2017 13th European Dependable Computing Conference (EDCC)

4-8 Sept. 2017

Filter Results

Displaying Results 1 - 25 of 39
  • [Title page i]

    Publication Year: 2017, Page(s): i
    Request permission for reuse | PDF file iconPDF (13 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2017, Page(s): iii
    Request permission for reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • [Copypright notice]

    Publication Year: 2017, Page(s): iv
    Request permission for reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2017, Page(s):v - viii
    Request permission for reuse | PDF file iconPDF (132 KB)
    Freely Available from IEEE
  • Message from General Chair

    Publication Year: 2017, Page(s): ix
    Request permission for reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Message from Program Chair

    Publication Year: 2017, Page(s): x
    Request permission for reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2017, Page(s): xi
    Request permission for reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2017, Page(s): xii
    Request permission for reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2017, Page(s): xiii
    Request permission for reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • Reveiwers

    Publication Year: 2017, Page(s): xiv
    Request permission for reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • Blockchains and Consensus Protocols: Snake Oil Warning

    Publication Year: 2017, Page(s):1 - 2
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (78 KB) | HTML iconHTML

    A blockchain is a public ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renew... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • It is a Disruptive World with Exponential Development: Expected Trends in Embedded Systems, with a Special Focus on the Automotive Industry and Its Likely Effects on Industry and Society

    Publication Year: 2017, Page(s):3 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (97 KB) | HTML iconHTML

    In this talk, I'll argue that we need to change our way of thinking drastically and Europe needs to catch up urgently those in the world who have already started to do their homework outside Europe in order to preserve employment and the standard of living in Europe. We have already missed the absolute leadership in the nano-electronics world. It is in the hands of US and Far East owned/based comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advancing Fault Injection and Dependability Evaluation in the Software-Driven Telecom Industry

    Publication Year: 2017, Page(s): 5
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (66 KB) | HTML iconHTML

    Achieving dependable software is a challenging problem, especially for industries beyond traditional safety-critical domains, such as telecommunications, consumer electronics, manufacturing, etc., where the cost of software failures is still quite high. Several factors contribute to exacerbate this problem: these industries are abruptly converting into software-driven ones; they must face time-to-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Management and Privacy in a World of Data Wealth

    Publication Year: 2017, Page(s):6 - 7
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (80 KB) | HTML iconHTML

    Data storage and processing is at the center of every human activity and business. Among all types of data being stored and processed, there is added value in personally identifiable data. Not only it has direct value for building contact networks but also allows fine grained profiling. Profiling and extensive service usage metric collections allow unprecedented knowledge about what people want, b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ICT and Data-Management for Dependability of Electricity Distribution Grids: Opportunities and Barriers

    Publication Year: 2017, Page(s):8 - 9
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (80 KB) | HTML iconHTML

    This article discusses the application of ICT and data management for the dependability of electricity distribution grids. The focus of the contribution is on the opportunities and barriers for small and medium-sized distribution system operators serving up to few hundred thousand customers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accurately Simulating the Effects of Faults in VHDL Models Described at the Implementation-Level

    Publication Year: 2017, Page(s):10 - 17
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (411 KB) | HTML iconHTML

    Simulation-based fault injection (SBFI) is an indispensable technique for the early verification and dependability assessment of target circuits along the semi-custom design flow. Most precise results can be obtained by models described at the implementation level, as they accurately reflect the functional/timing behavior and the structure of the resulting circuit. These models consist of a list o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cluster-Based Vulnerability Assessment Applied to Operating Systems

    Publication Year: 2017, Page(s):18 - 25
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (405 KB) | HTML iconHTML

    Organizations face the issue of how to best allocate their security resources. Thus, they need an accurate method for assessing how many new vulnerabilities will be reported for the operating systems (OSs) they use in a given time period. Our approach consists of clustering vulnerabilities by leveraging the text information within vulnerability records, and then simulating the mean value function ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preserving Stabilization While Practically Bounding State Space

    Publication Year: 2017, Page(s):26 - 33
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    Stabilization is a key dependability property for dealing with unanticipated transient faults, as it guarantees that even in the presence of such faults, the system will recover to states where it satisfies its specification. One of the desirable attributes of stabilization is the use of bounded space for each variable.In this paper, we present an algorithm that transforms a stabilizingprogram tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable Byzantine Fault Tolerance on Heterogeneous Servers

    Publication Year: 2017, Page(s):34 - 41
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (587 KB) | HTML iconHTML

    When provided with more powerful or extra hardware, state-of-the-art Byzantine fault-tolerant (BFT) agreement protocols are unable to effectively exploit the additional computing resources: On the one hand, in settings with heterogeneous servers existing protocols cannot fully utilize servers with higher performance capabilities. On the other hand, using more servers than the minimum number of rep... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resilience Analysis of Top K Selection Algorithms

    Publication Year: 2017, Page(s):42 - 49
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (792 KB) | HTML iconHTML

    As the number of components in high-performance computing (HPC) systems continues to grow, the number of vehicles for soft errors will rise in parallel. Petascale research has shown that soft errors on supercomputers can occur as frequently as multiple times per day, and this rate will only increase with the exascale era. Due to this frequency, the resilience community has taken an interest in alg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Adaptive Fault Tolerance for Resilient Computing

    Publication Year: 2017, Page(s):50 - 57
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    A system that remains dependable when facing changes is called resilient. The fast evolution of systems, including safety critical systems, requires that fault tolerance mechanisms - FTM - remain consistent with their assumptions and the non-functional requirements of the application. A change event may impose the adaptation of an FTM to the current assumptions that can be made. Consequently, syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing the Probability for Data Loss in Two-Dimensional Parity RAIDs

    Publication Year: 2017, Page(s):58 - 65
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (585 KB) | HTML iconHTML

    Parity RAIDs are used to protect storage systems against disk failures. The idea is to add redundancy to the system by storing the parity of subsets of disks on extra parity disks. A simple two-dimensional scheme is the one in which the data disks are arranged in a rectangular grid, and every row and column is extended by one disk which stores the parity of it.In this paper we describe several two... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedded Multi-core System for Design of Next Generation Powertrain Control Units

    Publication Year: 2017, Page(s):66 - 72
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (906 KB) | HTML iconHTML

    In recent days lots of effort is spent on the integration of multi-core processors also in embedded realtime systems domain for several reasons, such as continuously increasing performance requirements and stricter power limitations. This trend is reflected also in the automotive field. Another major aspect for this up-coming trend is the increasing amount of ECUs within the vehicle. Modern vehicl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Emulation of Vulnerabilities through Software Fault Injection

    Publication Year: 2017, Page(s):73 - 78
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (170 KB) | HTML iconHTML

    Security vulnerabilities in system software are a major concern, especially when the software is highly exposed. This paper studies whether it is possible to emulate security vulnerabilities through software fault injection by using well known emulation operators. Emulating security vulnerabilities in the C programming language, in a realistic way using field data, is an unanswered research questi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Test Program Generator for AUTOSAR OS

    Publication Year: 2017, Page(s):79 - 86
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    The Automotive Open System Architecture (AUTOSAR) has recently beenintroduced to most automotive software in Europe with the aim of reducing the development cost. AUTOSAR is a standardized software platform for automotive softwarethat consists of more than 80 modules with a variety of functions. The real-time operating system (OS) is a module in AUTOSAR that plays a critical role in these modules,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.