edwin Kan; Cornell University, Ithaca, NY, USA
  • Built-In Fine Resolution Clipping with Calibration Technique for High-Speed Testing by Using Wireless Testers
    Chen-I Chung, Ching-Hwa Cheng, Feng-Chia University, Taichung, Taiwan
  • Genetic Algorithm Based Approach for Segmented Testing
    Xiaoxin Fan(1), Sudhakar M. Reddy(1), Senling Wang(2), Seiji Kajihara(2), Yasuo Sato(2); (1) University of Iowa, Iowa City, USA; (2) Kyushu Institute of Technology, Fukuoka, Japan
  • Model-Based Fault Injection for Failure Effect Analysis – Evaluation of Dependable SRAM for Vehicle Control Units
    Yohei Nakata(1), Yasuhiro Ito(2), Yasuo Sugure(2), Shigeru Oho(2), Yusuke Takeuchi(1), Shunsuke Okumura(1), Hiroshi Kawaguchi(1), Masahiko Yoshimoto(1,3); (1) Kobe University; (2) Hitachi, Ltd., Kokubunji; (3) Japan Science and Technology Agency (JST), CREST, Saitama; Japan
  • A Virtual Resource Placement Service
    Rick Harper, Lorrie Tomek, Ofer Biran and Erez Hadad 
  • An epidemic approach to dependable key-value substrates
    Miguel Matos, Ricardo Vilaca, José Pereira and Rui Oliveira 
  • CAWRM:A Remote Mirroring System Based on AoDI Volume
    Zhenhai Zhao, Tingting Qin, Fangliang Xu, Rui Cao, Xiaoguang Liu and Gang Wang 
  • Designing SCIT Architecture Pattern in a Cloud-based Environment
    Quyen Nguyen and Arun Sood 
  • Enhancing Application Robustness in Infrastructure-as-a-Service Clouds
    Madalin Mihailescu, Andres Rodriguez and Cristiana Amza 
  • Identify Faults in Large-Scale Distributed Systems by Filtering Trash Error Logs
    Xiang Rao, Huaimin Wang, Hua Cai, Qi Zhou, Tingtao Sun, Dianxi Shi and Zhenbang Chen 
  • Lucy in the Sky without Diamonds: Stealing Confidential Data in the Cloud
    Francisco Rocha and Miguel Correia 
  • Online Detection of Performance Problems in Large-Scale Cloud Computing Systems
    haibo mi 
  • Power-Performance Trade-offs in IaaS Cloud: A Scalable Analytic Approach
    Rahul Ghosh, Vijay Naik and Kishor Trivedi 
  • Recursive Virtual Machines for Advanced Security Mechanisms
    Bernhard Kauer, Paulo Verissimo and
    Alysson Bessani 
  • The Case for Dynamic Security Solutions in Public Cloud Workflow Deployments
    John Charles Mace, Aad van Moorsel and Paul Watson
  • Integrated End-to-End Dependability in the Loris Storage Stack
    David C. van Moolenbroek, Raja Appuswamy, and Andrew S. Tanenbaum (Vrije Universiteit, Amsterdam)
  • Scalable Byzantine Fault-Tolerant Storage
    Ricardo Padilha and Fernando Pedone (University of Lugano)
  • Lock-free Transactional Support for Large-scale Storage Systems
    Maysam Yabandeh, Flavio Junqueira, and Benjamin Reed (Yahoo! Research)
  • TO BEnchmark or NOT TO BEnchmark Security: That is the question
    Afonso Araújo Neto and Marco Vieira (University of Coimbra)
  • Automated Vulnerability Discovery in Distributed Systems
    Radu Banabic, George Candea, and Rachid Guerraoui (EPFL)
  • Limiting Cached-based Side-Channel in Multi-tenant Cloud using Dynamic Page Coloring
    Jichen Shi, Xiang Song, Haibo Chen, and Binyu Zang (Fudan University)
  • Exterminating Bugs via Collective Information Recycling
    George Candea (EPFL)
  • Platform-wide Deadlock Immunity for Mobile Phones
    Horatiu Jula, Thomas Rensch, and George Candea (EPFL)
  • Enabling Sophisticated Analysis of x86 Binaries with RevGen
    Vitaly Chipounov and George Candea (EPFL)
  • Secure MMU: Architectural Support for Memory Isolation among Virtual Machines
    Seongwook Jin and Jaehyuk Huh (KAIST)
  • Transactional Memory for Dependable Embedded Systems
    Christof Fetzer, TU Dresden, and Pascal Felber (University of Neuchatel)
  • Composite Dependability Modeling for In-vehicle Networks
    Hiroyuki Okamura, Tadashi Dohi, Shin'ichi Shiraishi and Mutsumi Abe
  • Enforcing Dependable Operations by Model Checking a Virtualization Layer
    Shuichi Oikawa
  • Fault Model of Foreign Function Interface across Different Domains
    Shinpei Nakata, Midori Sugaya and Kimio Kuramitsu
  • On Finding Vestiges of Internet Backbone Failures for Optimizing Wide Area Data Replication
    Hirotake Abe, Hirotaka Moriya and Kyoji Umemura
  • Performance Modeling and Benchmarking of Bank Intermediary Business on High-Performance Fault-Tolerant Computers
    Bo Li, Haiying Zhou, Decheng Zuo, Zhan Zhang, Peng Zhou and Long Jia
  • Practical Online Failure Prediction for Blue Gene/P: Period-based vs Event-driven
    Li Yu, Ziming Zheng, Zhiling Lan and Susan Coghlan
  • Detecting Resource Leaks through Dynamical Mining of Resource Usage Patterns
    Huxing Zhang, Gang Wu, Kingsum Chow, Zhidong Yu and Xuezhi Xing
  • DynaPlan: Resource Placement for Application-Level Clustering
    Rick Harper, Kyung Ryu, David Frank, Lisa Spainhower, Ravi Shankar and Tom Weaver
  • Adaptive Collaborative Sensing using Mobile Phones and Stationary Sensors
    Edith C.-H. Ngai (Uppsala University, Sweden)
  • Enabling On-Line Dependability Assessment of Android Smart Phones
    Marcello Cinque (Federico II University of Naples, Italy)
  • A Novel Design of Node-disjoint Multi-path QoS Routing in Multi-hop Ad Hoc Networks
    Szu-Lin Su, Yi-Wen Su (National Cheng Kung University, Taiwan)
  • Privacy Leakage in Two-Party Group Nearest Neighbor Queries
    Yan Huang, Cai Chen (University of North Texas, USA)

