Pub Date : 2010-06-28DOI: 10.1109/DSN.2010.5544426
J. Daly, Nathan Debardeleben
With the emergence of many-core processors, accelerators, and alternative/heterogeneous architectures, the HPC community faces a new challenge: a scaling in number of processing elements that supersedes the historical trend of scaling in processor frequencies. The attendant increase in system complexity has first-order implications for fault tolerance. Mounting evidence invalidates traditional assumptions of HPC fault tolerance: faults are increasingly multiple-point instead of single-point and interdependent instead of independent; silent failures and silent data corruption are no longer rare enough to discount; stabilization time consumes a larger fraction of useful system lifetime, with failure rates projected to exceed one per hour on the largest systems; and application interrupt rates are apparently diverging from system failure rates.
{"title":"1st workshop on fault-tolerance for HPC at extreme scale FTXS 2010","authors":"J. Daly, Nathan Debardeleben","doi":"10.1109/DSN.2010.5544426","DOIUrl":"https://doi.org/10.1109/DSN.2010.5544426","url":null,"abstract":"With the emergence of many-core processors, accelerators, and alternative/heterogeneous architectures, the HPC community faces a new challenge: a scaling in number of processing elements that supersedes the historical trend of scaling in processor frequencies. The attendant increase in system complexity has first-order implications for fault tolerance. Mounting evidence invalidates traditional assumptions of HPC fault tolerance: faults are increasingly multiple-point instead of single-point and interdependent instead of independent; silent failures and silent data corruption are no longer rare enough to discount; stabilization time consumes a larger fraction of useful system lifetime, with failure rates projected to exceed one per hour on the largest systems; and application interrupt rates are apparently diverging from system failure rates.","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"1 1","pages":"615"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82589763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-28DOI: 10.1109/DSN.2010.5544423
J. Arlat, C. Constantinescu, R. Iyer, J. Karlsson, M. Nicolaidis
Nanocomputing technologies hold the promise for higher performance, lower power consumption as well as increased functionality. However, the dependability of these unprecedentedly small scale devices remains uncertain. The main sources of concern are: • Nanometer devices are expected to be highly sensitive to process variations. The guard-bands used today for avoiding the impact of such variations will not represent a feasible solution in the future. Thus, timing errors may occur more frequently. • New failure modes, specific to new materials, are expected to raise serious challenges to the design and test engineers. • Environment induced errors, like single event upsets (SEU), are likely to occur more frequently than in the case of conventional semiconductor devices. • New hardware redundancy techniques are needed to enable development of energy efficient systems. • The increased complexity of the systems based on nanotechnology will require improved computer aided design (CAD) tools, as well as better validation techniques. • Security of nanocomputing systems may be threatened by malicious attacks targeting new vulnerable areas in the hardware.
{"title":"Fourth workshop on dependable and secure nanocomputing","authors":"J. Arlat, C. Constantinescu, R. Iyer, J. Karlsson, M. Nicolaidis","doi":"10.1109/DSN.2010.5544423","DOIUrl":"https://doi.org/10.1109/DSN.2010.5544423","url":null,"abstract":"Nanocomputing technologies hold the promise for higher performance, lower power consumption as well as increased functionality. However, the dependability of these unprecedentedly small scale devices remains uncertain. The main sources of concern are: • Nanometer devices are expected to be highly sensitive to process variations. The guard-bands used today for avoiding the impact of such variations will not represent a feasible solution in the future. Thus, timing errors may occur more frequently. • New failure modes, specific to new materials, are expected to raise serious challenges to the design and test engineers. • Environment induced errors, like single event upsets (SEU), are likely to occur more frequently than in the case of conventional semiconductor devices. • New hardware redundancy techniques are needed to enable development of energy efficient systems. • The increased complexity of the systems based on nanotechnology will require improved computer aided design (CAD) tools, as well as better validation techniques. • Security of nanocomputing systems may be threatened by malicious attacks targeting new vulnerable areas in the hardware.","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"30 1","pages":"619-620"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73454740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-01DOI: 10.1109/DSN.2010.5544422
M. Malek, Felix Salfner, Kishor S. Trivedi
Proactive approaches to failure avoidance, recovery and maintenance have recently attracted increased interest among researchers and practitioners from various areas of dependable system design and operation. This first workshop provided a stimulating, and fruitful forum to foster collaboration among researchers working on proactive fault management, to discuss ideas, exchange experiences and to find new answers to the overall challenge of significantly improving system dependability in contemporary computing and communication systems.
