Zbigniew T. Kalbarczyk

Orcid: 0009-0002-6040-6865

Affiliations:
  • University of Illinois at Urbana-Champaign, Coordinated Science Laboratory


According to our database1, Zbigniew T. Kalbarczyk authored at least 241 papers between 1994 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Security Testbed for Preempting Attacks against Supercomputing Infrastructure.
CoRR, 2024

One Queue Is All You Need: Resolving Head-of-Line Blocking in Large Language Model Serving.
CoRR, 2024

Efficient Interactive LLM Serving with Proxy Model-based Sequence Length Prediction.
CoRR, 2024

Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training.
CoRR, 2024

Õ(T<sup>-1</sup>) Convergence to (Coarse) Correlated Equilibria in Full-Information General-Sum Markov Games.
CoRR, 2024

True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations Center.
Proceedings of the 33rd USENIX Security Symposium, 2024

Power-aware Deep Learning Model Serving with μ-Serve.
Proceedings of the 2024 USENIX Annual Technical Conference, 2024

High-fidelity Intrusion Detection Datasets for Smart Grid Cybersecurity Research.
Proceedings of the IEEE International Conference on Communications, 2024

FLASH: Fast Model Adaptation in ML-Centric Cloud Platforms.
Proceedings of the Seventh Annual Conference on Machine Learning and Systems, 2024

$\widetilde{O}(T^{-1})$ {C}onvergence to (coarse) correlated equilibria in full-information general-sum markov games.
Proceedings of the 6th Annual Learning for Dynamics & Control Conference, 2024

When Green Computing Meets Performance and Resilience SLOs.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

Mutiny! How Does Kubernetes Fail, and What Can We Do About It?
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

Queue Management for SLO-Oriented Large Language Model Serving.
Proceedings of the 2024 ACM Symposium on Cloud Computing, 2024

On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Message Authentication and Provenance Verification for Industrial Control Systems.
ACM Trans. Cyber Phys. Syst., October, 2023

CyberSAGE: The cyber security argument graph evaluation tool.
Empir. Softw. Eng., 2023

AWARE: Automate Workload Autoscaling with Reinforcement Learning in Production Cloud Systems.
Proceedings of the 2023 USENIX Annual Technical Conference, 2023

Taxonomy of Fingerprinting Techniques for Evaluation of Smart Grid Honeypot Realism.
Proceedings of the IEEE International Conference on Communications, 2023

Multi-Agent Meta-Reinforcement Learning: Sharper Convergence Rates with Task Similarity.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Effects of Learning-Based Action-Space Attacks on Autonomous Driving Agents.
Proceedings of the ACM/IEEE 14th International Conference on Cyber-Physical Systems, 2023

Susceptibility of Autonomous Driving Agents to Learning-Based Action-Space Attacks.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

stealthML: Data-driven Malware for Stealthy Data Exfiltration.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
LoMoS: Less-Online/More-Offline Signatures for Extremely Time-Critical Systems.
IEEE Trans. Smart Grid, 2022

Watch Out for the Safety-Threatening Actors: Proactively Mitigating Safety Hazards.
CoRR, 2022

A Mean-Field Game Approach to Cloud Resource Management with Function Approximation.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Evaluating Hardware Memory Disaggregation under Delay and Contention.
Proceedings of the IEEE International Parallel and Distributed Processing Symposium, 2022

Reinforcement learning for resource management in multi-tenant serverless platforms.
Proceedings of the EuroMLSys '22: Proceedings of the 2nd European Workshop on Machine Learning and Systems, Rennes, France, April 5, 2022

Exploiting Temporal Data Diversity for Detecting Safety-critical Faults in AV Compute Systems.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

GateKeeper: Operator-centric Trusted App Management Framework on ARM TrustZone.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

SIMPPO: a scalable and incremental online learning framework for serverless resource management.
Proceedings of the 13th Symposium on Cloud Computing, SoCC 2022, 2022

2021
Watch out for the risky actors: Assessing risk in dynamic environments for safe driving.
CoRR, 2021

SLO beyond the Hardware Isolation Limits.
CoRR, 2021

Is Function-as-a-Service a Good Fit for Latency-Critical Services?
Proceedings of the WoSC '21: Proceedings of the Seventh International Workshop on Serverless Computing (WoSC7) 2021, 2021

Delay sensitivity-driven congestion mitigation for HPC systems.
Proceedings of the ICS '21: 2021 International Conference on Supercomputing, 2021

