Zbigniew T. Kalbarczyk

According to our database1, Zbigniew T. Kalbarczyk authored at least 194 papers between 1994 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2020
Data Integrity Threats and Countermeasures in Railway Spot Transmission Systems.
TCPS, 2020

Assessing and Mitigating Impact of Time Delay Attack: Case Studies for Power Grid Controls.
IEEE Journal on Selected Areas in Communications, 2020

2019
RAINCOAT: Randomization of Network Communication in Power Grid Cyber Infrastructure to Mislead Attackers.
IEEE Trans. Smart Grid, 2019

ASAP: Accelerated Short-Read Alignment on Programmable Hardware.
IEEE Trans. Computers, 2019

Live Forensics for Distributed Storage Systems.
CoRR, 2019

A Study of Network Congestion in Two Supercomputing High-Speed Interconnects.
CoRR, 2019

Kayotee: A Fault Injection-based System to Assess the Safety and Reliability of Autonomous Vehicles to Faults and Errors.
CoRR, 2019

Understanding Fault Scenarios and Impacts through Fault Injection Experiments in Cielo.
CoRR, 2019

F-Pro: a Fast and Flexible Provenance-Aware Message Authentication Scheme for Smart Grid.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Smart Malware that Uses Leaked Control Data of Robotic Applications: The Case of Raven-II Surgical Robots.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

CAUDIT: Continuous Auditing of SSH Servers To Mitigate Brute-Force Attacks.
Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation, 2019

Assessing and mitigating impact of time delay attack: a case study for power grid frequency control.
Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, 2019

Availability attacks on computing systems through alteration of environmental control: smart malware approach.
Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, 2019

TRACTION: an infrastructure for trusted alert sharing and collaborative mitigation.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

ML-Based Fault Injection for Autonomous Vehicles: A Case for Bayesian Fault Injection.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Towards a Bayesian Approach for Assessing Fault Tolerance of Deep Neural Networks.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

AcMC 2 : Accelerating Markov Chain Monte Carlo Algorithms for Probabilistic Models.
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019

2018
Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids.
IEEE Trans. Smart Grid, 2018

Self-Healing Attack-Resilient PMU Network for Power System Operation.
IEEE Trans. Smart Grid, 2018

Resiliency of HPC Interconnects: A Case Study of Interconnect Failures and Recovery in Blue Waters.
IEEE Trans. Dependable Sec. Comput., 2018

Impact of Malicious SCADA Commands on Power Grids' Dynamic Responses.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Indirect cyber attacks by perturbation of environment control: a data driven attack model: poster.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

AVFI: Fault Injection for Autonomous Vehicles.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

Hands Off the Wheel in Autonomous Vehicles?: A Systems Perspective on over a Million Miles of Field Data.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Characterizing Supercomputer Traffic Networks Through Link-Level Analysis.
Proceedings of the IEEE International Conference on Cluster Computing, 2018

A ML-based Runtime System for Executing Dataflow Graphs on Heterogeneous Processors.
Proceedings of the ACM Symposium on Cloud Computing, 2018

2017
Analysis and Diagnosis of SLA Violations in a Production SaaS Cloud.
IEEE Trans. Reliability, 2017

Failure Diagnosis for Distributed Systems Using Targeted Fault Injection.
IEEE Trans. Parallel Distrib. Syst., 2017

Modeling and Mitigating Impact of False Data Injection Attacks on Automatic Generation Control.
IEEE Trans. Information Forensics and Security, 2017

Using OS Design Patterns to Provide Reliability and Security as-a-Service for VM-based Clouds.
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017

Reconciling Systems-Theoretic and Component-Centric Methods for Safety and Security Co-analysis.
Proceedings of the Computer Safety, Reliability, and Security, 2017

Systems-Theoretic Likelihood and Severity Analysis for Safety and Security Co-engineering.
Proceedings of the Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification, 2017

On Train Automatic Stop Control Using Balises: Attacks and a Software-Only Countermeasure.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Attack Induced Common-Mode Failures on PLC-Based Safety System in a Nuclear Power Plant: Practical Experience Report.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Inter-ictal Seizure Onset Zone localization using unsupervised clustering and Bayesian Filtering.
Proceedings of the 8th International IEEE/EMBS Conference on Neural Engineering, 2017