{"title":"Second workshop on proactive failure avoidance, recovery, and maintenance (PFARM)","authors":"M. Malek, Felix Salfner, Kishor S. Trivedi","doi":"10.1109/DSN.2010.5544422","DOIUrl":"https://doi.org/10.1109/DSN.2010.5544422","url":null,"abstract":"Proactive approaches to failure avoidance, recovery and maintenance have recently attracted increased interest among researchers and practitioners from various areas of dependable system design and operation. This first workshop provided a stimulating, and fruitful forum to foster collaboration among researchers working on proactive fault management, to discuss ideas, exchange experiences and to find new answers to the overall challenge of significantly improving system dependability in contemporary computing and communication systems.","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"100 1","pages":"616-618"},"PeriodicalIF":0.0,"publicationDate":"2010-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76259665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-01-01DOI: 10.1109/DSN.2010.5544420
M. Correia, P. Pal
Design and operational vulnerabilities are accepted as inevitable in today’s complex computer systems. The distributed and networked nature of the systems that are currently in use and being developed facilitate discovery and exploitation of these flaws in increasingly new and easier ways. Intrusion Tolerance acknowledges that it is impossible to completely prevent attacks and intrusions, and that it is often impossible to accurately detect the act of intrusion and stop it early enough. Intrusion Tolerance research therefore aims to develop technologies that enable computer systems to continue to operate correctly despite attacks, and deny the attacker/intruder the success they seek. For instance, an intrusion-tolerant system may suffer partial loss of service or resources due to the attack, but it will continue to provide critical services in a degraded mode or trigger automatic mechanisms to regain and recover the compromised services and resources. Similar goals are being pursued in Survivability, Byzantine Fault Tolerance, Self-regenerative and Autonomic Systems. The idea of tolerating intrusions gained prominence during the late 1990s and early 2000s. Major research efforts led to the development of several intrusion-tolerant algorithms and architectures. It is now possible to grasp the fundamental principles of building practical intrusiontolerant systems, the issues underlying the validation and acceptance/certification of intrusion-tolerant systems, and also the continued effective and intelligent management and operation of such systems once they are put in operation. Despite significant progress, most modern systems are still not built as intrusion-tolerant systems. There are a number of reasons for this ranging from a false sense of security, such as lack of understanding of the risk, absence of any major cyber-disaster that is publicly acknowledged, the continued and fast paced innovation in information and software construction technologies, and the perception that Intrusion Tolerance is expensive. Combined with changing technology landscape, Intrusion Tolerance is a moving target that also needs to accommodate and adapt to changes. Unlike fault tolerance, Intrusion Tolerance faces an intelligent adversary who can adapt and evolve as the system adapts and recovers. New technologies make older solutions obsolete and introduce new vulnerabilities. How to make Intrusion Tolerance an integral part of the software engineering of modern information systems? What can be done to make system developers and architects more comfortable and confident about Intrusion Tolerance technologies? How to continue to stay ahead of the increasingly sophisticated adversaries? How to enlighten and empower the practitioners to navigate the ever-changing technology landscape so that they can build systems that can be trusted, and can operate through attacks? The 4th Workshop on Recent Advances in IntrusionTolerant Systems, held in conjunction with DSN 2010, a
{"title":"4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010","authors":"M. Correia, P. Pal","doi":"10.1109/DSN.2010.5544420","DOIUrl":"https://doi.org/10.1109/DSN.2010.5544420","url":null,"abstract":"Design and operational vulnerabilities are accepted as inevitable in today’s complex computer systems. The distributed and networked nature of the systems that are currently in use and being developed facilitate discovery and exploitation of these flaws in increasingly new and easier ways. Intrusion Tolerance acknowledges that it is impossible to completely prevent attacks and intrusions, and that it is often impossible to accurately detect the act of intrusion and stop it early enough. Intrusion Tolerance research therefore aims to develop technologies that enable computer systems to continue to operate correctly despite attacks, and deny the attacker/intruder the success they seek. For instance, an intrusion-tolerant system may suffer partial loss of service or resources due to the attack, but it will continue to provide critical services in a degraded mode or trigger automatic mechanisms to regain and recover the compromised services and resources. Similar goals are being pursued in Survivability, Byzantine Fault Tolerance, Self-regenerative and Autonomic Systems. The idea of tolerating intrusions gained prominence during the late 1990s and early 2000s. Major research efforts led to the development of several intrusion-tolerant algorithms and architectures. It is now possible to grasp the fundamental principles of building practical intrusiontolerant systems, the issues underlying the validation and acceptance/certification of intrusion-tolerant systems, and also the continued effective and intelligent management and operation of such systems once they are put in operation. Despite significant progress, most modern systems are still not built as intrusion-tolerant systems. There are a number of reasons for this ranging from a false sense of security, such as lack of understanding of the risk, absence of any major cyber-disaster that is publicly acknowledged, the continued and fast paced innovation in information and software construction technologies, and the perception that Intrusion Tolerance is expensive. Combined with changing technology landscape, Intrusion Tolerance is a moving target that also needs to accommodate and adapt to changes. Unlike fault tolerance, Intrusion Tolerance faces an intelligent adversary who can adapt and evolve as the system adapts and recovers. New technologies make older solutions obsolete and introduce new vulnerabilities. How to make Intrusion Tolerance an integral part of the software engineering of modern information systems? What can be done to make system developers and architects more comfortable and confident about Intrusion Tolerance technologies? How to continue to stay ahead of the increasingly sophisticated adversaries? How to enlighten and empower the practitioners to navigate the ever-changing technology landscape so that they can build systems that can be trusted, and can operate through attacks? The 4th Workshop on Recent Advances in IntrusionTolerant Systems, held in conjunction with DSN 2010, a","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"3 1","pages":"621-622"},"PeriodicalIF":0.0,"publicationDate":"2010-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81873396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-29DOI: 10.1109/DSN.2009.5270281
S. Bagchi, M. Correia, P. Pal
The 3rd Workshop on Recent Advances in Intrusion- Tolerant Systems, held in conjunction with DSN 2009, aims to provide the researchers and practitioners an intimate venue to discuss and collaborate on ground-breaking new ideas and fresh results.
