Publications

Complete Publications List

2016:

  1. H. Alemzadeh, D. Chen, X. Li, T. Kesavadas, Z. T. Kalbarczyk, R. K. Iyer, “Targeted Attacks on Teleoperated Surgical Robots: Dynamic Model-based Detection and Mitigation,” Proc. 46th IEEE/IFIP Int. Conf. on Dependable Systems and Networks (DSN), 2016. URL: http://ieeexplore.ieee.org/document/7579758/
  2. Tan Rui, Hoang Hai Nguyen, Eddy Foo, Xinshu Dong, David KY Yau, Zbigniew Kalbarczyk, Ravishankar K. Iyer, and Hoay Beng Gooi. “Optimal false data injection attack against automatic generation control in power grids.” In Proceedings of the 7th International Conference on Cyber-Physical Systems, p. 2. IEEE Press, 2016.
    URL: http://ieeexplore.ieee.org/document/7479109/?section=abstract
  3. Cao Phuong, Eric C. Badger, Zbigniew T. Kalbarczyk, and Ravishankar K. Iyer. “A framework for generation, replay, and analysis of real-world attack variants.” In Proceedings of the Symposium and Bootcamp on the Science of Security, pp. 28-37. ACM, 2016.
    URL: http://dl.acm.org/citation.cfm?id=2898392
  4. Lin Hui, Homa Alemzadeh, Daniel Chen, Zbigniew Kalbarczyk, and Ravishankar K. Iyer. “Safety-critical cyber-physical attacks: analysis, detection, and mitigation.” In Proceedings of the Symposium and Bootcamp on the Science of Security, pp. 82-89. ACM, 2016.
    URL: http://dl.acm.org/citation.cfm?id=2898391
  5. Saurabh Jha, Valerio Formicola, Catello Di Martino, Zbigniew Kalbarczyk, William Kramer, Ravishankar K. Iyer, “Analysis of Gemini Interconnect Recovery Mechanisms: Methods and Observations,” Cray User Group, London, United Kingdom, May 8–12, 2016.
    URL: https://cug.org/proceedings/cug2016_proceedings/includes/files/pap167.pdf
  6. Stephens Zachary D., Matthew E. Hudson, Liudmila S. Mainzer, Morgan Taschuk, Matthew R. Weber, and Ravishankar K. Iyer. “Simulating Next-Generation Sequencing Datasets from Empirical Mutation and Sequencing Models.” PloS one 11, no. 11 (2016): e0167047.
    URL: http://dx.doi.org/10.1371/journal.pone.0167047
  7. Hong, Zhihao, Z. Kalbarczyk, and R. K. Iyer. “A Data-Driven Approach to Soil Moisture Collection and Prediction.” In Smart Computing (SMARTCOMP), 2016 IEEE International Conference on, pp. 1-6. IEEE, 2016. URL: http://ieeexplore.ieee.org/document/7501673/
  8. Ghosh, Uttam, Xinshu Dong, Rui Tan, Zbigniew Kalbarczyk, David KY Yau, and Ravishankar K. Iyer. “A Simulation Study on Smart Grid Resilience under Software-Defined Networking Controller Failures.” In Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, pp. 52-58. ACM, 2016.
    URL: http://dl.acm.org/citation.cfm?id=2899020
  9. Banerjee Subho S., Arjun P. Athreya, Liudmila S. Mainzer, C. Victor Jongeneel, Wen-Mei Hwu, Zbigniew T. Kalbarczyk, and Ravishankar K. Iyer. “Efficient and Scalable Workflows for Genomic Analyses.” In Proceedings of the ACM International Workshop on Data-Intensive Distributed Computing, pp. 27-36. ACM, 2016.
    URL: http://dl.acm.org/citation.cfm?id=2912156
  10. Chung Keywhan, Valerio Formicola, Zbigniew Kalbarczyk, Ravishankar Iyer, “Attacking Supercomputers through Targeted Alteration of Environmental Control: A Data Driven Case Study”, The IEEE International Workshop on Cyber-Physical Systems Security (CPS-Sec), held in conjunction with IEEE Conference on Communications and Network Security, 17-19 October 2016, Philadelphia, PA USA, in press
  11. Li Xiao, Homa Alemzadeh, Daniel Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer, and Thenkurussi Kesavadas. “A hardware-in-the-loop simulator for safety training in robotic surgery.” In Intelligent Robots and Systems (IROS), 2016 IEEE/RSJ International Conference on, pp. 5291-5296. IEEE, 2016.
    URL: https://www.researchgate.net/publication/312241140_A_hardware-in-the-loop_simulator_for_safety_training_in_robotic_surgery
  12. Z. Estrada, R. Sprabery, L. Yan, Z. Yu, R. Campbell, Z. Kalbarczyk, R.K. Iyer, “Using OS Design Patterns to Provide Reliability and Security-as-a-Service for VM-based Clouds,” ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE2017), in press.

