


default search action
24th PRDC 2019: Kyoto, Japan
- 24th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2019, Kyoto, Japan, December 1-3, 2019. IEEE 2019, ISBN 978-1-7281-4961-5
Session 1A: Security I
- Thomas Rosenstatter
, Christian Sandberg, Tomas Olovsson:
Extending AUTOSAR's Counter-Based Solution for Freshness of Authenticated Messages in Vehicles. 1-10 - Huichen Lin, Dong Seong Kim
, Neil W. Bergmann:
SAGA: Secure Auto-Configurable Gateway Architecture for Smart Home. 11-20
Session 1B: Fast Abstracts I
- Shinji Inoue, Takaji Fujiwara, Shigeru Yamada:
Estimation of Target Failure Measures for E/E/PE Safety-Related Software. 21-22 - Toshinori Sato, Tomoaki Ukezono:
Evaluation on Configurable Approximate Circuit for Aging-Induced Timing Violation Tolerance. 23-24 - David William Honorio Araujo da Silva
, Carlos Paz de Araujo, C. Edward Chow:
Fully Homomorphic Key Update and Key Exchange Over Exterior Product Spaces For Cloud Computing Applications. 25-26 - Chien-Fu Cheng, Chu-Chiao Hsu:
A Fault-Tolerant Consensus Protocol for Software-Defined Networks. 27-28 - Tomohiko Takagi, Ryo Kurozumi, Tetsuro Katayama:
State Transition Tuple Coverage Criterion for Extended Place/Transition Net-Based Testing. 29-30 - Shuhei Ota, Mitsuhiro Kimura:
Reliability Modeling of Coherent Systems with Dependent Components Due to Common Factors. 31-32
Session 2A: Cloud System
- Satoshi Konno, Xavier Défago
:
Approximate QoS Rule Derivation Based on Root Cause Analysis for Cloud Computing. 33-42 - Adriano Serckumecka
, Ibéria Medeiros
, Bernardo Ferreira
, Alysson Bessani
:
SLICER: Safe Long-Term Cloud Event Archival. 43-52
Session 2B: Fast Abstracts II
- Naoki Torii, Masato Kitakami:
A Method for Stable Block Generation Time in Proof of Work. 53-54 - Tao Wang, Jianhui Jiang, Zhen Wang:
Reliability Estimation of Approximate Circuits Based on Probabilistic Gate Model. 55-56 - Koichi Bando, Kenji Tanaka:
Attempt to Extract Similar Cases by Applying Multilayer Perceptron to a Failure Database. 57-58 - Toshiyuki Fujikura, Ryo Kurachi:
An Attack Scenario Generation Method Using the Behavior Model. 59-60 - Xuheng Duan, Haochen Pan, Lewis Tseng, Yingjian Wu:
BBB: Make Benchmarking Blockchains Configurable and Extensible. 61-62 - Xiao Cao:
Uniform Consensus Prone to Omission Failures with Fault Knowledge. 63-64
Session 3A: Software I
- Keita Suzuki, Takafumi Kubota, Kenji Kono:
Detecting and Analyzing Year 2038 Problem Bugs in User-Level Applications. 65-74 - Ulrich Thomas Gabor, Daniel Ferdinand Siegert, Olaf Spinczyk:
High-Accuracy Software Fault Injection in Source Code with Clang. 75-84
Session 3B: Fast Abstracts III
- Li Xin Tan, Jing Wei Shannen Wee, Jun Rong Chan, Wei Jie Soh, Chern Nam Yap:
Integrate Dragonfly Key Exchange (IETF - RFC 7664) into Arithmetic Circuit Homomorphic Encryption. 85-86 - Joon Kuy Han, Dennis Wong:
SNudge: A Slidebar Nudge for Users to Practice Better Habits For Mobile Fingerprint Authentication. 87-88 - Yutaro Yoshikawa, Masayuki Arai:
A Fine-Grained SDN Rule Table Partitioning and Distribution. 89-90 - Qian Wang, Jianhui Jiang, Long Li:
A Reliability Automatic Assessment Framework for Open Source Software. 91-92 - Xuze Xia, Wei Zhang
, Jianhui Jiang:
Ensemble Methods for Anomaly Detection Based on System Log. 93-94
Session 4A: Dependable Network
- Lewis Tseng, Zezhi Wang, Yajie Zhao:
Resilient Distributed Causal Memory in Client-Server Model. 95-104 - Kenta Hanada, Tatsuhiro Tsuchiya
, Yasumasa Fujisaki:
Satisfiability-Based Analysis of Cascading Failures in Systems of Interdependent Networks. 105-113
Session 4B: Fast Abstracts IV
- Xueling Zhang, Rocky Slavin
, Xiaoyin Wang, Jianwei Niu:
Privacy Assurance for Android Augmented Reality Apps. 114-115 - Mamoru Ohara:
A Study on Checkpointing for Distributed Applications Using Blockchain-Based Data Storage. 116-117 - Rodney Rodriguez, Xiaoyin Wang:
Static Analysis of File Manipulation Scripts. 118-119 - Jiahao Zhang, Junjun Zheng
, Hiroyuki Okamura, Tadashi Dohi:
Moment-Based Approximation for Uncertainty Propagation in Fault Trees. 120-121 - Muhammad Alfian Amrizal, Luis Guillen
, Takuo Suganuma:
An Analytical Approach for Optimizing Data Transfer Rate in a Faulty Wireless Sensor Network. 122-123
Session 5A: Dependable Hardware
- Stefan Holst, Shiling Shi, Xiaoqing Wen:
Targeted Partial-Shift For Mitigating Shift Switching Activity Hot-Spots During Scan Test. 124-129 - Yousuke Miyake
, Yasuo Sato, Seiji Kajihara:
On-Chip Delay Measurement for In-Field Test of FPGAs. 130-137 - Oskar Pusz, Daniel Kiechle, Christian Dietrich
, Daniel Lohmann:
Program-Structure-Guided Approximation of Large Fault Spaces. 138-147
Session 5B: Software II
- Xiao-Yi Zhang, Zheng Zheng:
A Visualization Analytical Framework for Software Fault Localization Metrics. 148-157 - Jiantao Zhang, Zheng Zheng, Beibei Yin, Kun Qiu, Yang Liu:
Testing Graph Searching Based Path Planning Algorithms by Metamorphic Testing. 158-167 - Elder Rodrigues Jr., Leonardo Montecchi
:
Towards a Structured Specification of Coding Conventions. 168-177
Session 6A: Security II
- Aliénor Damien, Michael Marcourt, Vincent Nicomette, Eric Alata, Mohamed Kaâniche:
Implementation of a Host-Based Intrusion Detection System for Avionic Applications. 178-187 - Pratyush Kr. Deka
, Monowar H. Bhuyan, Youki Kadobayashi, Erik Elmroth:
Adversarial Impact on Anomaly Detection in Cloud Datacenters. 188-197 - Szu-Chuang Li, Bo-Chen Tai, Yennun Huang
:
Evaluating Variational Autoencoder as a Private Data Release Mechanism for Tabular Data. 198-206
Session 6B: Distributed System
- Achour Mostéfaoui, Matthieu Perrin, Michel Raynal:
A New Insight into Local Coin-Based Randomized Consensus. 207-216 - Brahim Hamid
, Quentin Rouland
, Jason Jaskolka
:
Distributed Maintenance of a Spanning Tree of k-Connected Graphs. 217-226 - Sara Alhajaili, Arshad Jhumka:
Auditability: An Approach to Ease Debugging of Reliable Distributed Systems. 227-235
Session 7A: Machine Learning
- Koki Kato, Fuyuki Ishikawa:
Learning-Based Falsification for Model Families of Cyber-Physical Systems. 236-245 - Jusop Choi, Dongsoon Shin, Hyoungshick Kim, Jason Seotis, Jin B. Hong
:
AMVG: Adaptive Malware Variant Generation Framework Using Machine Learning. 246-255 - Mengmeng Ge, Xiping Fu, Naeem Firdous Syed
, Zubair A. Baig
, Gideon Teo, Antonio Robles-Kelly:
Deep Learning-Based Intrusion Detection for IoT Networks. 256-265
Session 7B: Reliability Modeling
- Shahid Khan
, Joost-Pieter Katoen, Matthias Volk
, Marc Bouissou
:
Synergizing Reliability Modeling Languages: BDMPs without Repairs and DFTs. 266-275 - Fumio Machida:
On the Diversity of Machine Learning Models for System Reliability. 276-285

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.