Trustworthy Services Built on Event-Based Probing for Layered Defense.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017

On accelerating pair-HMM computations in programmable hardware.
Proceedings of the 27th International Conference on Field Programmable Logic and Applications, 2017

ASAP: Accelerated Short Read Alignment on Programmable Hardware (Abstract Only).
Proceedings of the 2017 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2017

Prediction of adenocarcinoma development using game theory.
Proceedings of the 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2017

Smart Maintenance via Dynamic Fault Tree Analysis: A Case Study on Singapore MRT System.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Enhancing Anomaly Diagnosis of Automatic Train Supervision System Based on Operation Log.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

Holistic Measurement-Driven System Assessment.
Proceedings of the 2017 IEEE International Conference on Cluster Computing, 2017

2016
A Data-Driven Approach to Soil Moisture Collection and Prediction.
Proceedings of the 2016 IEEE International Conference on Smart Computing, 2016

A hardware-in-the-loop simulator for safety training in robotic surgery.
Proceedings of the 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2016

Optimal False Data Injection Attack against Automatic Generation Control in Power Grids.
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016

Efficient and Scalable Workflows for Genomic Analyses.
Proceedings of the ACM International Workshop on Data-Intensive Distributed Computing, 2016

Safety-critical cyber-physical attacks: analysis, detection, and mitigation.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016

A framework for generation, replay, and analysis of real-world attack variants.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016

Game Theory with Learning for Cyber Security Monitoring.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

Targeted Attacks on Teleoperated Surgical Robots: Dynamic Model-Based Detection and Mitigation.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

The Right Tool for the Job: A Case for Common Input Scenarios for Security Assessment.
Proceedings of the Graphical Models for Security - Third International Workshop, 2016

Attacking supercomputers through targeted alteration of environmental control: A data driven case study.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

A Simulation Study on Smart Grid Resilience under Software-Defined Networking Controller Failures.
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016

Unsupervised single-cell analysis in triple-negative breast cancer: A case study.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

Towards longitudinal analysis of a population's electronic health records using factor graphs.
Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, 2016

2015
Integrity Attacks on Real-Time Pricing in Electric Power Grids.
ACM Trans. Inf. Syst. Secur., 2015

VM-μCheckpoint: Design, Modeling, and Assessment of Lightweight In-Memory VM Checkpointing.
IEEE Trans. Dependable Sec. Comput., 2015

Performance Comparison and Tuning of Virtual Machines For Sequence Alignment Software.
Scalable Computing: Practice and Experience, 2015

Adverse Events in Robotic Surgery: A Retrospective Study of 14 Years of FDA Data.
CoRR, 2015

Systems-theoretic Safety Assessment of Robotic Telesurgical Systems.
CoRR, 2015

Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

Systems-Theoretic Safety Assessment of Robotic Telesurgical Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2015

Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure Scenarios.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

A fault-tolerant hardware architecture for robust wearable heart rate monitoring.
Proceedings of the 9th International Conference on Pervasive Computing Technologies for Healthcare, 2015

LogDiver: A Tool for Measuring Resilience of Extreme-Scale Systems and Applications.
Proceedings of the 5th Workshop on Fault Tolerance for HPC at eXtreme Scale, 2015

Towards an unified security testbed and security analytics framework.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

Preemptive intrusion detection: theoretical framework and real-world measurements.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

Dynamic VM Dependability Monitoring Using Hypervisor Probes.
Proceedings of the 11th European Dependable Computing Conference, 2015

Measuring and Understanding Extreme-Scale Application Resilience: A Field Study of 5, 000, 000 HPC Application Runs.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

Software-Defined Networking for Smart Grid Resilience: Opportunities and Challenges.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015

2014
Building Reliable and Secure Virtual Machines Using Architectural Invariants.
IEEE Security & Privacy, 2014

An evaluation of zookeeper for high availability in system S.
Proceedings of the ACM/SPEC International Conference on Performance Engineering, 2014

Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids (Poster).
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