2015:

  1. Chung Keywhan, Charles A. Kamhoua, Kevin A. Kwiat, Zbigniew T. Kalbarczyk, and Ravishankar K. Iyer. “Game Theory with Learning for Cyber Security Monitoring.” In High Assurance Systems Engineering (HASE), 2016 IEEE 17th International Symposium on, pp. 1-8. IEEE, 2016.
    URL: http://ieeexplore.ieee.org/document/7423125/
  2. Alemzadeh Homa, Jaishankar Raman, Nancy Leveson, Zbigniew Kalbarczyk, and Ravishankar K. Iyer. “Adverse events in robotic surgery: a retrospective study of 14 years of FDA data.” PloS one 11, no. 4 (2016): e0151470. URL: https://arxiv.org/abs/1507.03518
  3. Alemzadeh Homa, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Thenkurussi Kesavadas, Stephan Small, and Jai Raman. “Simulation-based Training for Safety Incidents: Lessons from Analysis of Adverse Events in Robotic Surgical Systems.” In American College of Surgeons’ 8th Annual Meeting of the Consortium of ACS-accredited Education Institutes. 2015. URL:
    https://www.researchgate.net/publication/280157951_Simulation-based_Training_for_Safety_Incidents_Lessons_from_Analysis_of_Adverse_Events_in_Robotic_Surgical_Systems
  4. Zachary J. Estrada, Fei Deng, Zachary Stephens, Cuong Pham, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “Performance comparison of and tuning of virtual machines for sequence alignment software,” Scalable Computing: Practice and Experience, vol. 16, no. 1, pp. 71–84, 2015. URL: http://www.scpe.org/index.php/scpe/article/view/1061
  5. Long Wang, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Arun Iyengar, “VM-μCheckpoint: Design, modeling, and assessment of lightweight in-memory VM checkpointing,” IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 2, pp. 243–255, 2015. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6824750
  6. Xinshu Dong, Hui Lin, Rui Tan, Ravishankar K. Iyer, Zbigniew Kalbarczyk, “Software-defined networking for smart grid resilience: Opportunities and challenges,” Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, CPSS ’15, pp. 61–68, URL: http://publish.illinois.edu/resilient-grid/files/2015/02/SDN-position-CPSS15.pdf Coordinated Science Laboratory Technical Report, UILU-ENG-15-2203, University of Illinois at Urbana-Champaign, Feb. 2015.
  7. Homa Alemzadeh, Daniel Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Xiao Li, Thenkurussi Kesavadas, Jaishankar Raman, “A software framework for simulation of safety hazards in robotic surgical systems,” Medical Cyber Physical Systems Workshop 2015, Hosted at CPSWeek, 13 Apr. 2015. URL: http://sigbed.seas.upenn.edu/archives/2015-11/MedicalCPS_2015_submission_3.pdf
  8. Phuong Cao, Eric Badger, Zbigniew Kalbarczyk, Ravishankar Iyer, Adam Slagell, “Preemptive intrusion detection: Theoretical framework and real-world measurements,” Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015, art. no. 5, 21–22 Apr. 2015. URL: http://dl.acm.org/citation.cfm?id=2746199
  9. Phuong Cao, Eric C. Badger, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Alexander Withers, Adam J. Slagell, “Towards an unified security testbed and security analytics framework,” Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015, art. no. 24, 21–22 Apr. 2015. URL: http://dl.acm.org/citation.cfm?id=2746218
  10. Qingkun Li, Homa Alemzadeh, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “A fault-tolerant hardware architecture for robust wearable heart rate monitoring,” Proceedings of the 9th International Conference on Pervasive Computing Technologies for Healthcare, Pervasive Health 2015, 20–23 May 2015. URL: http://web.engr.illinois.edu/~alemzad1/papers/Pervasive_15.pdf
  11. Catello Di Martino, Saurabh Jha, William Kramer, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “LogDiver: A tool for measuring resilience of extreme-scale systems and applications,” Proceedings of the 5th Workshop on Fault Tolerance for HPC at eXtreme Scale, FTXS ’15, pp. 11–18, 15–19 June 2015. URL: http://dl.acm.org/citation.cfm?id=2751511
  12. Catello Di Martino, Zbigniew Kalbarczyk, William Kramer, Ravishankar Iyer, “Measuring and understanding extreme-scale resilience: A field study of 5,000,000 HPC application runs,” Proceedings of the 45th IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015, pp. 25–36, 22–25 June 2015. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7266835 ***Chosen as one of top three papers***
  13. Zachary D. Stephens, Skylar Y. Lee, Faraz Faghri, Roy H. Campbell, Chengxiang Zhai, Miles J. Efron, Ravishankar Iyer, Michael C. Schatz, Saurabh Sinha, Gene E. Robinson, “Big data: Astronomical or genomical?” PLOS Biology, 13(7):e1002195, 7 July 2015. URL: http://journals.plos.org/plosbiology/article?id=10.1371/journal.pbio.1002195
  14. Jacob Abraham, Ravishankar Iyer, Dimitris Gizopoulos, Dan Alexandrescu, Yervant Zorian, “The future of fault tolerant computing,” 2015 IEEE 21st International On-Line Testing Symposium, pp. 108–109, 6–8 July 2015. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7229841
  15. Gary Wang, Zachary J. Estrada, Cuong Pham, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “Hypervisor introspection: A technique for evading passive virtual machine monitoring,” 9th USENIX Workshop on Offensive Technologies, WOOT ’15, 10–11 Aug. 2015. URL: https://www.usenix.org/conference/woot15/workshop-program/presentation/wang
  16. Zachary J. Estrada, Cuong Pham, Fei Deng, Lok Yan, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “Dynamic VM dependability monitoring using hypervisor probes,” 2015 11th European Dependable Computing Conference (EDCC), pp. 61–72, 7–11 Sep. 2015. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7371955
  17. Homa Alemzadeh, Daniel Chen, Andrew Lewis, Zbigniew Kalbarczyk, Jaishankar Raman, Nancy Leveson, Ravishankar Iyer, “Systems-theoretic safety assessment of robotic telesurgical systems,” Proceedings of the 34th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2015, pp. 213–227, 22–25 Sep. 2015. URL: http://link.springer.com/chapter/10.1007%2F978-3-319-24255-2_16
  18. Varun Badrinath Krishna, Ravishankar K. Iyer, William H. Sanders, “ARIMA-based modeling and validation of consumption readings in power grids,” Proceedings of the 10th International Conference on Critical Information Infrastructures Security, CRITIS 2015, 5–7 Oct. 2015. ***CIPRNet Young CRITIS Award***

