Preliminary Program — Thursday

Preliminary program for Monday, 24th June.
Preliminary program for Tuesday, 25th June.
Preliminary program for Wednesday, 26th June.

Thursday, 27 June

Time Dependable Computing and Communications Symposium Performance and Dependability Symposium Fast Abstracts
Plenary Session
 8:30 - 10:00 Keynote Address 3.
László Lovász: Large Networks and Their Mathematical Theory
10:00-10:30 Break
DCCS: Keeping Safe in a Connected World PDS: Storage Systems Fast Abstracts 1.
10:30 -12:00 Detecting Malicious Landing Pages in Malware Distribution Networks
G. Wang, J. Stokes, C. Herley, D. Felstead
Improving SSD Reliability with RAID via Elastic Striping and Anywhere Parity
J. Kim, J. Choi, D. Lee, S. H. Noh
A Review of Cloud Deployment Models For E-Learning Systems
E. Leloglu, T. Ayav, B. G. Aslan
A View on the Past and Future of Fault Injection
N. Silva, R. Barbosa, J. C. Cunha, M. Vieira
Redefining Web Browser Principals with a Configurable Origin Policy
Y. Cao, V. Rastogi, Z. Li, Y. Chen, A. Moshchuk
Geo-Replicated Storage with Scalable Deferred Update Replication
D. Sciascia, F. Pedone
An Adaptive Approach to Dependable Circuits for a Digital Power Control
A Saysanasongkham, K. Imai, M. Aarai, S. Fukumoto, K. Wada
Complementing Static and Dynamic Analysis Approaches For Better Network Defense
H. Pareek
Practical Automated Vulnerability Monitoring Using Program State Invariants
C. Giuffrida, L. Cavallaro, A. S. Tanenbaum
Consistency or Latency? A Quantitative Analysis of Replication Systems Based on Replicated State Machines
X. Wang, H. Sun, T. Deng
Design of Event-Based Intrusion Detection System on OpenFlow Network
Y.-Li Hu, W.-B. Su, L.-Y. Wu, Y. Huang, S.-Y. Kuo
Dynamic reconfiguration of IO adapters for real-time outage prevention
R. Das, V. Mansur, O. Cardona, N. Hegde
12:00-13:00 Lunch
Student Papers: Software & Network Dependability PDS: Network security Fast Abstracts 2.
13:00 -14:30 A Framework for Runtime V&V in Business-Critical Service Oriented Architectures
C. Areias
Implementing the ADVISE Security Modeling Formalism in MOBIUS
M. Ford, K. Keefe, E. LeMay, W. Sanders, C. Muehrcke
Evaluating Xilinx SEU Controller Macro for Fault Injection
J. L. Nunes, J. C. Cunha, R. Barbosa, M. Zenha-Rela
Modeling and Analysing Operation Processes for Dependability
X. Xu, L. Zhu, J. Li, L. Bass, Q. Lu, M. Fu
Barley: Modelling Program Behavior with Resource Usage
K. Leach
Uniform Node Sampling Service Robust Against Collusions of Malicious Nodes
E. Anceaume, Y. Busnel, B. Sericola
Network Traffic Anomaly Detection based on Growing Hierarchical SOM
S.-Y. Huang, Y.-N. Huang
Performability analysis of RAID10 versus RAID6
F. Machida, J. Xiang, K. Tadano, Y. Maeno, T. Horikawa
Fault-Tolerant Broadcast Algorithms for the Virtual Hypercube Topology
L. A. Rodrigues
Crossing the Threshold: Detecting Network Malfeasance via Sequential Hypothesis Testing
S. Krishnan, T. Taylor, F. Monrose, J. McHugh
The Architecture of a Resilience Infrastructure for Computing and Communication Systems
A. Avizienis
Towards Secure Monitoring and Control Systems: Diversify!
D. Cotroneo, A. Pecchia, S. Russo
14:30-14:45 Break
Student Papers: Hardware Dependability PDS: Internet Security
14:45 -15:45 Improving the Dependability of FPGA-based real-time embedded systems with Partial Dynamic Reconfiguration
J. L. Nunes
Locality Matters: Reducing Internet Traffic Graphs Using Location Analysis
A. Berger, S. Rührup, W. Gansterer, O. Jung
Detecting and Tolerating Data Corruptions Due to Device Driver Defects
F. Fucci
Evasive Bots Masquerading as Human Beings on the Web
J. Jin, J. Offutt, N. Zheng, F. Mao, A. Koehl, H. Wang
IOCheck: A Framework to Enhance the Security of I/O Devices at Runtime
F. Zhang
Technical Committee Meeting
16:30 - 17:30 (open to all)