BayesPerf: minimizing performance monitoring errors using Bayesian statistics.
Proceedings of the ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021

2020
Data Integrity Threats and Countermeasures in Railway Spot Transmission Systems.
ACM Trans. Cyber Phys. Syst., 2020

Assessing and Mitigating Impact of Time Delay Attack: Case Studies for Power Grid Controls.
IEEE J. Sel. Areas Commun., 2020

Application-aware Congestion Mitigation forHigh-Performance Computing Systems.
CoRR, 2020

ML-driven Malware that Targets AV Safety.
CoRR, 2020

Challenges and Opportunities in the Detection of Safety-Critical Cyberphysical Attacks.
Computer, 2020

Live forensics for HPC systems: a case study on distributed storage systems.
Proceedings of the International Conference for High Performance Computing, 2020

FIRM: An Intelligent Fine-grained Resource Management Framework for SLO-Oriented Microservices.
Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, 2020

Measuring Congestion in High-Performance Datacenter Interconnects.
Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, 2020

AV-FUZZER: Finding Safety Violations in Autonomous Driving Systems.
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020

Inductive-bias-driven Reinforcement Learning For Efficient Schedules in Heterogeneous Clusters.
Proceedings of the 37th International Conference on Machine Learning, 2020

ML-Driven Malware that Targets AV Safety.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Identifying Failing Point Machines from Sensor-Free Train System Logs.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Machine learning for load balancing in the Linux kernel.
Proceedings of the APSys '20: 11th ACM SIGOPS Asia-Pacific Workshop on Systems, 2020

2019
RAINCOAT: Randomization of Network Communication in Power Grid Cyber Infrastructure to Mislead Attackers.
IEEE Trans. Smart Grid, 2019

ASAP: Accelerated Short-Read Alignment on Programmable Hardware.
IEEE Trans. Computers, 2019

Live Forensics for Distributed Storage Systems.
CoRR, 2019

Kayotee: A Fault Injection-based System to Assess the Safety and Reliability of Autonomous Vehicles to Faults and Errors.
CoRR, 2019

Understanding Fault Scenarios and Impacts through Fault Injection Experiments in Cielo.
CoRR, 2019

F-Pro: a Fast and Flexible Provenance-Aware Message Authentication Scheme for Smart Grid.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Smart Malware that Uses Leaked Control Data of Robotic Applications: The Case of Raven-II Surgical Robots.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

CAUDIT: Continuous Auditing of SSH Servers To Mitigate Brute-Force Attacks.
Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation, 2019

Assessing and mitigating impact of time delay attack: a case study for power grid frequency control.
Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, 2019

Availability attacks on computing systems through alteration of environmental control: smart malware approach.
Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, 2019

TRACTION: an infrastructure for trusted alert sharing and collaborative mitigation.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

A Study of Network Congestion in Two Supercomputing High-Speed Interconnects.
Proceedings of the 2019 IEEE Symposium on High-Performance Interconnects, 2019

ML-Based Fault Injection for Autonomous Vehicles: A Case for Bayesian Fault Injection.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Towards a Bayesian Approach for Assessing Fault Tolerance of Deep Neural Networks.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

AcMC <sup>2 </sup>: Accelerating Markov Chain Monte Carlo Algorithms for Probabilistic Models.
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019

2018
Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids.
IEEE Trans. Smart Grid, 2018

Self-Healing Attack-Resilient PMU Network for Power System Operation.
IEEE Trans. Smart Grid, 2018

Resiliency of HPC Interconnects: A Case Study of Interconnect Failures and Recovery in Blue Waters.
IEEE Trans. Dependable Secur. Comput., 2018

Impact of Malicious SCADA Commands on Power Grids' Dynamic Responses.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Indirect cyber attacks by perturbation of environment control: a data driven attack model: poster.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

AVFI: Fault Injection for Autonomous Vehicles.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

Hands Off the Wheel in Autonomous Vehicles?: A Systems Perspective on over a Million Miles of Field Data.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Characterizing Supercomputer Traffic Networks Through Link-Level Analysis.
Proceedings of the IEEE International Conference on Cluster Computing, 2018

A ML-based Runtime System for Executing Dataflow Graphs on Heterogeneous Processors.
Proceedings of the ACM Symposium on Cloud Computing, 2018

