Program
Monday, Dec. 13th
18:00-19:30 | Reception & Registration (Restaurant 3rd floor) |
Tuesday, Dec. 14th
9:10-(17:30) | Registration (Foyer 2nd floor) |
9:30-9:40 | Opening |
9:40-10:40 |
Keynote (Conference Rooms 3 and 4)
Chair: Yutaka Ishikawa (University of Tokyo) Towards Open Systems Dependability Mario Tokoro JST/CREST DEOS Project Supervisor (Sony Computer Science Laboratories, Inc.) |
10:40-11:00 | Break |
11:00-12:30 |
Session I-A: Fault Injection (Conference Room 3)
Chair: Dong Tang (Oracle Corporation) Towards Identifying the Best Variables for Failure Prediction using Injection of Realistic Software Faults Ivano Irrera, João Durães, Marco Vieira, and Henrique Madeira (Universidade de Coimbra) Searching Representative and Low Cost Fault Models for Intermittent Faults in Microcontrollers: A Case Study Joaquin Gracia-Morán, Daniel Gil-Tomás, Juan-Carlos Baraza-Calvo, Luis-Jose Saiz-Adalid, and Pedro-Joaquin Gil-Vicente (Universidad Politécnica de Valencia) Modeling the Propagation of Intermittent Hardware Faults in Programs Layali Rashid, Karthik Pattabiraman, and Sathish Gopalakrishnan (University of British Columbia) |
Session I-B: Virtual Machines (Conference Room 4)
Chair: Hiroyuki Okamura (Hiroshima University) A Secure System-Wide Process Scheduler across Virtual Machines Hidekazu Tadokoro (Tokyo Institute of Technology), Kenichi Kourai (Kyushu Institute of Technology), and Shigeru Chiba (Tokyo Institute of Technology) Implementing a Hybrid Virtual Machine Monitor for Flexible and Efficient Security Mechanisms Junya Sawazaki, Toshiyuki Maeda, and Akinori Yonezawa (University of Tokyo) Customizing Virtual Machine with Fault Injector by Integrating with SpecC Device Model for a Software Testing Environment D-Cloud Toshihiro Hanawa, Hitoshi Koizumi, Takayuki Banzai, Mitsuhisa Sato, Shin'ichi Miura, Tadatoshi Ishii, and Hidehisa Takamizawa (University of Tsukuba) |
|
12:30-13:30 | Lunch on Your Own |
13:30-15:00 |
Session II-A: Chip Multi-Processors (Conference Room 3)
Chair: Toshinori Sato (Fukuoka University) FiRot: An Efficient Crosstalk Mitigation Method for Network-on-Chips Ahmad Patooghy, Mansour Shafaei, Seyed Ghassem Miremadi, Hajar Falahati, and Somayyeh Taheri (Sharif University of Technology) An Efficient Decision Unit for the Pair and Swap Methodology within Chip Multiprocessors James Weston, Masashi Imai, Tomohide Nagai (University of Tokyo), and Takashi Nanya (Canon, Inc.) Address Remapping for Static NUCA in NoC-based Degradable Chip-Multiprocessors Ying Wang, Lei Zhang, Yinhe Han, Huawei Li, and Xiaowei Li (Chinese Academy of Sciences) |
Session II-B: Software Reliability (Conference Room 4)
Chair: Toshiyuki Maeda (University of Tokyo) Formal Verification of Industrial Software with Dynamic Memory Management Sébastien Labbé (EDF Research & Development) and Arnaud Sangnier (University of Genova) A Software Accelerated Life Testing Model Toshiya Fujii, Tadashi Dohi, Hiroyuki Okamura (Hiroshima University), and Takaji Fujiwara (Business Cube & Partners, Inc.) Toward a Language for Communication among Stakeholders Yutaka Matsuno (University of Tokyo), Jin Nakazawa (Keio University), Makoto Takeyama (AIST), Midori Sugaya (Yokohama National University), and Yutaka Ishikawa (University of Tokyo) |
|
15:00-15:30 | Break |
15:30-17:30 |
Session III-A: Real-Time/Networked Systems (Conference Room 3)