 

2014:

  1. Zachary J. Estrada, Zachary Stephens, Cuong Pham, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “A performance evaluation of sequence alignment software in virtualized environments,” 1st International Workshop on Cloud for Bio (C4Bio), in conjunction with the 2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing,  pp. 730–737, 26–29 May 2014. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6846525
  2. Homa Alemzadeh, Raymond Hoagland, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “Automated classification of computer-based medical device recalls: An application of natural language processing and statistical learning,” 2014 IEEE 27th International Symposium on Computer-Based Medical Systems (CBMS), pp. 553–554, 27–29 May 2014. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6881970
  3. Catello Di Martino, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Geetika Goel, Santonu Sarkar, Rajeshwari Ganesan, “Characterization of operational failures from a business data processing SaaS platform,” Companion Proceedings of the 36th International Conference on Software Engineering, ICSE 2014, Hyderabad, India, pp. 195–204, 31 May–7 June 2014.
  4. Catello Di Martino, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Fabio Baccanico, Joseph Fullop, William Kramer, “Lessons learned from the failure analysis of a petascale system: The case of Blue Waters,” Proceedings of the 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2014, Atlanta, GA, USA, pp. 610–621, 23–26 June 2014. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6903615
  5. Cuong Pham, Zachary Estrada, Phuong Cao, Zbigniew Kalbarczyk, Ravishankar Iyer, “Reliability and security monitoring of virtual machines using hardware architectural invariants,” Proceedings of the 2014 44th Annual IEEE/FPIP International Conference on Dependable Systems and Networks, DSN 2014, pp. 13–24, 23–26 June 2014. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6903563 ***Best Paper Award and William C. Carter Award***
  6. Gary Wang, Zachary Estrada, Cuong Pham, Zbigniew Kalbarczyk, Ravishankar Iyer, “Hypervisor introspection: Exploiting timing side-channels against VM monitoring,” 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2014, Fast Abstract, 23–26 June 2014. URL: http://assured-cloud-computing.illinois.edu/files/2015/08/Hypervisor-Introspection-Exploiting-Timing-Side-channels-against-VM-Monitoring.pdf
  7. R. Ramamurthy, Z. Estrada, C. Pham, Z. Kalbarczyk, R. Iyer, “Designing a performance isolation benchmark for virtualized systems,” 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2014, Fast Abstract, 23–26 June 2014.
  8. Kuan-Yu Tseng, Dao Lu, Zbigniew Kalbarczyk, Ravishankar Iyer, “AHEMS: Asynchronous Hardware-Enforced Memory Safety,” 2014 17th Euromicro Conference on Digital System Design (DSD), pp. 183–190, 27–29 Aug. 2014. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6927243
  9. Cuong Pham, Zachary J. Estrada, Phuong Cao, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “Building reliable and secure virtual machines using architectural invariants,” IEEE Security & Privacy, vol. 12, no. 5, pp. 82–85, Sep–Oct. 2014. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6924639
  10. Cuong M. Pham, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Victor Dogaru, Rohit Wagle, Chitra Venkatramani, “An evaluation of ZooKeeper for high availability in system S,” Proceedings of the 5th ACM/SPEC International Conference on Performance Engineering, ICPE 14, pp. 209–217, 2014. URL: http://assured-cloud-computing.illinois.edu/files/2015/08/An-Evaluation-of-ZooKeeper-for-High-Availability-in-System-S.pdf

 

2013:

  1. S. Y. Lee, B. J. Fischman, S. S. Lumetta, Z. Kalbarczyk, R. Iyer, “Analysis of the Impact of Sequencing Errors on BLAST Using Fault Injection,” 5th International Conference on Bioinformatics and Computational Biology 2013, BICoB 2013, pp. 171–176, 4–6 Mar. 2013.
  2. Keun Soo Yim, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “Pluggable watchdog: Transparent failure detection for MPI programs,” 2013 IEEE 27th International Symposium on Parallel & Distributed Processing, pp. 489–500, 20–24 May 2013. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6569836
  3. Cuong Pham, Qingkun Li, Zachary Estrada, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “A simulation framework to evaluate virtual CPU scheduling algorithms,” The First International Workshop on Resource Management of Cloud Computing (CCRM) 2013 Workshop, 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops, pp. 138–143, 8–11 July 2013. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6679877
  4. Homa Alemzadeh, Ravishankar K. Iyer, Zbigniew Kalbarczyk, Jai Raman, “Analysis of safety-critical computer failures in medical devices,” IEEE Security & Privacy, vol. 11, no. 4, pp. 14–26, July–Aug. 2013. URL: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6509886
  5. Karthik Pattabiraman, Nithin M. Nakka, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, “SymPLFIED: Symbolic Program-Level Fault Injection and Error Detection Framework,” IEEE Transactions on Computers, vol. 62, no. 11, pp. 2292–2307, 2013. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6296658
  6. Homa Alemzadeh, Jai Raman, Nancy Leveson, and Ravishankar K. Iyer, “Safety implications of robotic surgery: A study of 13 years of FDA data on da Vinci surgical systems,” CSL Technical Report, UILU-ENG-13-2208, Nov. 2013.
    J. Maxwell Chamberlain Memorial Paper in Adult Cardiac Surgery, Presented at the 50th Annual Meeting of the Society of Thoracic Surgeons (STS), Orlando, FL, Jan. 2014, Featured in The Wall Street Journal, “Report Raises Concerns on Robotic Surgery Device,” 8 Nov. 2013.
  7. Hui Lin, Adam Slagell, Zbigniew Kalbarczyk, Peter W. Sauer, Ravishankar K. Iyer, “Semantic security analysis of SCADA networks to detect malicious control commands in power grids,” Proceedings of the 1st ACM Workshop on Smart Energy Grid Security, pp. 29–34, 2013. URL: http://dl.acm.org/citation.cfm?id=2516947