{"title":"3rd Workshop on Recent Advances on Intrusion-Tolerant Systems WRAITS 2009","authors":"S. Bagchi, M. Correia, P. Pal","doi":"10.1109/DSN.2009.5270281","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270281","url":null,"abstract":"The 3rd Workshop on Recent Advances in Intrusion- Tolerant Systems, held in conjunction with DSN 2009, aims to provide the researchers and practitioners an intimate venue to discuss and collaborate on ground-breaking new ideas and fresh results.","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"36 1","pages":"600-601"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75642190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-29DOI: 10.1109/DSN.2009.5270287
C. Fetzer, R. Rodrigues
The FifthWorkshop on Hot Topics in System Dependability (HotDep'09) brings forth cutting-edge research ideas in fault tolerance, reliability and systems. This year's edition of the workshop will feature a total of 10 presentations of original research on wide array of topics, including cloud computing, storage, program analysis, operating systems, replication protocols, or failure prediction.
{"title":"Fifth Workshop on Hot Topics in System Dependability (HotDep 2009)","authors":"C. Fetzer, R. Rodrigues","doi":"10.1109/DSN.2009.5270287","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270287","url":null,"abstract":"The FifthWorkshop on Hot Topics in System Dependability (HotDep'09) brings forth cutting-edge research ideas in fault tolerance, reliability and systems. This year's edition of the workshop will feature a total of 10 presentations of original research on wide array of topics, including cloud computing, storage, program analysis, operating systems, replication protocols, or failure prediction.","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"36 1","pages":"594-595"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85473913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/DSN.2009.5270361
Jacques Bus
{"title":"Future prospects of research on security and dependability","authors":"Jacques Bus","doi":"10.1109/DSN.2009.5270361","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270361","url":null,"abstract":"","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"3 1","pages":"1"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75529103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/DSN.2009.5270362
G. Quadros
{"title":"Dependability - How does the market value it?","authors":"G. Quadros","doi":"10.1109/DSN.2009.5270362","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270362","url":null,"abstract":"","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"2004 1","pages":"2"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86262357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-01DOI: 10.1109/DSN.2009.5270280
L. Romano
{"title":"Fast Abstracts","authors":"L. Romano","doi":"10.1109/DSN.2009.5270280","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270280","url":null,"abstract":"","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"17 1","pages":"593"},"PeriodicalIF":0.0,"publicationDate":"2009-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81970990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-01DOI: 10.1109/DSN.2009.5270283
J. Arlat, C. Constantinescu, R. Iyer, J. Karlsson, M. Nicolaidis
LAAS-CNRS and Université de Toulouse, 7, Avenue du Colonel Roche 31077 Toulouse – France AMD, 2950 E Harmony Rd., Fort Collins, CO 80528 – USA Coordinated Science Laboratory, UIUC, 1308 West Main Street, Urbana, IL 61801 – USA Dept. of Computer Science & Eng., Chalmers University of Technology, 41296 Göteborg – Sweden TIMA (CNRS, Grenoble INP, UJF), 46, Avenue Felix Viallet, 38031 Grenoble – France
{"title":"Third workshop on dependable and secure nanocomputing","authors":"J. Arlat, C. Constantinescu, R. Iyer, J. Karlsson, M. Nicolaidis","doi":"10.1109/DSN.2009.5270283","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270283","url":null,"abstract":"LAAS-CNRS and Université de Toulouse, 7, Avenue du Colonel Roche 31077 Toulouse – France <jean.arlat@laas.fr> AMD, 2950 E Harmony Rd., Fort Collins, CO 80528 – USA <cristian.constantinescu@amd.com> Coordinated Science Laboratory, UIUC, 1308 West Main Street, Urbana, IL 61801 – USA <iyer@crhc.uiuc.edu> Dept. of Computer Science & Eng., Chalmers University of Technology, 41296 Göteborg – Sweden <johan@chalmers.se> TIMA (CNRS, Grenoble INP, UJF), 46, Avenue Felix Viallet, 38031 Grenoble – France <michael.nicolaidis@imag.fr>","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"2002 1","pages":"596-597"},"PeriodicalIF":0.0,"publicationDate":"2009-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86402439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}