Chair: Toshihiro Hanawa (University of Tsukuba) Sensitivity Analysis of the Minimum Task Period for Arbitrary Deadline Real-Time Systems Fengxiang Zhang (Southwest University), Alan Burns (University of York), and Sanjoy Baruah (University of North Carolina at Chapel Hill) An Improved Knowledge Connectivity Condition for Fault-Tolerant Consensus with Unknown Participants Jichiang Tsai and Che-Cheng Chang (National Chung Hsing University) A Distributed Data Replication Protocol for File Versioning with Optimal Node Assignments Takahiko Ikeda, Mamoru Ohara, Satoshi Fukumoto, Masayuki Arai, and Kazuhiko Iwasaki (Tokyo Metropolitan University) End-to-End Performability Analysis for Infrastructure-as-a-Service Cloud: An Interacting Stochastic Models Approach Rahul Ghosh, Kishor Trivedi (Duke University), Vijay Naik (IBM T. J. Watson Research Center), and Dong Seong Kim (Duke University) |
Session III-B: Failure Detection/Dependency (Conference Room 4)
Chair: Hidetsugu Irie (Electro-Communication University) Deadlock Detection Scheduling for Distributed Processes in the Presence of System Failures Akikazu Izumi, Tadashi Dohi (Hiroshima University), and Naoto Kaio (Hiroshima Shudo University) Two Efficient Software Techniques to Detect and Correct Control-Flow Errors Hamid Reza Zarandi, Mohammad Maghsoudloo, and Navid Khoshavi (Amirkabir University of Technology) Analysis of Dependencies between Failures in the UNINETT IP Backbone Network Andres J. Gonzalez, Bjarne E. Helvik (NTNU), Jon K. Hellan (UNINETT), and Pirkko Kuusela (VTT) |
|
18:00-20:30 | Banquet (Gakushikaikan) |
Wednesday, Dec. 15th
9:10-(14:00) | Registration (Foyer 2nd floor) |
9:30-11:00 |
Fast Abstract (Conference Rooms 3 and 4)
Chair: Tatsuhiro Tsuchiya (Osaka University) Composition Kernel: A Multi-Core Processor Virtualization Layer for Highly Functional Embedded Systems Tatsuo Nakajima, Yuki Kinebuchi, Alexandre Courbot, Hiromasa Shimada, Tsung-Han Lin, and Hitoshi Mitake (Waseda University) Optimal Inventory of Computer Repair Parts: A Fuzzy Systems Approach Les M. Sztandera (Philadelphia University) A Replacement Strategy for Canary Flip-Flops Yuji Kunitake (Kyushu University), Toshinori Sato (Fukuoka University), and Hiroto Yasuura (Kyushu University) Quantitative Evaluation of Integrity for Remote System Using the Internet Masato Kitakami, Hiroshi Konno, Kazuteru Namba, and Hideo Ito (Chiba University) A Speculative Byzantine Algorithm for P2P System Yusuke Matsumoto and Hiromi Kobayashi (Tokai University) Core-Local Memory Assisted Protection Yuki Kinebuchi, Tatsuo Nakajima (Waseda University), Vinod Ganapathy, and Liviu Iftode (Rutgers University) P-Bus: Programming Interface Layer for Safe OS Kernel Extensions Hajime Fujita, Motohiko Matsuda, Toshiyuki Maeda (University of Tokyo), Shin'ichi Miura (University of Tsukuba), and Yutaka Ishikawa (University of Tokyo) A Minimal Roll-Back Based Recovery Scheme for Fault Toleration in Pipeline Processors Jun Yao, Ryoji Watanabe, Takashi Nakada, Hajime Shimada, Yasuhiko Nakashima (Nara Institute of Science and Technology), and Kazutoshi Kobayashi (Kyoto Institute of Technology) Reliability Evaluation of Flip-flops Based on Probabilistic Transfer Matrices Chengtian Ouyang, Jianhui Jiang, and Jie Xiao (Tongji University) Automatic Static Fault Tree Analysis from System Models Jianwen Xiang and Kazuo Yanoo (NEC Corporation) An Asynchronous Checkpoint-Based Redundant Multithreading Architecture Jie Yin and Jianhui Jiang (Tongji University) A Safe Measurement-Based Worst-Case Execution Time Estimation Using Automatic Test-Data Generation Liangliang Kong and Jianhui Jiang (Tongji University) A Hierarchical Model for Reliability Analysis of Sensor Networks Dong Seong Kim, Rahul Ghosh, and Kishor S. Trivedi (Duke University) The Performance Analysis and Hardware Acceleration of Crypto-Computations for Enhanced Security Jed Kao-Tung Chang (University of California), Chen Liu (Florida International University), Shaoshan Liu (Microsoft Corp.), and Jean-Luc Gaudiot (University of California) Formal Validation and Requirements Management Based on the Jackson's Reference Model for Requirements and Specifications Takashi Kitamura, Keishi Okamoto, and Makoto Takeyama (AIST) |