 

2012:

  1. Keun Soo Yim, Valentin Sidea, Zbigniew Kalbarczyk, Deming Chen, Ravishankar K. Iyer, “A fault-tolerant programmable voter for software-based N-modular redundancy,” 2012 IEEE Aerospace Conference, pp. 1–20, 3–10 Mar. 2012. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6187253&isnumber=6186985%0b
  2. Kuan-Yu Tseng, Daniel Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “Characterization of the error resiliency of power grid substation devices,”  Proceedings of the 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems & Networks (DSN), 2012. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6263924
  3. Cuong Pham, Phuong Cao, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “Toward a high availability cloud: Techniques and challenges,” Proceedings of the 2nd International Workshop on Dependability of Clouds, Data Centers and Virtual Machine Technology (DCDV2012), in conjunction with DSN 2012. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6264687
  4. Homa Alemzadeh, Catello Di Martino, Zhanpeng Jin, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, “Towards resiliency in embedded medical monitoring devices,” Workshop on Open Resilient Human-Aware Cyber-Physical Systems, in conjunction with DSN 2012. URL: ieeexplore.ieee.org/stamp/stamp.jsp
  5. So Youn Lee, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “Analysis of biological sequencing errors using fault injection,” 2012 IEEE/IFIP 42nd International Conference on Dependable Systems & Networks (DSN), 2012.

 

2011:

  1. Karthik Pattabiraman, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, “Automated derivation of application-aware error detectors using static analysis: The Trusted Illiac approach,” IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 1, pp. 44–57, Jan.–Feb. 2011. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5089331&isnumber=5639109
  2. Homa Alemzadeh, Mushfiq U. Saleheen, Zhanpeng Jin, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “RMED: A reconfigurable architecture for embedded medical monitoring,” 2011 IEEE/NIH Life Science Systems and Applications Workshop (LiSSA), pp. 112–115, 7–8 Apr. 2011. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5754169&isnumber=5754138
  3. Keun Soo Yim, Cuong Pham, Mushfiq Saleheen, Zbigniew Kalbarczyk, Ravishankar Iyer, “Hauberk: Lightweight silent data corruption error detector for GPGPU,” Proceedings of the IEEE International Parallel and Distributed Processing Symposium (IPDPS), pp. 287–300, 16–20 May 2011. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6012845
  4. Keun Soo Yim, Ravishankar Iyer, “A codesigned fault tolerance system for heterogeneous many-core processors,” 2011 IEEE International Parallel and Distributed Processing Symposium (IPDPS), pp. 2053–2056, 16–20 May 2011. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6009088&isnumber=6008799
  5. Antonio Pecchia, Domenico Cotroneo, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “Improving log-based field failure data analysis of multi-node computing systems,” Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN), pp. 97–108, 27–30 June 2011. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5958210&isnumber=5958196
  6. Gabriela Jacques-Silva, Zbigniew Kalbarczyk, Bugra Gedik, Henrique Andrade, Kun-Lung Wu, Ravishankar K. Iyer, “Modeling stream processing applications for dependability evaluation,” Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN), pp. 430–441, 27–30 June 2011. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5958256&isnumber=5958196 ***William C. Carter Best Paper Award***
  7. Cuong Pham, Daniel Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “CloudVal: A framework for validation of virtualization environment in cloud infrastructure,” Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN), pp. 189–196, 27–30 June 2011. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5958218&isnumber=5958196
  8. Saman A. Zonouz, Aashish Sharma, HariGovind V. Ramasamy, Zbigniew T. Kalbarczyk, Birgit Pfitzmann, Kevin McAuliffe, Ravishankar K. Iyer, William H. Sanders, Eric Cope, “Managing business health in the presence of malicious attacks,” Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), pp. 9–14, 27–30 June 2011. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5958856&isnumber=5958780
  9. A. Sharma, Z. Kalbarczyk, J. Barlow, R. Iyer, “Analysis of security data from a large computing organization,” Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN), pp. 506–517, 27–30 June 2011. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5958263&isnumber=5958196
  10. Antonio Pecchia, Aashish Sharma, Zbigniew Kalbarczyk, Domenico Cotroneo, Ravishankar K. Iyer, “Identifying compromised users in shared computing infrastructures: A data-driven Bayesian network approach,” Proceedings of the 2011 30th IEEE Symposium on Reliable Distributed Systems (SRDS), pp. 127–136, 4–7 Oct. 2011. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6076770&isnumber=6076749
  11. Homa Alemzadeh, Zhanpeng Jin, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “An embedded reconfigurable architecture for patient-specific multi-paramater medical monitoring,” 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS, pp. 1896–1900, Aug. 30 2011–Sep. 3 2011. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6090537&isnumber=6089866
  12. Karthik Pattabiraman, Giacinto Paolo Saggese, Daniel Chen, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, “Automated derivation of application-specific error detectors using dynamic analysis,” IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 5, pp. 640–655, Sep.–Oct. 2011. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5467091&isnumber=5954680
  13. Keun Soo Yim, David Hreczany, and Ravishankar K. Iyer, “HTAF: Hybrid testing automation framework to leverage local and global computing resources,” Proceedings of the 2011 International Conference on Computational Science and Its Applications—Volume Part III (ICCSA’11), Vol. 6784 Part III, Beniamino Murgante, Osvaldo Gervasi, Andrés Iglesias, David Taniar, Bernady O. Apduhan, eds., Springer-Verlag, Berlin, Heidelberg, Germany, pp. 479–494, 2011. URL: http://www.springerlink.com/content/t573h61830058367/
  14. Gabriela Jacques-Silva, Buğra Gedik, Henrique Andrade, Kun-Lung Wu, Ravishankar K. Iyer, “Fault injection-based assessment of partial fault tolerance in stream processing applications,” Proceedings of the 5th ACM International Conference on Distributed Event-Based System, DEBS ’11, pp. 231–242, 2011. URL: http://dl.acm.org/citation.cfm?doid=2002259.2002292 ***Best Paper Award***

