By Topic

2012 Ninth European Dependable Computing Conference

8-11 May 2012

Filter Results

Displaying Results 1 - 25 of 35
  • EDCC 2012. Ninth European Dependable Computing Conference [Cover Art]

    Publication Year: 2012, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (846 KB)
    Freely Available from IEEE
  • Proceedings. Ninth European Dependable Computing Conference. EDCC 2012 [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • Proceedings. Ninth European Dependable Computing Conference. [Title Page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (144 KB)
    Freely Available from IEEE
  • Copyright (c) 2012 by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved. [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (214 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2012, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (99 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Committee Chair

    Publication Year: 2012, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (96 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2012, Page(s):xi - xiii
    Request permission for commercial reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • External reviewers

    Publication Year: 2012, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • CADA: Collaborative Auditing for Distributed Aggregation

    Publication Year: 2012, Page(s):1 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1033 KB) | HTML iconHTML

    The aggregation of distributions, composed of the number of occurrences of each element in a set, is an operation that lies at the heart of several large-scale distributed applications. Examples include popularity tracking, recommendation systems, trust management, or popularity measurement mechanisms. These applications typically span multiple administrative domains that do not trust each other a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Swarm Synthesis of Convergence for Symmetric Protocols

    Publication Year: 2012, Page(s):13 - 24
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (734 KB) | HTML iconHTML

    This paper presents a novel non-deterministic method for algorithmic addition of convergence to non-stabilizing symmetric protocols. The proposed method exploits randomization and parallelization in order to expand the scope of the search for self-stabilizing versions of non-stabilizing protocols. Such a non-deterministic method enables an embarrassingly parallel framework that exploits the comput... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Eventual alpha Partition-Participant Detector for MANETs

    Publication Year: 2012, Page(s):25 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    With Mobile Ad hoc Networks (MANETs), communication between mobile users is possible without any infrastructure. MANETs are already a necessary part of wireless systems. Due to arbitrary node arrivals, departures, crashes and movements, network partitioning may arise resulting in a degradation of the service, but not necessarily in its interruption. In this paper, we propose a distributed system m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From Byzantine Consensus to BFT State Machine Replication: A Latency-Optimal Transformation

    Publication Year: 2012, Page(s):37 - 48
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (365 KB) | HTML iconHTML

    We present a new algorithm for state machine replication that is built around a leader-driven consensus primitive. This algorithm requires only two additional communication steps between replicas and clients if the consensus leader is correct and the system is synchronous, being thus the first latency-optimal transformation from Byzantine consensus to BFT state machine replication. We also discuss... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Eliminating Single Points of Failure in Software-Based Redundancy

    Publication Year: 2012, Page(s):49 - 60
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (805 KB) | HTML iconHTML

    In the domain of safety-critical embedded and cyber-physical systems, software-based redundancy is generally understood as an effective and cheap approach to improve reliability. Especially redundant execution in terms of triple modular redundancy is a well-known solution. However, triple modular redundancy (TMR) leaves unprotected single points of failure (SPOFs), such as the voter, which have to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Mirrored Data Structures Approach to Diverse Partial Memory Replication

    Publication Year: 2012, Page(s):61 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    Software memory errors are a growing threat to software dependability. In previous work, we proposed an approach for detecting memory errors, called Diverse Partial Memory Replication (DPMR), that utilized automated program diversity and memory replication. The original design aimed to maximize coverage by making the pointers stored in different memory replicas comparable. In this paper, we propos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing the Input Timing Robustness of Real-Time Control Software for Autonomous Systems

    Publication Year: 2012, Page(s):73 - 83
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (847 KB) | HTML iconHTML

    The functional layer of an autonomous system such as a robot is required to carry out multiple real-time control activities in parallel. These activities are launched by asynchronous calls from clients situated at higher layers, so there is a need for the functional layer to provide built-in protection to ensure that it is robust with respect to requests that are issued at instants that are incomp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Electric Power Systems Accounting for Interdependencies in Heterogeneous Scenarios