11:00-13:00 |
Research Exhibition (Conference Room 2)
A Composition Kernel: A Software Infrastructure for Building Complex Embedded Systems Tatsuo Nakajima, Yuki Kinebuchi, Hiromasa Shimada, and Tsung-Han Lin (Waseda University) Dependability Measurements and Evaluation Tool: DS-Bench/D-Cloud Yutaka Ishikawa (University of Tokyo), Mitsuhisa Sato, Toshihiro Hanawa (University of Tsukuba), Hajime Fujita (University of Tokyo), Takayuki Banzai, Hitoshi Koizumi, and Shin'ichi Miura (University of Tsukuba) Dependable Scripting Language: Use Case of Evidence Management Kimio Kuramitsu (Yokohama National University) Formal Verification Tools for Systems Software Toshiyuki Maeda, Motohiko Matsuda, Hajime Fujita (University of Tokyo), Shin'ich Miura (University of Tsukuba), and Yutaka Ishikawa (University of Tokyo) Dependable Power-efficient File Server Hajime Fujita and Yutaka Ishikawa (University of Tokyo) DMR mode of SmartCore system Shimpei Sato, Shinya Takamaeda, and Kenji Kise (Tokyo Institute of Technology) Dependable Network-on-Chip Platform Daihan Wang, Chammika Mannakkara, Vijay Holimath and Tomohiro Yoneda (National Institute of Informatics) Yet Another Taint Mode for PHP Hiroshi Toi, Ryota Shioya, Masahiro Goshima, and Shuichi Sakai (University of Tokyo) Dependable Responsive Processor for Distributed Real-Time Systems Kazutoshi Suito (Keio University) |
13:00-14:00 | Lunch on Your Own |
14:00-15:00 |
Invited Talk (Conference Rooms 3 and 4)
Chair: Tomohiro Yoneda (National Institute of Informatics) Dependable E-Payment System in Japan -- Dependability, Accountability and Security Tadashi Morita Sony Corporation |
15:00-15:30 | Break |
15:30-17:30 |
Session IV-A: Architectures (Conference Room 3)
Chair: Nobuyasu Kanekawa (Hitachi Ltd.) System-Level Vulnerability Estimation for Data Caches Alireza Haghdoost, Hossein Asadi (Sharif University of Technology), and Amirali Baniasadi (University of Victoria) Loris - A Dependable, Modular File-Based Storage Stack Raja Appuswamy, David C. van Moolenbroek, and Andrew S. Tanenbaum (Vrije Universiteit) Design and Implementation of a Fault Tolerant Single IP Address Cluster Jun Kato, Hajime Fujita, and Yutaka Ishikawa (University of Tokyo) On the Reliability of Cascaded TMR Systems Masashi Hamamatsu, Tatsuhiro Tsuchiya, and Tohru Kikuno (Osaka University) |
Session IV-B: System Security (Conference Room 4)
Chair: Hiroshi Yamada (Keio University) A Learning-Based Approach to Secure Web Services from SQL/XPath Injection Attacks Nuno Laranjeiro, Marco Vieira, and Henrique Madeira (University of Coimbra) Estimating Computer Virus Propagation Based on Markovian Arrival Processes Hiroyuki Okamura and Tadashi Dohi (Hiroshima University) Dynamic Multilayer Routing to Achieve Location-Hiding Hakem Beitollahi and Geert Deconinck (K. U. Leuven) Sequential Frequency Vector Based System Call Anomaly Detection Ying Wu, Jianhui Jiang, and Liangliang Kong (Tongji University) |
|
17:30- | Closing (Conference Room 3) |
Keynote Speaker
Dr. Mario Tokoro, JST/CREST DEOS Project Supervisor (Sony Computer Science Laboratories, Inc.)