CyberSAGE: A Tool for Automatic Security Assessment of Cyber-Physical Systems.
Proceedings of the Quantitative Evaluation of Systems - 11th International Conference, 2014

Automatic Generation of Security Argument Graphs.
Proceedings of the 20th IEEE Pacific Rim International Symposium on Dependable Computing, 2014

Analysis and Diagnosis of SLA Violations in a Production SaaS Cloud.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering, 2014

IICPS 2014 workshop keynote: Computing through failures and cyber attacks: Case for resilient smart power grid.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Characterization of operational failures from a business data processing SaaS platform.
Proceedings of the 36th International Conference on Software Engineering, 2014

Personalized password guessing: a new security threat.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Preemptive intrusion detection.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural Invariants.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Lessons Learned from the Analysis of System Failures at Petascale: The Case of Blue Waters.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

AHEMS: Asynchronous Hardware-Enforced Memory Safety.
Proceedings of the 17th Euromicro Conference on Digital System Design, 2014

A Performance Evaluation of Sequence Alignment Software in Virtualized Environments.
Proceedings of the 14th IEEE/ACM International Symposium on Cluster, 2014

Automated Classification of Computer-Based Medical Device Recalls: An Application of Natural Language Processing and Statistical Learning.
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014

Knowledge Discovery from Big Data for Intrusion Detection Using LDA.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014

2013
SymPLFIED: Symbolic Program-Level Fault Injection and Error Detection Framework.
IEEE Trans. Computers, 2013

Analysis of Safety-Critical Computer Failures in Medical Devices.
IEEE Security & Privacy, 2013

Go with the flow: toward workflow-oriented security assessment.
Proceedings of the New Security Paradigms Workshop, 2013

Pluggable Watchdog: Transparent Failure Detection for MPI Programs.
Proceedings of the 27th IEEE International Symposium on Parallel and Distributed Processing, 2013

A Simulation Framework to Evaluate Virtual CPU Scheduling Algorithms.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Reliability analysis reloaded: how will we survive?
Proceedings of the Design, Automation and Test in Europe, 2013

Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol.
Proceedings of the Cyber Security and Information Intelligence, 2013

Impact of integrity attacks on real-time pricing in smart grids.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Semantic security analysis of SCADA networks to detect malicious control commands in power grids.
Proceedings of the SEGS'13, 2013

2012
Nanocomputing: Small Devices, Large Dependability Challenges.
IEEE Security & Privacy, 2012

Characterization of the error resiliency of power grid substation devices.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Toward a high availability cloud: Techniques and challenges.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

Towards resiliency in embedded medical monitoring devices.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

2011
Automated Derivation of Application-Specific Error Detectors Using Dynamic Analysis.
IEEE Trans. Dependable Sec. Comput., 2011

Automated Derivation of Application-Aware Error Detectors Using Static Analysis: The Trusted Illiac Approach.
IEEE Trans. Dependable Sec. Comput., 2011

Identifying Compromised Users in Shared Computing Infrastructures: A Data-Driven Bayesian Network Approach.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 2011

Hauberk: Lightweight Silent Data Corruption Error Detector for GPGPU.
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011

An embedded reconfigurable architecture for patient-specific multi-paramater medical monitoring.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011

Managing business health in the presence of malicious attacks.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011

Analysis of security data from a large computing organization.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

CloudVal: A framework for validation of virtualization environment in cloud infrastructure.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

Improving Log-based Field Failure Data Analysis of multi-node computing systems.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

Modeling stream processing applications for dependability evaluation.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

2010
Fault Injection.
Proceedings of the Encyclopedia of Software Engineering, 2010

Analysis of Credential Stealing Attacks in an Open Networked Environment.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Checkpointing virtual machines against transient errors.
Proceedings of the 16th IEEE International On-Line Testing Symposium (IOLTS 2010), 2010

Measurement-based analysis of fault and error sensitivities of dynamic memory.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

A Soldier Health Monitoring System for Military Applications.
Proceedings of the International Conference on Body Sensor Networks, 2010

2009
Discovering Application-Level Insider Attacks Using Symbolic Execution.
Proceedings of the Emerging Challenges for Security, 2009