2017
Analysis and Diagnosis of SLA Violations in a Production SaaS Cloud.
IEEE Trans. Reliab., 2017

Failure Diagnosis for Distributed Systems Using Targeted Fault Injection.
IEEE Trans. Parallel Distributed Syst., 2017

Modeling and Mitigating Impact of False Data Injection Attacks on Automatic Generation Control.
IEEE Trans. Inf. Forensics Secur., 2017

Using OS Design Patterns to Provide Reliability and Security as-a-Service for VM-based Clouds.
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017

Reconciling Systems-Theoretic and Component-Centric Methods for Safety and Security Co-analysis.
Proceedings of the Computer Safety, Reliability, and Security, 2017

Systems-Theoretic Likelihood and Severity Analysis for Safety and Security Co-engineering.
Proceedings of the Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification, 2017

On Train Automatic Stop Control Using Balises: Attacks and a Software-Only Countermeasure.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Attack Induced Common-Mode Failures on PLC-Based Safety System in a Nuclear Power Plant: Practical Experience Report.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Inter-ictal Seizure Onset Zone localization using unsupervised clustering and Bayesian Filtering.
Proceedings of the 8th International IEEE/EMBS Conference on Neural Engineering, 2017

Trustworthy Services Built on Event-Based Probing for Layered Defense.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017

On accelerating pair-HMM computations in programmable hardware.
Proceedings of the 27th International Conference on Field Programmable Logic and Applications, 2017

ASAP: Accelerated Short Read Alignment on Programmable Hardware (Abstract Only).
Proceedings of the 2017 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2017

Prediction of adenocarcinoma development using game theory.
Proceedings of the 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2017

Smart Maintenance via Dynamic Fault Tree Analysis: A Case Study on Singapore MRT System.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Enhancing Anomaly Diagnosis of Automatic Train Supervision System Based on Operation Log.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

Holistic Measurement-Driven System Assessment.
Proceedings of the 2017 IEEE International Conference on Cluster Computing, 2017

2016
A Data-Driven Approach to Soil Moisture Collection and Prediction.
Proceedings of the 2016 IEEE International Conference on Smart Computing, 2016

A hardware-in-the-loop simulator for safety training in robotic surgery.
Proceedings of the 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2016

Multi-agent System for Detecting False Data Injection Attacks Against the Power Grid.
Proceedings of the 2nd Annual Industrial Control System Security Workshop, 2016

Optimal False Data Injection Attack against Automatic Generation Control in Power Grids.
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016

Efficient and Scalable Workflows for Genomic Analyses.
Proceedings of the ACM International Workshop on Data-Intensive Distributed Computing, 2016

Safety-critical cyber-physical attacks: analysis, detection, and mitigation.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016

A framework for generation, replay, and analysis of real-world attack variants.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016

Game Theory with Learning for Cyber Security Monitoring.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

Targeted Attacks on Teleoperated Surgical Robots: Dynamic Model-Based Detection and Mitigation.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

The Right Tool for the Job: A Case for Common Input Scenarios for Security Assessment.
Proceedings of the Graphical Models for Security - Third International Workshop, 2016

Attacking supercomputers through targeted alteration of environmental control: A data driven case study.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

A Simulation Study on Smart Grid Resilience under Software-Defined Networking Controller Failures.
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016

Unsupervised single-cell analysis in triple-negative breast cancer: A case study.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

Towards longitudinal analysis of a population's electronic health records using factor graphs.
Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, 2016

2015
Integrity Attacks on Real-Time Pricing in Electric Power Grids.
ACM Trans. Inf. Syst. Secur., 2015

VM-μCheckpoint: Design, Modeling, and Assessment of Lightweight In-Memory VM Checkpointing.
IEEE Trans. Dependable Secur. Comput., 2015

Performance Comparison and Tuning of Virtual Machines For Sequence Alignment Software.
Scalable Comput. Pract. Exp., 2015

Adverse Events in Robotic Surgery: A Retrospective Study of 14 Years of FDA Data.
CoRR, 2015

Systems-theoretic Safety Assessment of Robotic Telesurgical Systems.
CoRR, 2015

Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

Systems-Theoretic Safety Assessment of Robotic Telesurgical Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2015

Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure Scenarios.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

A fault-tolerant hardware architecture for robust wearable heart rate monitoring.
Proceedings of the 9th International Conference on Pervasive Computing Technologies for Healthcare, 2015

LogDiver: A Tool for Measuring Resilience of Extreme-Scale Systems and Applications.
Proceedings of the 5th Workshop on Fault Tolerance for HPC at eXtreme Scale, 2015