 

2010:

  1. Hock Beng Lim, Di Ma, Bang Wang, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Kenneth L. Watkin, “A soldier health monitoring system for military applications,” Proceedings of the 2010 International Conference on Body Sensor Networks, pp. 246–249, 7–9 June 2010. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5504762&isnumber=5504718
  2. Keun Soo Yim, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “Measurement-based analysis of fault and error sensitivities of dynamic memory,”  Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 431–436, 28 June–1 July 2010. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5544287&isnumber=5544245
  3. Jean Arlat, Cristian Constantinescu, Ravishankar K. Iyer, Johan Karlsson, Michael Nicolaïdis, “Fourth Workshop on Dependable and Secure Nanocomputing,” Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 619–620, 28 June–1 July 2010. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5544423
  4. Long Wang, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Arun Iyengar, “Checkpointing virtual machines against transient errors,” 2010 IEEE 16th International On-Line Testing Symposium, pp. 97–102, 5–7 July 2010. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5560226&isnumber=5560185
  5. A. Sharma, Z. Kalbarczyk, R. Iyer, J. Barlow, “Analysis of credential stealing attacks in an open networked environment,” 2010 4th International Conference on Network and System Security, NSS 2010, pp. 144–151, 1–3 Sep. 2010. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5635533
  6. Mushfiq U. Saleheen, Homa Alemzadeh, Ajay M. Cheriyan, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “An efficient embedded hardware for high accuracy detection of epileptic seizures,” 2010 3rd International Conference on Biomedical Engineering and Informatics, BMEI 2010, vol. 5, pp. 1889–1896, 16–18 Oct. 2010. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5639541&isnumber=5639239
  7. Ravishankar K. Iyer, Nithin Nakka, Weining Gu, Zbigniew Kalbarczyk, “Fault injection,” Encyclopedia of Software Engineering, 10 Nov. 2010. URL: http://www.tandfonline.com/doi/abs/10.1081/E-ESE-120044235#.Vj0ZEk2FOM8

 

2009: 

  1. Ajay M. Cheriyan, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Albert O. Jarvi, Tanya M. Gallagher, Kenneth L. Watkin, “Pervasive embedded real time monitoring of EEG & SpO2,” 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009, PervasiveHealth 2009, pp. 1–4, 1–3 Apr. 2009. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5191153&isnumber=5191145
  2. Ajay M. Cheriyan, A. O. Jarvi, Zbigniew Kalbarczyk, T. M. Gallagher, Ravishankar K. Iyer, Kenneth L. Watkin, “Pervasive embedded systems for detection of traumatic brain injury,” Proceedings of the IEEE International Conference on Multimedia and Expo, ICME 2009, pp. 1704–1707, 28 June–3 July 2009. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5202849&isnumber=5202415
  3. Nikhil Pandit, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “Effectiveness of machine checks for error diagnostics,” Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems & Networks, DSN’09, pp. 578–583, 29 June–2 July 2009. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5270290&isnumber=5270274
  4. Galen Lyle, Shelley Chen, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar Iyer, “An end-to-end approach for the automatic derivation of application-aware error detectors,” Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems & Networks, DSN’09, pp. 584–589, 29 June–2 July 2009. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5270291&isnumber=5270274
  5. Keun Soo Yim, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, “Quantitative analysis of long latency failures in system software,” Proceedings of the 15th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC ’09, pp. 23–30, 16–18 Nov. 2009. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5368231&isnumber=5368188
  6. Ajay Mathews Cheriyan, Albert Jarvi, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Kenneth L. Watkin, “Pervasive real-time biomedical monitoring system,” International Conference on Biomedical and Pharmaceutical Engineering, 2009, ICBPE ’09, pp. 1–8, 2–4 Dec. 2009. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5384101&isnumber=5384059
  7. Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar Iyer, “Discovering application-level insider attacks using symbolic execution,” 24th IFIP International Information Security Conference, SEC 2009, pp. 63–75, 2009. URL: http://link.springer.com/chapter/10.1007%2F978-3-642-01244-0_6

 

2008: 

