By Topic

2012 IEEE 18th Pacific Rim International Symposium on Dependable Computing

18-19 Nov. 2012

Filter Results

Displaying Results 1 - 25 of 28
  • [Cover art]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1135 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (170 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2012, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • Message from the Organizing Committee Chairs

    Publication Year: 2012, Page(s):vii - viii
    Request permission for commercial reuse | PDF file iconPDF (99 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2012, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2012, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2012, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • [Three invited talks]

    Publication Year: 2012, Page(s):xii - xiv
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • From Design for Adaptation to Component-Based Resilient Computing

    Publication Year: 2012, Page(s):1 - 10
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (575 KB) | HTML iconHTML

    The evolution of systems during their operational lifetime is becoming ineluctable. Dependable systems, which continuously deliver trustworthy services, must evolve in order to comply with changes having different origins, e.g. new fault tolerance requirements, or changes in available resources. These evolutions must not violate their dependability properties, which leads to the notion of resilien... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CDA: A Cloud Dependability Analysis Framework for Characterizing System Dependability in Cloud Computing Infrastructures

    Publication Year: 2012, Page(s):11 - 20
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (465 KB) | HTML iconHTML

    Cloud computing has become increasingly popular by obviating the need for users to own and maintain complex computing infrastructure. However, due to their inherent complexity and large scale, production cloud computing systems are prone to various runtime problems caused by hardware and software failures. Dependability assurance is crucial for building sustainable cloud computing services. Althou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identification of Minimal Unacceptable Combinations of Simultaneous Component Failures in Information Systems

    Publication Year: 2012, Page(s):21 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (976 KB) | HTML iconHTML

    Large-scale disasters may cause simultaneous failures of many components in information systems. In the design for disaster recovery, operational procedures to recover from simultaneous component failures need to be determined so as to satisfy the time-to-recovery objective within the limited budget. For this purpose, it is beneficial to identify the minimal unacceptable combination of component f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Middleware for Exactly-Once Semantics in Request-Response Interactions

    Publication Year: 2012, Page(s):31 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1196 KB) | HTML iconHTML

    Although the need for the exactly-once request-response interaction pattern is ubiquitous in distributed systems, making it work in practice is anything but simple. Ensuring the at-most-once part of the invocation is relatively easy. Unfortunately, the same is not true for the at-least-once guarantee, which depends on the recovery from crashes of the client, the server and the network. This is wha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Secure Framework for Monitoring Operating Systems Using SPEs in Cell/B.E.

    Publication Year: 2012, Page(s):41 - 50
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    Recently, even operating systems are often compromised by the attackers. Since a compromised operating system affects all the applications including security software on top of it, the integrity of the operating system should be guaranteed. However, it is difficult to monitor the operating system securely. In this paper, we propose SPE Observer, which is a framework for securely monitoring operati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Code Reuse Prevention through Control Flow Lazily Check

    Publication Year: 2012, Page(s):51 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    Despite the numerous prevention and protection techniques that have been developed, the exploitation of memory corruption vulnerabilities still represents a serious threat to the security of software systems and networks. Because of the adoption of the write or execute only policy (W⊕X) and address space layout randomization (ASLR), modern operate systems have been strengthened against code... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safety Trigger Conditions for Critical Autonomous Systems

    Publication Year: 2012, Page(s):61 - 69
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (727 KB) | HTML iconHTML

    A systematic process for eliciting safety trigger conditions is presented. Starting from a risk analysis of the monitored system, critical transitions to catastrophic system states are identified and handled in order to specify safety margins on them. The conditions for existence of such safety margins are given and an alternative solution is proposed if no safety margin can be defined. The propos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Entropy-Based Detection of Incipient Faults in Software Systems

    Publication Year: 2012, Page(s):70 - 79
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (562 KB) | HTML iconHTML

    This paper develops and validates a methodology to detect small, incipient faults in software systems. Incipient faults such as memory leaks slowly deteriorate the software's performance over time and if left undetected, the end result is usually a complete system failure. The proposed method combines tools from information theory and statistics: entropy and principal component analysis (PCA). The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safety Verification of Asynchronous Consensus Algorithms with Model Checking

    Publication Year: 2012, Page(s):80 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    This paper proposes a model checking-based approach to verification of asynchronous consensus algorithms, an important class of distributed fault-tolerant algorithms. The proposed approach can be used to verify these algorithms against agreement, which is the key safety property of this class of algorithms. A consensus algorithm typically has runs of unbounded length and unbounded queues or sets o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of SER Improvement by Radiation Hardened Latches

    Publication Year: 2012, Page(s):89 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (395 KB) | HTML iconHTML

    Soft error rate (SER) of various radiation hardened latches is analyzed by simulation. SER is estimated by modeling the variety of current pulses triggered by particle strikes such as neutrons from space or alpha particles using Monte Carlo method. By using proposed method, we show that SER of various latches is accurately analyzed without conducting irradiation experiments. As for the soft error ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Built-in Circuit for Self-Repairing Mesh-Connected Processor Arrays by Direct Spare Replacement

    Publication Year: 2012, Page(s):96 - 104
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    We present a self-repairing circuit for a mesh-connected processor array with faulty processing elements which are directly replaced by spare processing elements on two orthogonal lines at the edges of the array. First, the spare assignment problem is formalized as a matching problem in graph theory. Using the result, we present an algorithm for reconstructing the array in a convenient form for fi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-chip NoCs for Automotive Applications

    Publication Year: 2012, Page(s):105 - 110
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB) | HTML iconHTML

    This paper proposes a multi-chip NoC approach for implementing centralized ECUs. Unlike the conventional approach where ECUs and sensors/actuators are connected tightly, it has potential to implement efficient and reliable systems for automotive applications. Then, this paper reports our experience of implementing our first chip designed for the multi-chip NoC platform, and shows some experimental... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Modeling and Analysis of On-chip Networks for Real-Time Applications

    Publication Year: 2012, Page(s):111 - 120
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    Network-on-Chip (NoC) is now considered to be a promising approach to implementing many-core systems and some real-time applications are executed on them. However, it has not yet been proven that on-chip networks can theoretically satisfy the hard real-time constraints. In this paper, we propose the worst-case performance models of on-chip networks which represent the upper bound latency between N... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A BDD-Based Approach to Reliability Optimal Module Allocation in Networks

    Publication Year: 2012, Page(s):121 - 126
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    We consider the problem of finding an allocation of program modules to computing nodes in a network. The objective of this problem is to maximize the probability of successfully executing these modules. Nodes and links of the network are assumed to be subject to failures. We propose an algorithm for this problem which uses Binary Decision Diagrams (BDDs) extensively. BDDs have been used as a power... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dependable Processor by Using Built-in Self Test to Tolerate Periodical Transient Faults under Highly Electromagnetic Environment

    Publication Year: 2012, Page(s):127 - 134
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (566 KB) | HTML iconHTML

    This paper releases a report of the application for the fault tolerant sequential circuit technique against periodical transient faults under highly electromagnetic environment. After implementing the proposed fault tolerant technique on a counter in our previous paper, as an example of how the proposed architecture performs on utility-scale sequential circuits, the result obtained by applying the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.