Towards an unified security testbed and security analytics framework.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

Preemptive intrusion detection: theoretical framework and real-world measurements.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

Dynamic VM Dependability Monitoring Using Hypervisor Probes.
Proceedings of the 11th European Dependable Computing Conference, 2015

Measuring and Understanding Extreme-Scale Application Resilience: A Field Study of 5, 000, 000 HPC Application Runs.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

Software-Defined Networking for Smart Grid Resilience: Opportunities and Challenges.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015

2014
Building Reliable and Secure Virtual Machines Using Architectural Invariants.
IEEE Secur. Priv., 2014

An evaluation of zookeeper for high availability in system S.
Proceedings of the ACM/SPEC International Conference on Performance Engineering, 2014

Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids (Poster).
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

CyberSAGE: A Tool for Automatic Security Assessment of Cyber-Physical Systems.
Proceedings of the Quantitative Evaluation of Systems - 11th International Conference, 2014

Automatic Generation of Security Argument Graphs.
Proceedings of the 20th IEEE Pacific Rim International Symposium on Dependable Computing, 2014

Analysis and Diagnosis of SLA Violations in a Production SaaS Cloud.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering, 2014

IICPS 2014 workshop keynote: Computing through failures and cyber attacks: Case for resilient smart power grid.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Characterization of operational failures from a business data processing SaaS platform.
Proceedings of the 36th International Conference on Software Engineering, 2014

Personalized password guessing: a new security threat.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Preemptive intrusion detection.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural Invariants.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Lessons Learned from the Analysis of System Failures at Petascale: The Case of Blue Waters.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

AHEMS: Asynchronous Hardware-Enforced Memory Safety.
Proceedings of the 17th Euromicro Conference on Digital System Design, 2014

A Performance Evaluation of Sequence Alignment Software in Virtualized Environments.
Proceedings of the 14th IEEE/ACM International Symposium on Cluster, 2014

Automated Classification of Computer-Based Medical Device Recalls: An Application of Natural Language Processing and Statistical Learning.
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014

Knowledge Discovery from Big Data for Intrusion Detection Using LDA.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014

2013
SymPLFIED: Symbolic Program-Level Fault Injection and Error Detection Framework.
IEEE Trans. Computers, 2013

Analysis of Safety-Critical Computer Failures in Medical Devices.
IEEE Secur. Priv., 2013

Go with the flow: toward workflow-oriented security assessment.
Proceedings of the New Security Paradigms Workshop, 2013

Pluggable Watchdog: Transparent Failure Detection for MPI Programs.
Proceedings of the 27th IEEE International Symposium on Parallel and Distributed Processing, 2013

A Simulation Framework to Evaluate Virtual CPU Scheduling Algorithms.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Reliability analysis reloaded: how will we survive?
Proceedings of the Design, Automation and Test in Europe, 2013

Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol.
Proceedings of the Cyber Security and Information Intelligence, 2013

Impact of integrity attacks on real-time pricing in smart grids.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Semantic security analysis of SCADA networks to detect malicious control commands in power grids.
Proceedings of the SEGS'13, 2013

2012
Nanocomputing: Small Devices, Large Dependability Challenges.
IEEE Secur. Priv., 2012

Characterization of the error resiliency of power grid substation devices.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Toward a high availability cloud: Techniques and challenges.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

Towards resiliency in embedded medical monitoring devices.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

2011
Automated Derivation of Application-Specific Error Detectors Using Dynamic Analysis.
IEEE Trans. Dependable Secur. Comput., 2011

Automated Derivation of Application-Aware Error Detectors Using Static Analysis: The Trusted Illiac Approach.
IEEE Trans. Dependable Secur. Comput., 2011

Identifying Compromised Users in Shared Computing Infrastructures: A Data-Driven Bayesian Network Approach.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 2011

Hauberk: Lightweight Silent Data Corruption Error Detector for GPGPU.
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011

An embedded reconfigurable architecture for patient-specific multi-paramater medical monitoring.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011

Managing business health in the presence of malicious attacks.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011

Analysis of security data from a large computing organization.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

CloudVal: A framework for validation of virtualization environment in cloud infrastructure.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

Improving Log-based Field Failure Data Analysis of multi-node computing systems.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

Modeling stream processing applications for dependability evaluation.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