Poster Papers

  • 1. A systematic approach for verification of software safety in the automotive domain
    Hossam Yahia and Stéphane L'Hostis (VIAS, Valeo-GEEDS)
  • 2. Assessing Sustainability Impact of Performance and Dependability Requirements of Systems
    Jogesh Muppala (HKUST)
  • 3. Performance Analysis for a Fault-Tolerant Ethernet Implementation based on Heartbeat Mechanism
    Hoang-Anh Pham, Jong Myung Rhee, Yeonseung Ryu and Dong-Ho Lee (Myongji University, Rep. of Korea)
  • 4. A Study on Modified Historical Value-Based Approach for Test Case Prioritization during Software Development
    Wei-Nan Liu, Chin-Yu Huang and Chuan-Ching Sue (National Tsing Hua University)
  • 5. Early Experience of Building a Security Service for the Virtual Computing Environments
    Jianxin Li, Bo Li and Lei Cui (Beihang University)
  • 6. Design and Implementation of MMU-less Incremental Checkpoint Schemes in Wireless Sensor Networks
    Hsung-Pin Chang and Tsung-Yu Yeh (National Chung Hsing University)
  • 7. A Framework for the Automated Generation of Performability Models for the Assessment of Wireless Sensor Networks
    Marcello Cinque, Domenico Cotroneo and Catello Di Martino (University of Naples Federico II)
  • 8. High-Speed Testing Techniques for Content Addressable Memories
    Lu Shyue-Kung (National Taiwan University of Science and Technology)
  • 9. Dependability Enhancement of Reactor Containment in Safety Critical Nuclear Power Plants
    Chi-Shaing Cho (National Taiwan University), Wei-Ho Chung (Research Center for Information Technology), Deyun Gao(Beijing Jiaotong University), Hongke Zhang (Beijing Jiaotong University) and Sy-Yen Kuo (National Taiwan University)
  • 10. RPIM: An Inter-Domain Routing Policy Inference Model in ISP Networks
    Wei Liang, Jingping Bi, Zhongcheng Li (Chinese Academy of Sciences) and Yiting Xia (Beijing University of Posts and Telecommunications)
  • 11. Building Biologically Inspired Defenses Against Malicious Software
    Fyodor Yarochkin, Shih-Yao Dai, Sy-Yen Kuo (National Taiwan University) and Yennun Huang (Academia Sineca)
  • 12. Efficient Built-In Self-Repair Techniques for Yield Enhancement of 3D Random Access Memories
    Shyue-Kung Lu (National Taiwan University of Science and Technology)
  • 13. Inter-Rater Reliability of Functional Safety Assessments
    Torbjørn Skramstad, Erik Stensrud and Stefan Elgåfoss (Det Norske Veritas)
  • 14. HotSnap: A Hot Distributed Snapshot System For Virtual Machine Networks
    Bo Li (Beihang University)
  • 15. An Energy-Efficient Cache Design Based on Basic Blocks in Embedded Systems
    Ching-Wen CHEN, Chang-Jung KU and Chuan-Chi WENG (Feng Chia University)
  • 16. An Adaptable Path Maintenance Mechanism Using Neighbor Relay Model
    Ching-Wen Chen, Chuan-Chi Weng and Chang-Jung Ku (Feng Chia University)
  • 17. SIListra Compiler: Building Reliable Systems with Unreliable Hardware
    Martin Süßkraut, Andre Schmitt (TU Dresden), Ute Schiffel (Reykjavik University), Marc Brünink and Christof Fetzer (TU Dresden)
  • 18. Tracing anomalies in computer systems
    Janusz Sosnowski (Warsaw Univesity of Technology)
  • 19. Diverse OS Rejuvenation for Intrusion Tolerance
    Miguel Garcia, Alysson Bessani and Nuno Neves (University of Lisbon)
  • 20. Enhance Data Diagnosis and Prognosis Capabilities in OVIS
    Li Yu, Zhiling Lan (IIT) and James Brandt (Sandia National Laboratories)
  • 21. Log Analysis for Reliability Management in HPC Systems
    Ziming Zheng and Zhiling Lan (Illinois Institute of Technology)
  • 22. Speculative Non-Stop: A Novel Symptom-based Fault Detection Architecture for Chip Multiprocessors
    Jianbo Dong, Lei Zhang, Yinhe Han and Xiaowei Li (Chinese Academy of Science)
  • 23. Built-In Fine Resolution Clipping with Calibration Technique for High-Speed Testing by Using Wireless Testers
    ching-hwa cheng (Feng-Chia University)
  • 24. A Built-in Voltage Meter for Real Time Debugging Power-Induced Failures in Multiple Voltage Low Power Designs
    ching-hwa cheng (Feng-Chia University)