Invited Speaker
Mr. Tadashi Morita, General Manager, Sony Corporation
Research Exhibition
A Composition Kernel: A Software Infrastructure for
Building Complex Embedded Systems
Tatsuo Nakajima, Yuki Kinebuchi, Hiromasa Shimada, and
Tsung-Han Lin (Waseda University)
Abstract:
A virtualization layer makes it possible to compose multiple
functionalities on a multi-core processor with the minimum
modification of OS kernels and applications. A multi-core
processor is a good candidate to compose various software
independently developed for dedicated processors into one
multi-core processor to reduce both the hardware and development
cost. In this demonstration, we present SPUMONE, which is a
virtualization layer suitable for developing multi-core processor
based-information appliances. SPUMONE offers several features to
increase dependability of systems, and the features enable us to
develop high reliable embedded systems without increasing
overhead.
Dependability Measurements and Evaluation Tool: DS-Bench/D-Cloud
Yutaka Ishikawa (University of Tokyo), Mitsuhisa Sato,
Toshihiro Hanawa (University of Tsukuba),
Hajime Fujita (University of Tokyo), Takayuki Banzai,
Hitoshi Koizumi, and Shin'ichi Miura (University of Tsukuba)
Abstract:
The DS-Bench/D-Cloud is a tool to execute dependability benchmarks in
order to measure availability, reliability, performance, and power
consumption which are evidences required by D-Case at the design and
test phases. In the DS-Bench/D-Cloud, a virtual machine is used to
simulate hardware faults. If a device is specified by the SpecC
hardware description language, a fault of the device can be simulated
with the virtual machine. The actual target machine is used for
testing a software bug related to timing, and is used for power down
and network failure which can be produced using the specific
equipment. A Cloud environment is provided to perform dependability
benchmarks in parallel for shorting the testing phase. We will
exhibit DS-Bench and D-Cloud environment, and demonstrate examples of
Dependability Benchmarks using DS-Bench and examples of software
testing scenarios using D-Cloud.
Dependable Scripting Language: Use Case of Evidence Management
Kimio Kuramitsu (Yokohama National University)
Abstract:
Recently, scripting languages have become an integral means to develop
application software, as well as to configure system operations. However
language supports for dependability issues have been largely ignored. We
address these issues by designing a new dependable scripting language, named
Konoha. Dependability issues supported in Konoha ranges from static type
safety to runtime error recovery. This demonstration will show the
implementation status of Konoha by using an evidence-based dependability
management scenario co-worked with the JST/CREST DEOS Project.
Formal Verification Tools for Systems Software
Toshiyuki Maeda, Motohiko Matsuda, Hajime Fujita
(University of Tokyo), Shin'ich Miura (University of Tsukuba),
and Yutaka Ishikawa (University of Tokyo)
Abstract:
We are developing formal program development approaches and tools for
detecting defects in systems software including operating system
kernels, thereby to contribute to achieving systems software
dependability. More specifically, we have been developing approaches
and tools for avoiding bugs in programs and supporting continuous
handling of unexpected system failures. In order to achieve the
objectives mentioned above, we have been researching and developing
two formal methods, model checking and type checking, for formal
verification on C programs which is frequently used for systems
software. Model checking verifies relatively complex safety
properties. This takes rather a long time. On the other hand, type
checking verifies relatively simple safety properties. This can be
done in a short time. We will report current status of our work by
presenting demonstrations.
Dependable Power-efficient File Server
Hajime Fujita and Yutaka Ishikawa (University of Tokyo)
Abstract:
We demonstrate a dependable and power-efficient WebDAV file server. This
file server consists of multiple server nodes to make improvements on
performance and availability. However, the server shows a single system
image to clients so that the clients can access to the server as if it
were a regular single file server.
Files written by clients are stored in multiple server nodes in order to
ensure that files are not lost even when a part of server nodes crashes
Several requests are distributed across multiple nodes to improve
overall throughput. The server has a single IP address accessible from
clients. This makes it possible for the server to add or remove nodes
transparently to clients, and therefore the number of active server
nodes can be adjusted dynamically depending on required performance, in
order to reduce unnecessary power consumption.