2010
Fault Injection.
Proceedings of the Encyclopedia of Software Engineering, 2010

Analysis of Credential Stealing Attacks in an Open Networked Environment.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Checkpointing virtual machines against transient errors.
Proceedings of the 16th IEEE International On-Line Testing Symposium (IOLTS 2010), 2010

Measurement-based analysis of fault and error sensitivities of dynamic memory.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

A Soldier Health Monitoring System for Military Applications.
Proceedings of the International Conference on Body Sensor Networks, 2010

2009
Discovering Application-Level Insider Attacks Using Symbolic Execution.
Proceedings of the Emerging Challenges for Security, 2009

Quantitative Analysis of Long-Latency Failures in System Software.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Pervasive embedded real time monitoring of EEG & SpO2.
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009

Pervasive embedded systems for detection of traumatic brain injury.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

Second workshop on Compiler and Architectural Techniques for Application Reliability and Security (CATARS).
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Effectiveness of machine checks for error diagnostics.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

An end-to-end approach for the automatic derivation of application-aware error detectors.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach.
Proceedings of the Insider Attack and Cyber Security - Beyond the Hacker, 2008

Formalizing System Behavior for Evaluating a System Hang Detector.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008

Error Behavior Comparison of Multiple Computing Systems: A Case Study Using Linux on Pentium, Solaris on SPARC, and AIX on POWER.
Proceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008

Workshop on compiler and architectural techniques for application reliability and security (CATARS).
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2007
Reliability MicroKernel: Providing Application-Aware Reliability in the OS.
IEEE Trans. Reliab., 2007

Inner-Circle Consistency for Wireless Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2007

Toward Application-Aware Security and Reliability.
IEEE Secur. Priv., 2007

Automated Derivation of Application-aware Error Detectors using Static Analysis.
Proceedings of the 13th IEEE International On-Line Testing Symposium (IOLTS 2007), 2007

How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
Active Replication of Multithreaded Applications.
IEEE Trans. Parallel Distributed Syst., 2006

Security Vulnerabilities: From Analysis to Detection and Masking Techniques.
Proc. IEEE, 2006

An OS-level Framework for Providing Application-Aware Reliability.
Proceedings of the 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 2006

Dynamic Derivation of Application-Specific Error Detectors and their Implementation in Hardware.
Proceedings of the Sixth European Dependable Computing Conference, 2006

Measurement-Based Analysis: A Key to Experimental Research in Dependability.
Proceedings of the Sixth European Dependable Computing Conference, 2006

An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

Workshop on Applied Software Reliability (WASR).
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

2005
RTES demo system2004.
SIGBED Rev., 2005

An Experimental Study of Soft Errors in Microprocessors.
IEEE Micro, 2005

Recent Advances and New Avenues in Hardware-Level Reliability Support.
IEEE Micro, 2005

Application Fault Tolerance with Armor Middleware.
IEEE Internet Comput., 2005

Application-Based Metrics for Strategic Placement of Detectors.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

Assessing the Crash-Failure Assumption of Group Communication Protocols.
Proceedings of the 16th International Symposium on Software Reliability Engineering (ISSRE 2005), 2005

A Compiler-Enabled Model- and Measurement-Driven Adaptation Environment for Dependability and Performance.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

An Architectural Framework for Detecting Process Hangs/Crashes.
Proceedings of the Dependable Computing, 2005

Modeling Coordinated Checkpointing for Large-Scale Supercomputers.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

Microprocessor Sensitivity to Failures: Control vs Execution and Combinational vs Sequential Logic.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

Defeating Memory Corruption Attacks via Pointer Taintedness Detection.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

Neutralization of Errors and Attacks in Wireless Ad Hoc Networks.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

2004
The Effects of an ARMOR-Based SIFT Environment on the Performance and Dependability of User Applications.
IEEE Trans. Software Eng., 2004

Reflections on Industry Trends and Experimental Research in Dependability.
IEEE Trans. Dependable Secur. Comput., 2004

Dependable Systems and Networks-Performance and Dependability Symposium (DSN-PDS) 2002: Selected Papers.
Perform. Evaluation, 2004

Modeling and evaluating the security threats of transient errors in firewall software.
Perform. Evaluation, 2004

Hardware Support for High Performance, Intrusion- and Fault-Tolerant Systems.
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004

Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics.
Proceedings of the Security and Protection in Information Processing Systems, 2004

The evolution of dependable computing at the University of Illinois.
Proceedings of the Building the Information Society, 2004