Student Forum Papers

  • A Fine-Grained Defense Mechanism Against General Request Forgery Attacks
    Ben Siu-Yuen Fung, The Chinese University of Hong Kong, China
  • Distributed Security Event Analysis in Cloud
    Fyodor Yarochkin, National Taiwan University, Taiwan
  • Exploiting Overlays for Practical and Profitable Traffic Attraction
    Jeff Seibert, Purdue University, USA
  • Practical Unified Authentication for 3G-WLAN Interworking
    Yueming Deng, The Hong Kong Polytechnic University, China
  • Dynamic Reconfigurable Distributed Storage system
    Zhongqiang Cu, Harbin Institute of Technology, China
  • Generation of Program Invariants using Abstract Interpretation Framework
    Anirban Roy Choudhury, Homi Bhabha National Institute  Mumbai, India
  • Dependability of Dynamic Binding in Service-Oriented Computing
    Anthony Sargeant, University of Leeds, UK
  • Harbinger: Understanding Complex API Usage in Systems Software
    Qirun Zhang, The Chinese University of Hong Kong, China
  • Characterization of Workload Behavior Influence on System Reliability
    Xin Qi, Harbin Institute of Technology, China
  • Error-recovery Memory Controller for a Highly Dependable System
    Jinpyo Noh, Inha University, South Korea

Fast Abstracts

  • Improving server dependability through proactive problem diagnosis and correction using tweets
    Rajarshi Das, and Saravanan Devendra, (IBM India)
  • General Anomaly Detection Framework for Internet of Things
    Zibin Zheng(The Chinese University of Hong Kong), Jian Wang, and Ziyu Zhu(IBM China Research Lab)
  • Assessing the Accuracy of Error Reporting on Virtualized Embedded Platforms
    Varun Sethi(Freescale Semiconductor), and Karthik Pattabiraman(University of British Columbia)
  • Novel simulated fault injection technique
    J.W. Na and D.W. Lee(Korea Aerospace University)
  • Detecting Non-Robust Behavior: a Bioinformatics Approach
    Gizelle Sandrini Lemos, and Eliane Martins (University of Campinas)
  • MABCC: Multi-Armed Bandit Congestion Control in Multi-hop Infrastructure Wireless Mesh Networks
    B. M. Alim Al Islam, S. M. Iftekharul Alam, Vijay Raghunathan, and Saurabh Bagchi (Purdue University)
  • Elastic CGRA: Circumventing Hard-faults Through Instruction Migration
    Ying Wang, Lei Zhang, Yinhe Han, Huawei Li, and Xiaowei Li(Chinese Academy of Sciences)
  • Eternal Youth for the Data Center through Software Rejuvenation: Promise or Paradox?
    Parmjeet Singh, Noopur Singh, Jung Yang, Saurabh Bagchi (Purdue University)
  • Predicting Time to Failure for Large Scale Distributed Systems
    Nawanol Theera-Ampornpunt, Bowen Zhou, and Saurabh Bagchi (Purdue University)
DSN 2011