  1. Jean Arlat, Cristian Constantinescu, Ravishankar K. Iyer, Michael Nicolaïdis, “Second workshop on dependable and secure nanocomputing,” IEEE International Conference on Dependable Systems & Networks With FTCS and DCC, DSN 2008, pp. 546–547, 24–27 June 2008. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4630127&isnumber=4630050
  2. Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar Iyer, “SymPLFIED: Symbolic program-level fault injection and error detection framework,” Proceedings of the IEEE International Conference on Dependable Systems & Networks With FTCS and DCC, DSN 2008, pp. 472–481, 24–27 June 2008. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4630118&isnumber=4630050&tag=1 ***William C. Carter Best Paper Award***
  3. Paul Dabrowski, William Healey, Karthik Pattabiraman, Shelley Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “Hardware Implementation of Information Flow Signatures Derived via Program Analysis,” 2nd Workshop on Dependable and Secure Nanocomputing, WDSN, Anchorage, AK, 27 June 2008. URL: http://webhost.laas.fr/TSF/WDSN08/2ndWDSN08(LAAS)_files/Texts/WDSN08-07-Dabrowski.pdf
  4. Long Wang, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “Formalizing system behavior for evaluating a system hang detector,” IEEE Symposium on Reliable Distributed Systems, 2008, SRDS ’08, pp. 269–278, 6–8 Oct. 2008. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4690821&isnumber=4690785
  5. Subhasish Mitra, Ravishankar K. Iyer, Kishor Trivedi, James W. Tschanz, “Reliable system design: Models, metrics and design techniques,” IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2008, p. xi, 10–13 Nov. 2008. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4681534&isnumber=4681527
  6. Daniel Chen, Gabriela Jacques-Silva, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Bruce Mealey, “Error behavior comparison of multiple computing systems: A case study using Linux on Pentium, Solaris on SPARC, and AIX on POWER,” 2008 14th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC ’08, pp. 339–346, 15–17 Dec. 2008. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4725314&isnumber=4725264
  7. Ravishankar K. Iyer, Zbigniew Kalbarczyk, Weining Gu, “Benchmarking the operating system against faults impacting operating system functions,” Dependability Benchmarking for Computer Systems, Karama Kanoun, Lisa Spainhower, eds., Wiley, Hoboken, NJ, pp. 311–339, 2008. URL: http://onlinelibrary.wiley.com/doi/10.1002/9780470370506.ch15/pdf
  8. Ravishankar K. Iyer, Paul Dabrowski, Nithin Nakka, Zbigniew Kalbarczyk, “Reconfigurable tamper-resistant hardware support against insider threats: The Trusted ILLIAC approach,” Insider Attack and Cyber Security: Beyond the Hacker, Salvatore J. Stolfo, Steven M. Bellovin, Shlomo Hershkop, Angelos Keromytis, Sara Sinclair, Sean W. Smith, eds., Springer-Verlag, pp. 133–152, 2008. URL: http://link.springer.com/chapter/10.1007%2F978-0-387-77322-3_8

 

2007:

  1. Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “Inner-circle consistency for wireless ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 6, no. 1, pp. 39–55, Jan. 2007. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4016531&isnumber=4016524
  2. Ravishankar K. Iyer, Zbigniew Kalbarczyk, Karthik Pattabiraman, William Healey, Wen-Mei W. Hwu, Peter Klemperer, Reza Farivar, “Toward application-aware security and reliability,” IEEE Security & Privacy, vol. 5, no. 1, pp. 57–62, Jan.–Feb. 2007. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4085595&isnumber=4085579
  3. K. Pattabiraman, Z. Kalbarczyk, R. Iyer, “Critical variable recomputation for transient error detection,” Workshop on System-Effects of Logic Soft Errors (SELSE), Austin, TX, Apr. 2007.
  4. Marcello Cinque, Domenico Cotroneo, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “How do mobile phones fail? A failure data analysis of Symbian OS smart phones,” Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN’07, pp. 585–594, 25–28 June 2007. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4273009&isnumber=4272935
  5. Nithin Nakka, Karthik Pattabiraman, Ravishankar Iyer, R, “Processor-level selective replication,” Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN’07, pp. 544–553, 25–28 June 2007. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4273005&isnumber=4272935
  6. Jean Arlat, Ravishankar K. Iyer, Michael Nicolaïdis, “Workshop on Dependable and Secure Nanocomputing,” Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007, pp. 809–810, 25–28 June 2007. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=4273037
  7. Peter Klemperer, Shelley Chen, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “FPGA hardware implementation of statically-derived application-aware error detectors,” Workshop on Dependable and Secure Nano-Computing (WDSN), Edinburgh, Scotland, June 2007.
  8. Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “Automated derivation of application-aware error detectors using static analysis,” 13th IEEE International On-Line Testing Symposium, IOLTS 2007, pp. 211–216, 8–11 July 2007. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4274853&isnumber=4274803
  9. Ravishankar K. Iyer, “TRUSTED ILLIAC: A configurable hardware framework for a trusted computing base,” 10th IEEE High Assurance Systems Engineering Symposium, HASE ’07, p. 3, 14–16 Nov. 2007. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4404721&isnumber=4404712
  10. Long Wang, Zbigniew Kalbarczyk, Weining Gu, Ravishankar K. Iyer, “Reliability MicroKernel: Providing application-aware reliability in the OS,” IEEE Transactions on Reliability, vol. 56, no. 4, pp. 597–614, Dec. 2007. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4378410&isnumber=4384598
  11. M. Kaâniche, L. Romano, Z. Kalbarczyk, R. Iyer, R. Karcich, “A hierarchical approach for dependability analysis of a commercial cache-based RAID storage architecture,” Twenty-Eighth Annual International Symposium on Fault-Tolerant Computing, pp. 6–15, 2007.

