Search Results - "2008 Seventh European Dependable Computing Conference"

Refine Results
  1. 1

    Practical Setup Time Violation Attacks on AES by Selmane, N., Guilley, S., Danger, J.-L.

    “…Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES and DES. Various methods of faults attack on…”
    Get full text
    Conference Proceeding
  2. 2

    The ADAPT Tool: From AADL Architectural Models to Stochastic Petri Nets through Model Transformation by Rugina, A.-E., Kanoun, K., Kaaniche, M.

    “…ADAPT is a tool that aims at easing the task of evaluating dependability measures in the context of modern model driven engineering processes based on AADL…”
    Get full text
    Conference Proceeding
  3. 3

    SGNET: A Worldwide Deployable Framework to Support the Analysis of Malware Threat Models by Leita, C., Dacier, M.

    “…The dependability community has expressed a growing interest in the recent years for the effects of malicious, external, operational faults in computing…”
    Get full text
    Conference Proceeding
  4. 4

    Software Implemented Detection and Recovery of Soft Errors in a Brake-by-Wire System by Skarin, D., Karlsson, J.

    “…This paper presents an experimental study of the impact of soft errors in a prototype brake-by-wire system. To emulate the effects of soft errors, we injected…”
    Get full text
    Conference Proceeding
  5. 5

    A Transient-Resilient System-on-a-Chip Architecture with Support for On-Chip and Off-Chip TMR by Obermaisser, R., Kraut, H., Salloum, C.

    “…The ongoing technological advances in the semiconductor industry make Multi-Processor System-on-a-Chips (MPSoCs) more attractive, because uniprocessor…”
    Get full text
    Conference Proceeding
  6. 6

    Software Faults Diagnosis in Complex OTS Based Safety Critical Systems by Carrozza, G., Cotroneo, D., Russo, S.

    “…This work addresses the problem of software fault diagnosis in complex safety critical software systems. The transient manifestations of software faults…”
    Get full text
    Conference Proceeding
  7. 7

    Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities by Mendonca, M., Neves, N.

    “…Wireless LANs (WLAN) are becoming ubiquitous, as more and more consumer electronic equipments start to support them. This creates new security concerns, since…”
    Get full text
    Conference Proceeding
  8. 8

    Metrics for Object-Oriented Software Reliability Assessment - Application to a Flight Manager by Gaudan, S., Motet, G., Auriol, G.

    “…In avionics domain, the software applications grew to millions of source lines of code representing important development expenditures. To cut the costs, the…”
    Get full text
    Conference Proceeding
  9. 9

    Online Dependability Assessment through Runtime Monitoring and Prediction by Malek, M.

    “…Computer science and engineering have, in comparison to other areas, focused on abstraction and technology, chasing the ever-changing artifacts, namely,…”
    Get full text
    Conference Proceeding
  10. 10

    Message from Program Committee Chair

    “…Presents the introductory welcome message from the conference proceedings…”
    Get full text
    Conference Proceeding
  11. 11

    Message from General Chair

    “…Presents the introductory welcome message from the conference proceedings…”
    Get full text
    Conference Proceeding
  12. 12

    A Distributed Approach to Autonomous Fault Treatment in Spread by Hein Meling, Gilje, J.L.

    “…This paper presents the design and implementation of the distributed autonomous replication management (DARM) framework built on top of the Spread group…”
    Get full text
    Conference Proceeding
  13. 13

    Refinement Patterns for Fault Tolerant Systems by Iliasov, A., Romanovsky, A.

    “…The paper puts forward the idea of using fault tolerance refinement patterns to assist system developers in disciplined application of software fault tolerance…”
    Get full text
    Conference Proceeding
  14. 14

    SONDe, a Self-Organizing Object Deployment Algorithm in Large-Scale Dynamic Systems by Gramoli, Vincent, Kermarrec, Anne-Marie, Merrer, Erwan Le, Neveux, Didier

    “…We present the design, correctness, and analysis of SONDe, a simple fully decentralized object deployment algorithm for highly requested systems. Given an…”
    Get full text
    Conference Proceeding
  15. 15

    Deriving Highly Available Quorum Systems from Structural Failure Models by Storm, C., Warns, T.

    “…Quorum systems are widely used means to realize agreement and coordination in fault-tolerant distributed systems. Highly available quorum systems are optimal…”
    Get full text
    Conference Proceeding
  16. 16

    On the Specification of Partitionable Group Membership by Pleisch, S., Rutti, O., Schiper, A.

    “…Group communication in partitionable systems has been the focus of many research activities over the last decade. Fault-tolerant applications in a…”
    Get full text
    Conference Proceeding
  17. 17

    Injecting Inconsistent Values Caused by Interaction Faults for Experimental Dependability Evaluation by Nassu, B.T., Uehara, K., Nanya, T.

    “…Interaction faults caused by a flawed external system designed by a third party are a major issue faced by interconnected systems. Fault injection is a…”
    Get full text
    Conference Proceeding
  18. 18

    Dependability Assessment for the Selection of Embedded Cores by de Andres, David, Ruiz, Juan-Carlos, Gil, Daniel, Gil, Pedro

    “…Many designers bet on reducing time-to-market costs by integrating off-the-shelf (OTS) cores in their embedded solutions, while looking after maintaining the…”
    Get full text
    Conference Proceeding
  19. 19

    A Novel Naming Scheme for System-on-a-Chips Supporting Dynamic Resource Management by El Salloum, C., Obermaisser, R., Huber, B., Kopetz, H.

    “…The problem of naming has been extensively studied in the field of distributed systems. However, multi-processor system-on-a-chips (MPSoCs), which are becoming…”
    Get full text
    Conference Proceeding
  20. 20