Checkpointing of Control Structures in Main Memory Database Systems.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

An Architectural Framework for Providing Reliability and Security Support.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

Error Sensitivity of the Linux Kernel Executing on PowerPC G4 and Pentium 4 Processors.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

2003
A system model for dynamically reconfigurable software.
IBM Syst. J., 2003

Security Vulnerabilities - From Data Analysis to Protection Mechanisms.
Proceedings of the 9th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS Fall 2003), 2003

Transparent Runtime Randomization for Security.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

Group Communication Protocols under Errors.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

Error-Injection-Based Failure Characterization of the IEEE 1394 Bus.
Proceedings of the 9th IEEE International On-Line Testing Symposium (IOLTS 2003), 2003

A Foundation for Adaptive Fault Tolerance in Software.
Proceedings of the 10th IEEE International Conference on Engineering of Computer-Based Systems (ECBS 2003), 2003

Characterization of Linux Kernel Behavior under Errors.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

A Preemptive Deterministic Scheduling Algorithm for Multithreaded Replicas.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

2002
Loose Synchronization of Multithreaded Replicas.
Proceedings of the 21st Symposium on Reliable Distributed Systems (SRDS 2002), 2002

Measurement-Based Analysis of System Dependability Using Fault Injection and Field Failure Data.
Proceedings of the Performance Evaluation of Complex Systems: Techniques and Tools, 2002

NFTAPE: Networked Fault Tolerance and Performance Evaluator.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

Joint Panel - IPDS and Workshop on Dependability Benchmarking.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

An Adaptive Architecture for Monitoring and Failure Analysis of High-Speed Networks.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
Comparing Fail-Sailence Provided by Process Duplication versus Internal Error Detection for DHCP Server.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

An Experimental Study of Security Vulnerabilities Caused by Errors.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

A Framework for Database Audit and Control Flow Checking for a Wireless Telephone Network Controller.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

2000
Hierarchical Error Detection in a Software Implemented Fault Tolerance (SIFT) Environment.
IEEE Trans. Knowl. Data Eng., 2000

Micro-Checkpointing: Checkpointing for Multithreaded Applications.
Proceedings of the 6th IEEE International On-Line Testing Workshop (IOLTW 2000), 2000

Measurement-based Analysis of Networked System Availability.
Proceedings of the Performance Evaluation: Origins and Directions, 2000

1999
Hierarchical Simulation Approach to Accurate Fault Modeling for System Dependability Evaluation.
IEEE Trans. Software Eng., 1999

Chameleon: A Software Infrastructure for Adaptive Fault Tolerance.
IEEE Trans. Parallel Distributed Syst., 1999

Stress-Based and Path-Based Fault Injection.
IEEE Trans. Computers, 1999

An Approach to Evaluating the Effects of Realistic Faults in Digital Circuits.
Proceedings of the 12th International Conference on VLSI Design (VLSI Design 1999), 1999

A Software Multilevel Fault Injection Mechanism: Case Study Evaluating the Virtual Interface Architecture.
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999

Failure Data Analysis of a LAN of Windows NT based Computers.
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999

Networked Windows NT System Field Failure Data Analysis.
Proceedings of the 1999 Pacific Rim International Symposium on Dependable Computing (PRDC 1999), 1999

1998
A Speculation-based Approach for Performance and Dependability Analysis: A Case Study.
Proceedings of the 30th conference on Winter simulation, 1998

Dependability Analysis of a Cache-Based RAID System via Fast Distributed Simulation.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

The Chameleon Infrastructure for Adaptive, Software Implemented Fault Tolerance.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

A Flexible Software Architecture for High Availability Computing.
Proceedings of the 3rd IEEE International Symposium on High-Assurance Systems Engineering (HASE '98), 1998

A Hierarchical Approach for Dependability Analysis of a Commercial Cache-Based RAID Storage Architecture.
Proceedings of the Digest of Papers: FTCS-28, 1998

1997
Chameleon: Adaptive Fault Tolerance Using Reliable, Mobile Agents.
Proceedings of the Sixteenth Symposium on Reliable Distributed Systems, 1997

1995
An Attempt to Evaluate Functional Diversity Employed in a Reactor Protection System.
Proceedings of the 14th International Conference on Computer Safety, 1995

1994
Dependable flight control system by data diversity and self-checking components.
Microprocess. Microprogramming, 1994


  Loading...