Quantitative Analysis of Long-Latency Failures in System Software.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Pervasive embedded real time monitoring of EEG & SpO2.
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009

Pervasive embedded systems for detection of traumatic brain injury.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

Second workshop on Compiler and Architectural Techniques for Application Reliability and Security (CATARS).
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Effectiveness of machine checks for error diagnostics.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

An end-to-end approach for the automatic derivation of application-aware error detectors.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach.
Proceedings of the Insider Attack and Cyber Security - Beyond the Hacker, 2008

Formalizing System Behavior for Evaluating a System Hang Detector.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008

Error Behavior Comparison of Multiple Computing Systems: A Case Study Using Linux on Pentium, Solaris on SPARC, and AIX on POWER.
Proceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008

Workshop on compiler and architectural techniques for application reliability and security (CATARS).
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2007
Reliability MicroKernel: Providing Application-Aware Reliability in the OS.
IEEE Trans. Reliability, 2007

Inner-Circle Consistency for Wireless Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2007

Toward Application-Aware Security and Reliability.
IEEE Security & Privacy, 2007

Automated Derivation of Application-aware Error Detectors using Static Analysis.
Proceedings of the 13th IEEE International On-Line Testing Symposium (IOLTS 2007), 2007

How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
Active Replication of Multithreaded Applications.
IEEE Trans. Parallel Distrib. Syst., 2006

Security Vulnerabilities: From Analysis to Detection and Masking Techniques.
Proceedings of the IEEE, 2006

An OS-level Framework for Providing Application-Aware Reliability.
Proceedings of the 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 2006

Dynamic Derivation of Application-Specific Error Detectors and their Implementation in Hardware.
Proceedings of the Sixth European Dependable Computing Conference, 2006

Measurement-Based Analysis: A Key to Experimental Research in Dependability.
Proceedings of the Sixth European Dependable Computing Conference, 2006

An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

Workshop on Applied Software Reliability (WASR).
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

2005
RTES demo system2004.
SIGBED Review, 2005

An Experimental Study of Soft Errors in Microprocessors.
IEEE Micro, 2005

Recent Advances and New Avenues in Hardware-Level Reliability Support.
IEEE Micro, 2005

Application Fault Tolerance with Armor Middleware.
IEEE Internet Computing, 2005

Application-Based Metrics for Strategic Placement of Detectors.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

Assessing the Crash-Failure Assumption of Group Communication Protocols.
Proceedings of the 16th International Symposium on Software Reliability Engineering (ISSRE 2005), 2005

A Compiler-Enabled Model- and Measurement-Driven Adaptation Environment for Dependability and Performance.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

An Architectural Framework for Detecting Process Hangs/Crashes.
Proceedings of the Dependable Computing, 2005

Modeling Coordinated Checkpointing for Large-Scale Supercomputers.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

Microprocessor Sensitivity to Failures: Control vs Execution and Combinational vs Sequential Logic.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

Defeating Memory Corruption Attacks via Pointer Taintedness Detection.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

Neutralization of Errors and Attacks in Wireless Ad Hoc Networks.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

2004
The Effects of an ARMOR-Based SIFT Environment on the Performance and Dependability of User Applications.
IEEE Trans. Software Eng., 2004

Reflections on Industry Trends and Experimental Research in Dependability.
IEEE Trans. Dependable Sec. Comput., 2004

Dependable Systems and Networks-Performance and Dependability Symposium (DSN-PDS) 2002: Selected Papers.
Perform. Eval., 2004

Modeling and evaluating the security threats of transient errors in firewall software.
Perform. Eval., 2004

Hardware Support for High Performance, Intrusion- and Fault-Tolerant Systems.
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004

Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics.
Proceedings of the Security and Protection in Information Processing Systems, 2004

The evolution of dependable computing at the University of Illinois.
Proceedings of the Building the Information Society, 2004

Checkpointing of Control Structures in Main Memory Database Systems.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

An Architectural Framework for Providing Reliability and Security Support.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

Error Sensitivity of the Linux Kernel Executing on PowerPC G4 and Pentium 4 Processors.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