DMR mode of SmartCore system
Shimpei Sato, Shinya Takamaeda, and Kenji Kise
(Tokyo Institute of Technology)
Abstract:
The SmartCore system aims high dependability and high performance on
many-core processors. The unique point of this system is using on-chip
network routers. The Router of SmartCore system, called the
multi-function router, have various functions, such as copying
packets, in addition to routing packets. By these functions, SmartCore
system utilizes the redundant modules on a chip and achieves a high
dependability or high performance of many-core processors. In this
exhibit, we demonstrate a DMR mode of SmartCore system. To realize
this mode, we add three functions to the router: copying packets,
changing the destination of packets, and rendezvousing and comparing
two packets from different nodes. In this mode, two cores are coupled
to redundantly execute a thread, and the multi-function router detects
faults in packets from these cores. From the software simulation of
this system, we found that the overhead of redundant execution is
small. And, we verified the router detects faults in packets using
FPGAs.
Dependable Network-on-Chip Platform
Daihan Wang, Chammika Mannakkara, Vijay Holimath and Tomohiro Yoneda
(National Institute of Informatics)
Abstract:
In order to obtain large and complex VLSI systems using advanced
semiconductor process technologies, problems of how to increase
utilization of collected many cores and how to tolerate delay
variation due to process variation, delay faults caused during
operation, changes of environmental parameters, and so on should be
solved. We are trying to develop several core technologies to overcome
those problems and propose a design methodology to construct highly
dependable, adaptable, and efficient network-on-chip platform. In this
exhibit, we will demonstrate that some concrete automotive
applications are performed on our latest prototype NoC platform.
Yet Another Taint Mode for PHP
Hiroshi Toi, Ryota Shioya, Masahiro Goshima, and Shuichi Sakai
(University of Tokyo)
Abstract:
Now attacks by exploiting security vulnerabilities such as SQL
injection and cross-site scripting (XSS) are becoming
seriously. Dynamic Taint Propagation (DTP) has been proposed as a
promising platform for detecting a wide range of injection
attacks. The idea behind DTP is to tag data from untrusted sources as
tainted, dynamically propagate tainted information from sources to
destinations operations and check whether the tainted data is an
attack or not. Though DTPs are considered to have potential to root
out script injection attacks, current systems still suffer from table
reference trade-off between false positives and negatives. Therefore,
we proposed String- Wise Information Flow Tracking (SWIFT), which
provided a better accuracy on detecting script injection attacks. This
year, we started to implement SWIFT on PHP. In our live demonstration,
we plan to show that tainted information is correctly propagated
through real-world PHP web applications with known vulnerabilities and
original PHP programs.
Dependable Responsive Processor for Distributed Real-Time Systems
Kazutoshi Suito (Keio University)
Abstract:
We have been researching and developing a generic technology to
realize a dependable and practical VLSI system for distributed
real-time systems such as a humanoid robot by co-designing SoC
(System-on-Chip) and SiP (System-in-Package). Distributed real-time
systems have been becoming more popular and important in recent
years. The key technologies of the real-time systems are real-time
inter-node communications, a real-time processing architecture,
real-time operating systems, and the dependability for them. To
realize practical dependable distributed real-time systems, we have
been designing and implementing a Dependable Responsive Multi-Threaded
Processor (D-RMTP). The D-RMTP is a system-on-a-chip (SoC) that
integrates a real-time processing core (RMT Processing Unit (RMT PU)),
Responsive Link (ISO/IEC 24740:2008) for a real-time inter-node
communication, and various I/O peripherals including SpaceWire,
IEEE1394, PCI-X, Ethernet, PWM generators, SPI for ADCs/DACs, etc.
The RMT PU executes eight prioritized threads simultaneously by using
a prioritized SMT architecture. An IPC control scheme and a tracing
mechanism are also designed and implemented on D-RMTP to improve the
dependability. Responsive Link provides a dependable real-time
inter-node communication, so that Responsive Link has the
priority-based packet-overtaking function at each node and a robust
error correction function. We will demonstrate a real-time
processing, a real-time communication, and the dependability for them
using the D-RMTP.