 

2006:

  1. Ravishankar K. Iyer, “Editorial: Dependability and security–Looking forward to 2006,” IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 1, p. 1, Jan.–Mar. 2006. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1593582&isnumber=33540
  2. Shuo Chen, Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “Security vulnerabilities: From analysis to detection and masking techniques,” Proceedings of the IEEE, vol. 94, no. 2, pp. 407–418, Feb. 2006. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1580509&isnumber=33381
  3. Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “Active replication of multithreaded applications,” IEEE Transactions on Parallel and Distributed Systems, vol. 17, no. 5, pp. 448–465, May 2006. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1613853&isnumber=33878
  4. Claudio Basile, Meeta Gupta, Zbigniew Kalbarczyk, Ravi K. Iyer, “An approach for detecting and distinguishing errors versus attacks in sensor networks,” Proceedings of the 2006 International Conference on Dependable Systems and Networks, DSN’06, pp. 473–484, 25–28 June 2006. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1633536&isnumber=34248
  5. Ravishankar K. Iyer, “Application-aware reliability and security: The Trusted ILLIAC approach,” Fifth IEEE International Symposium on Network Computing and Applications, NCA’06, p. 6, 24–26 July 2006. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1659469&isnumber=34749
  6. K. Pattabiraman, G. P. Saggese, D. Chen, Z. Kalbarczyk, R. K. Iyer, “Dynamic derivation of application-specific error detectors and their implementation in hardware,” Proceedings of the Sixth European Dependable Computing Conference, EDCC’06, pp. 97–108, 18–20 Oct. 2006. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4020839&isnumber=4020816
  7. Long Wang, Zbigniew Kalbarczyk, Weining Gu, Ravishankar K. Iyer, “An OS-level framework for providing application-aware reliability,” 12th Pacific Rim International Symposium on Dependable Computing, 2006, PRDC’06, pp. 55–62, Dec. 2006. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4041888&isnumber=4041875
  8. N. Nakka, K. Pattabiraman, Z. Kalbarczyk and R. Iyer, “Processor-level selective replication,” Workshop on System-Effects of Logic Soft Errors, SELSE, 2006.
  9. Ravishankar K. Iyer, “Security vulnerabilities: From measurements to design,” Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS ’06, ACM, New York, NY, p. 15, 2006. URL: http://dl.acm.org/citation.cfm?doid=1128817.1128823

 

2005:

  1. Ravishankar K. Iyer, “Editorial: State of the Journal Address,” IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 1, p. 1, Jan.-Mar. 2005. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1416860&isnumber=30659
  2. K. Pattabiraman, G. P. Saggesse, D. Chen, Z. Kalbarczyk, R. K. Iyer, “Automated derivation and hardware implementation of application-specific error detectors,” Workshop on High Performance Computing Reliability Issues (HPCR1), 12–16 Feb. 2005.
  3. Zbigniew Kalbarczyk, Ravishankar K. Iyer, Long Wang, “Application fault tolerance with Armor middleware,” IEEE Internet Computing, vol. 9, no. 2, pp. 28–37, Mar.–Apr. 2005. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1405971&isnumber=30490
  4. Vikram S. Adve, Adnan Agbaria, Matti A. Hiltunen, Ravi K. Iyer, Kaustubh R. Joshi, Zbigniew Kalbarczyk, Ryan M. Lefever, Raymond Plante, William H. Sanders, Richard D. Schlichting, “A compiler-enabled model- and measurement-driven adaptation environment for dependability and performance,” Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium, IPDPS’05, 8 pp., 4–8 Apr. 2005. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1420134&isnumber=30685
  5. Nithin Nakka, Giacinto Paolo Saggese, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “An architectural framework for detecting process hangs/crashes,” Proceedings of the 5th European Dependable Computing Conference  EDCC’05, Mario Dal Cin, Mohamed Kaâniche, András Pataricza, eds., Springer-Verlag, Berlin, Heidelberg, Germany, pp. 103–121, 20–22 Apr. 2005. URL: http://dx.doi.org/10.1007/11408901_8
  6. Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “Defeating memory corruption attacks via pointer taintedness detection,” Proceedings of the 2005 International Conference on Dependable Systems and Networks, DSN’05, pp. 378–387, 28 June–1 July 2005. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1467812&isnumber=31476
  7. Long Wang, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Lawrence Votta, Christopher Vick, Alan Wood, “Modeling coordinated checkpointing for large-scale supercomputers,” Proceedings of the 2005 International Conference on Dependable Systems and Networks, DSN’05, pp. 812–821, 28 June–1 July 2005. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1467855&isnumber=31476
  8. Claudio Basile, Zbigniew Kalbarczyk, Ravi K. Iyer, “Neutralization of errors and attacks in wireless ad hoc networks,” Proceedings of the 2005  International Conference on Dependable Systems and Networks, DSN’05, pp. 518–527, 28 June–1 July 2005. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1467826&isnumber=31476
  9. Giacinto Paolo Saggese, Anoop Vetteth, Zbigniew Kalbarczyk, Ravishankar Iyer, “Microprocessor sensitivity to failures: Control vs. execution and combinational vs. sequential logic,” Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN’05), pp. 760–769, 29 June–1 July 2005. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1467850
  10. Shuo Chen, Jun Xu, Emre C. Sezer, Prachi Gauriar, Ravishankar Iyer, “Non-control-data attacks are realistic threats,” USENIX Security Symposium, Baltimore, MD, pp. 177–191, 31 July–5 Aug. 2005. URL: http://static.usenix.org/publications/library/proceedings/sec05/tech/full_papers/chen/chen_html/
  11. Nitin H. Vaidya, Jennifer Bernhard, V. V. Veeravalli, P. R. Kumar, R. K. Iyer, “Illinois wireless wind tunnel: A testbed for experimental evaluation of wireless networks,” Proceedings of the 2005 SIGCOMM Workshop on Experimental Approaches to Wireless Network Design and Analysis, E-WIND ’05, ACM, New York, NY, pp. 64–69, 22–26 Aug. 2005. URL: http://doi.acm.org/10.1145/1080148.1080162
  12. Ravishankar K. Iyer, Nithin M. Nakka, Zbigniew T. Kalbarczyk, Subhasish Mitra, “Recent advances and new avenues in hardware-level reliability support,” IEEE Micro, vol. 25, no. 6, pp. 18–29, Nov.–Dec. 2005. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1566553&isnumber=33228
  13. Giacinto P. Saggese, Nicholas J. Wang, Zbigniew T. Kalbarczyk, Sanjay J. Patel, Ravishankar K. Iyer, “An experimental study of soft errors in microprocessors,” IEEE Micro, vol. 25, no. 6, pp. 30–39, Nov.–Dec. 2005. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1566554&isnumber=33228
  14. Sergio Mena, Claudio Basile, Zbigniew Kalbarczyk, André Schiper, Ravi K. Iyer, “Assessing the crash-failure assumption of group communication protocols,” Proceedings of the 16th IEEE International Symposium on Software Reliability Engineering, 2005, ISSRE’05, pp. 107–116, 8–11 Nov. 2005. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1544726&isnumber=32973
  15. Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “Application-based metrics for strategic placement of detectors,” Proceedings of the 11th Pacific Rim International Symposium on Dependable Computing, 2005, pp. 12–14 Dec. 2005. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1607501&isnumber=33754

