Preliminary program for Monday, 24th June.
Preliminary program for Tuesday, 25th June.
Preliminary program for Wednesday, 26th June.
Thursday, 27 June
Time | Dependable Computing and Communications Symposium | Performance and Dependability Symposium | Fast Abstracts |
---|---|---|---|
Plenary Session | |||
8:30 - 10:00 | Keynote Address 3. László Lovász: Large Networks and Their Mathematical Theory |
||
10:00-10:30 | Break | ||
DCCS: Keeping Safe in a Connected World | PDS: Storage Systems | Fast Abstracts 1. | |
10:30 -12:00 | Detecting Malicious Landing Pages in Malware Distribution Networks G. Wang, J. Stokes, C. Herley, D. Felstead |
Improving SSD Reliability with RAID via Elastic Striping and Anywhere Parity J. Kim, J. Choi, D. Lee, S. H. Noh |
A Review of Cloud Deployment Models For E-Learning Systems E. Leloglu, T. Ayav, B. G. Aslan |
A View on the Past and Future of Fault Injection N. Silva, R. Barbosa, J. C. Cunha, M. Vieira |
|||
Redefining Web Browser Principals with a Configurable Origin Policy Y. Cao, V. Rastogi, Z. Li, Y. Chen, A. Moshchuk |
Geo-Replicated Storage with Scalable Deferred Update Replication D. Sciascia, F. Pedone |
An Adaptive Approach to Dependable Circuits for a Digital Power Control A Saysanasongkham, K. Imai, M. Aarai, S. Fukumoto, K. Wada |
|
Complementing Static and Dynamic Analysis Approaches For Better Network Defense H. Pareek |
|||
Practical Automated Vulnerability Monitoring Using Program State Invariants C. Giuffrida, L. Cavallaro, A. S. Tanenbaum |
Consistency or Latency? A Quantitative Analysis of Replication Systems Based on Replicated State Machines X. Wang, H. Sun, T. Deng |
Design of Event-Based Intrusion Detection System on OpenFlow Network Y.-Li Hu, W.-B. Su, L.-Y. Wu, Y. Huang, S.-Y. Kuo |
|
Dynamic reconfiguration of IO adapters for real-time outage prevention R. Das, V. Mansur, O. Cardona, N. Hegde |
|||
12:00-13:00 | Lunch | ||
Student Papers: Software & Network Dependability | PDS: Network security | Fast Abstracts 2. | |
13:00 -14:30 | A Framework for Runtime V&V in Business-Critical Service Oriented Architectures C. Areias |
Implementing the ADVISE Security Modeling Formalism in MOBIUS M. Ford, K. Keefe, E. LeMay, W. Sanders, C. Muehrcke |
Evaluating Xilinx SEU Controller Macro for Fault Injection J. L. Nunes, J. C. Cunha, R. Barbosa, M. Zenha-Rela |
Modeling and Analysing Operation Processes for Dependability X. Xu, L. Zhu, J. Li, L. Bass, Q. Lu, M. Fu |
|||
Barley: Modelling Program Behavior with Resource Usage K. Leach |
Uniform Node Sampling Service Robust Against Collusions of Malicious Nodes E. Anceaume, Y. Busnel, B. Sericola |
Network Traffic Anomaly Detection based on Growing Hierarchical SOM S.-Y. Huang, Y.-N. Huang |
|
Performability analysis of RAID10 versus RAID6 F. Machida, J. Xiang, K. Tadano, Y. Maeno, T. Horikawa |
|||
Fault-Tolerant Broadcast Algorithms for the Virtual Hypercube Topology L. A. Rodrigues |
Crossing the Threshold: Detecting Network Malfeasance via Sequential Hypothesis Testing S. Krishnan, T. Taylor, F. Monrose, J. McHugh |
The Architecture of a Resilience Infrastructure for Computing and Communication Systems A. Avizienis |
|
Towards Secure Monitoring and Control Systems: Diversify! D. Cotroneo, A. Pecchia, S. Russo |
|||
14:30-14:45 | Break | ||
Student Papers: Hardware Dependability | PDS: Internet Security | ||
14:45 -15:45 | Improving the Dependability of FPGA-based real-time embedded systems with Partial Dynamic Reconfiguration J. L. Nunes |
Locality Matters: Reducing Internet Traffic Graphs Using Location Analysis A. Berger, S. Rührup, W. Gansterer, O. Jung |
|
Detecting and Tolerating Data Corruptions Due to Device Driver Defects F. Fucci |
Evasive Bots Masquerading as Human Beings on the Web J. Jin, J. Offutt, N. Zheng, F. Mao, A. Koehl, H. Wang |
||
IOCheck: A Framework to Enhance the Security of I/O Devices at Runtime F. Zhang |
|||
Technical Committee Meeting | |||
16:30 - 17:30 | (open to all) |