Final Program — Thursday

Final program for Monday, 24th June.
Final program for Tuesday, 25th June.
Final program for Wednesday, 26th June.
Final program for Thursday, 27th June.

Thursday, 27 June

Time Dependable Computing and Communications Symposium Performance and Dependability Symposium Fast Abstracts
Plenary Session
8:30-9:45 Keynote Address 3.
László Lovász: Large Networks and Their Mathematical Theory
(Chair: András Pataricza)
9:45-10:15 Break
DCCS: Keeping Safe in a Connected World
(Chair: Cristina Nita-Rotaru)
PDS: Storage Systems
(Chair: Peter Kemper)
Fast Abstracts 1.
(Chair: Elias Duarte)
10:15-11:45 Detecting Malicious Landing Pages in Malware Distribution Networks
G. Wang, J. Stokes, C. Herley, D. Felstead
Improving SSD Reliability with RAID via Elastic Striping and Anywhere Parity
J. Kim, J. Choi, D. Lee, S. H. Noh
A Review of Cloud Deployment Models For E-Learning Systems
E. Leloglu, T. Ayav, B. G. Aslan
A View on the Past and Future of Fault Injection
N. Silva, R. Barbosa, J. C. Cunha, M. Vieira
Redefining Web Browser Principals with a Configurable Origin Policy
Y. Cao, V. Rastogi, Z. Li, Y. Chen, A. Moshchuk
Geo-Replicated Storage with Scalable Deferred Update Replication
D. Sciascia, F. Pedone
An Adaptive Approach to Dependable Circuits for a Digital Power Control
A Saysanasongkham, K. Imai, M. Aarai, S. Fukumoto, K. Wada
Modeling and Analysing Operation Processes for Dependability
X. Xu, L. Zhu, J. Li, L. Bass, Q. Lu, M. Fu
Practical Automated Vulnerability Monitoring Using Program State Invariants
C. Giuffrida, L. Cavallaro, A. S. Tanenbaum
Consistency or Latency? A Quantitative Analysis of Replication Systems Based on Replicated State Machines
X. Wang, H. Sun, T. Deng
Design of Event-Based Intrusion Detection System on OpenFlow Network
Y.-Li Hu, W.-B. Su, L.-Y. Wu, Y. Huang, S.-Y. Kuo
Evaluating Xilinx SEU Controller Macro for Fault Injection
J. L. Nunes, J. C. Cunha, R. Barbosa, M. Zenha-Rela
11:45-12:45 Lunch
Student Papers: Software & Network Dependability
(Chair: Takashi Nanya)
PDS: Network security
(Chair: Ilier Gashi)
Fast Abstracts 2.
(Chair: Dong Seong Kim)
12:45-14:15 A Framework for Runtime V&V in Business-Critical Service Oriented Architectures
C. Areias
Uniform Node Sampling Service Robust Against Collusions of Malicious Nodes
E. Anceaume, Y. Busnel, B. Sericola
Complementing Static and Dynamic Analysis Approaches For Better Network Defense
H. Pareek
Network Traffic Anomaly Detection based on Growing Hierarchical SOM
S.-Y. Huang, Y.-N. Huang
Barley: Modelling Program Behavior with Resource Usage
K. Leach
Implementing the ADVISE Security Modeling Formalism in MOBIUS
M. Ford, K. Keefe, E. LeMay, W. Sanders, C. Muehrcke
Performability analysis of RAID10 versus RAID6
F. Machida, J. Xiang, K. Tadano, Y. Maeno, T. Horikawa
Fault-Tolerant Broadcast Algorithms for the Virtual Hypercube Topology
L. A. Rodrigues
Crossing the Threshold: Detecting Network Malfeasance via Sequential Hypothesis Testing
S. Krishnan, T. Taylor, F. Monrose, J. McHugh
The Architecture of a Resilience Infrastructure for Computing and Communication Systems
A. Avizienis
Towards Secure Monitoring and Control Systems: Diversify!
D. Cotroneo, A. Pecchia, S. Russo
14:15-14:30 Break
Student Papers: Hardware Dependability
(Chair: Yair Amir)
PDS: Internet Security
(Chair: Robin Berthier)
14:30-15:30 Improving the Dependability of FPGA-based real-time embedded systems with Partial Dynamic Reconfiguration
J. L. Nunes
Locality Matters: Reducing Internet Traffic Graphs Using Location Analysis
A. Berger, S. Rührup, W. Gansterer, O. Jung
Detecting and Tolerating Data Corruptions Due to Device Driver Defects
F. Fucci
Evasive Bots Masquerading as Human Beings on the Web
J. Jin, J. Offutt, N. Zheng, F. Mao, A. Koehl, H. Wang
IOCheck: A Framework to Enhance the Security of I/O Devices at Runtime
F. Zhang
Technical Committee Meeting
15:30-16:30 (open to all)

Final program for Monday, 24th June.
Final program for Tuesday, 25th June.
Final program for Wednesday, 26th June.
Final program for Thursday, 27th June.