    Publication Year: 2012, Page(s):84 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    Efforts have been significantly invested in the last years on analysis of interdependencies in critical infrastructures, including Electric Power Systems (EPS). Among other studies, a modeling and analysis framework has been proposed, able to account for the impact of interdependencies in EPS organized as a set of interconnected regions, both from the point of view of the electric power grid and o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Log Analytics for Dependable Enterprise Telephony

    Publication Year: 2012, Page(s):94 - 101
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (887 KB) | HTML iconHTML

    Enterprise telephony servers for large enterprises in business sectors like finance and healthcare, are complex software systems that require at least five nines of availability. Such systems need guaranteed service with minimal service disruption during failures and are built with availability designed into various aspects of operation. One of the approaches used to improve availability is detect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security of Electrostatic Field Persistent Routing: Attacks and Defense Mechanisms

    Publication Year: 2012, Page(s):102 - 113
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (393 KB) | HTML iconHTML

    Electrostatic Field-based Routing (EFR) is a form of geographical multi-path routing where packets are routed along a collection of electrostatic field lines, defined by electrostatic charges associated with source and sink nodes. EFR provides an efficient and scalable solution to the workload balancing problem. However, it assumes that nodes behave in a cooperative manner making EFR-based routing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence

    Publication Year: 2012, Page(s):114 - 125
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (417 KB) | HTML iconHTML

    In this paper, we consider the setting of large scale distributed systems, in which each node needs to quickly process a huge amount of data received in the form of a stream that may have been tampered with by an adversary. In this situation, a fundamental problem is how to detect and quantify the amount of work performed by the adversary. To address this issue, we propose AnKLe (for Attack-tolera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Provenance of WINE

    Publication Year: 2012, Page(s):126 - 131
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (467 KB) | HTML iconHTML

    The results of cyber security experiments are often impossible to reproduce, owing to the lack of adequate descriptions of the data collection and experimental processes. Such provenance information is difficult to record consistently when collecting data from distributed sensors and when sharing raw data among research groups with variable standards for documenting the steps that produce the fina... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leveraging Multi-core Computing Architectures in Avionics

    Publication Year: 2012, Page(s):132 - 143
    Cited by:  Papers (52)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (401 KB) | HTML iconHTML

    Multi-core computer architectures are on the forefront in consumer electronics and adaptation in safety-critical applications such as avionics could be beneficial due to their potential increased performance. Yet, there are challenges to deploy cutting edge multi-core architectures for safety-critical applications. New computing architectures are more integrated and optimized for average cases. On... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Timed Broadcast via Off-the-Shelf WLAN Distributed Coordination Function for Safety-Critical Systems

    Publication Year: 2012, Page(s):144 - 155
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (453 KB) | HTML iconHTML

    Low cost wireless solutions for safety-critical applications are attractive to leverage safety-critical operation in new application areas. This work assesses the feasibility of providing synchronous and time bounded communication to standard IEEE 802.11 devices with low effort modifications. An existing protocol for time bounded communication in wireless systems is adapted to a generic safety-cri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal Development of Critical Multi-agent Systems: A Refinement Approach

    Publication Year: 2012, Page(s):156 - 161
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    Multi-agent systems (MAS) are increasingly used in critical applications. To ensure dependability of MAS, we need powerful development techniques that would allow us to master complexity inherent to MAS and formally verify correctness and safety of collaborative agent activities. In this paper we present a development of hospital MAS by refinement in Event-B. We demonstrate that Event-B allows the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental Analysis of Binary-Level Software Fault Injection in Complex Software

    Publication Year: 2012, Page(s):162 - 172
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (807 KB) | HTML iconHTML

    The injection of software faults (i.e., bugs) by mutating the binary executable code of a program enables the experimental dependability evaluation of systems for which the source code is not available. This approach requires that programming constructs used in the source code should be identified by looking only at the binary code, since the injection is performed at this level. Unfortunately, it... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.