2003
A system model for dynamically reconfigurable software.
IBM Systems Journal, 2003

Security Vulnerabilities - From Data Analysis to Protection Mechanisms.
Proceedings of the 9th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS Fall 2003), 2003

Transparent Runtime Randomization for Security.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

Group Communication Protocols under Errors.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

Error-Injection-Based Failure Characterization of the IEEE 1394 Bus.
Proceedings of the 9th IEEE International On-Line Testing Symposium (IOLTS 2003), 2003

A Foundation for Adaptive Fault Tolerance in Software.
Proceedings of the 10th IEEE International Conference on Engineering of Computer-Based Systems (ECBS 2003), 2003

Characterization of Linux Kernel Behavior under Errors.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

A Preemptive Deterministic Scheduling Algorithm for Multithreaded Replicas.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

2002
Loose Synchronization of Multithreaded Replicas.
Proceedings of the 21st Symposium on Reliable Distributed Systems (SRDS 2002), 2002

Measurement-Based Analysis of System Dependability Using Fault Injection and Field Failure Data.
Proceedings of the Performance Evaluation of Complex Systems: Techniques and Tools, 2002

NFTAPE: Networked Fault Tolerance and Performance Evaluator.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

Joint Panel - IPDS and Workshop on Dependability Benchmarking.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

An Adaptive Architecture for Monitoring and Failure Analysis of High-Speed Networks.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
Comparing Fail-Sailence Provided by Process Duplication versus Internal Error Detection for DHCP Server.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

An Experimental Study of Security Vulnerabilities Caused by Errors.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

A Framework for Database Audit and Control Flow Checking for a Wireless Telephone Network Controller.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

2000
Hierarchical Error Detection in a Software Implemented Fault Tolerance (SIFT) Environment.
IEEE Trans. Knowl. Data Eng., 2000

Micro-Checkpointing: Checkpointing for Multithreaded Applications.
Proceedings of the 6th IEEE International On-Line Testing Workshop (IOLTW 2000), 2000

Measurement-based Analysis of Networked System Availability.
Proceedings of the Performance Evaluation: Origins and Directions, 2000

1999
Hierarchical Simulation Approach to Accurate Fault Modeling for System Dependability Evaluation.
IEEE Trans. Software Eng., 1999

Chameleon: A Software Infrastructure for Adaptive Fault Tolerance.
IEEE Trans. Parallel Distrib. Syst., 1999

Stress-Based and Path-Based Fault Injection.
IEEE Trans. Computers, 1999

An Approach to Evaluating the Effects of Realistic Faults in Digital Circuits.
Proceedings of the 12th International Conference on VLSI Design (VLSI Design 1999), 1999

A Software Multilevel Fault Injection Mechanism: Case Study Evaluating the Virtual Interface Architecture.
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999

Failure Data Analysis of a LAN of Windows NT based Computers.
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999

Networked Windows NT System Field Failure Data Analysis.
Proceedings of the 1999 Pacific Rim International Symposium on Dependable Computing (PRDC 1999), 1999

1998
A Speculation-based Approach for Performance and Dependability Analysis: A Case Study.
Proceedings of the 30th conference on Winter simulation, WSC 1998, 1998

Dependability Analysis of a Cache-Based RAID System via Fast Distributed Simulation.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

The Chameleon Infrastructure for Adaptive, Software Implemented Fault Tolerance.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

A Flexible Software Architecture for High Availability Computing.
Proceedings of the 3rd IEEE International Symposium on High-Assurance Systems Engineering (HASE '98), 1998

A Hierarchical Approach for Dependability Analysis of a Commercial Cache-Based RAID Storage Architecture.
Proceedings of the Digest of Papers: FTCS-28, 1998

1997
Chameleon: Adaptive Fault Tolerance Using Reliable, Mobile Agents.
Proceedings of the Sixteenth Symposium on Reliable Distributed Systems, 1997

1995
An Attempt to Evaluate Functional Diversity Employed in a Reactor Protection System.
Proceedings of the 14th International Conference on Computer Safety, 1995

1994
Dependable flight control system by data diversity and self-checking components.
Microprocessing and Microprogramming, 1994


  Loading...