 

2004:

  1. Ravishankar K. Iyer, “Introduction to the IEEE Transactions on Dependable and Secure Computing,” IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 1, pp. 2–3, Jan.–Mar. 2004. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1335463&isnumber=29463
  2. Shuo Chen, Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Keith Whisnant, “Modeling and evaluating the security threats of transient errors in firewall software,” Performance Evaluation, vol. 56, no. 1–4, pp. 53–72, Mar. 2004. URL: http://dx.doi.org/10.1016/j.peva.2003.07.013
  3. Keith Whisnant, Ravishankar K. Iyer, Zbigniew T. Kalbarczyk, Phillip H. Jones III, David A. Rennels, Raphael Some, “The effects of an ARMOR-based SIFT environment on the performance and dependability of user applications,” IEEE Transactions on Software Engineering, vol. 30, no. 4, pp. 257–277, Apr. 2004. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1274045&isnumber=28512
  4. Weining Gu, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “Error sensitivity of the Linux kernel executing on PowerPC G4 and Pentium 4 processors,” Proceedings of the 2004 International Conference on Dependable Systems and Networks, pp. 887–896, 28 June–1 July 2004. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1311959&isnumber=29105
  5. N. Nakka, Z. Kalbarczyk, R. K. Iyer, J. Xu, “An architectural framework for providing reliability and security support,” Proceedings of the 2004 International Conference on Dependable Systems and Networks, pp. 585–594, 28 June–1 July 2004. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1311929&isnumber=29105
  6. L. Wang, Z. Kalbarczyk, R. K. Iyer, H. Vora, T. Chahande, “Checkpointing of control structures in main memory database systems,” Proceedings of the 2004 International Conference on Dependable Systems and Networks, pp. 687–692, 28 June–1 July 2004. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1311939&isnumber=29105
  7. Ravishankar K. Iyer, “Hierarchical application aware error detection and recovery,” Proceedings of the 41st Design Automation Conference, 2004, p. 79, 7–11 July 2004. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1322445&isnumber=29281
  8. Ravishankar K. Iyer, “Editor’s Note,” IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 3, p. 145, July–Sep. 2004. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1366133&isnumber=29916
  9. R. K. Iyer, W. H. Sanders, J. H. Patel, Z. Kalbarczyk, “The evolution of dependable computing at the University of Illinois,” Proceedings of the IFIP 18th World Computer Congress (WCC 2004), pp. 135–164, 22–27 Aug. 2004.
  10. Shuo Chen, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravi K. Iyer, “Formal reasoning of various categories of widely exploited security vulnerabilities using pointer taintedness semantics,” Proceedings of 19th IFIP International Information Security Conference (SEC 2004), pp. 83–100, 23–26 Aug. 2004. URL: http://link.springer.com/chapter/10.1007%2F1-4020-8143-X_6
  11. G. P. Saggese, C. Basile, L. Romano, Z. Kalbarczyk, R. K. Iyer, “Hardware support for high performance, intrusion- and fault-tolerant systems,” Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004, pp. 195–204, 18–20 Oct. 2004. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1353020&isnumber=29724

 

2003:

  1. K. Whisnant, Z. T. Kalbarczyk, R. K. Iyer, “A system model for dynamically reconfigurable software,” IBM Systems Journal, vol. 42, no. 1, pp. 45–59, 2003. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5386846&isnumber=5386828
  2. K. Whisnant,  Z. Kalbarczyk, R. K. Iyer, “A foundation for adaptive fault tolerance in software,” Proceedings of the 10th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2003, pp. 252–260, 7–10 Apr. 2003. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1194806&isnumber=26873
  3. Claudio Basile, Zbigniew Kalbarczyk, Ravi Iyer, “A preemptive deterministic scheduling algorithm for multithreaded replicas,” Proceedings of the 2003 International Conference on Dependable Systems and Networks, pp. 149–158, 22–25 June 2003. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1209926
  4. Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishankar K. Iyer, “A data-driven finite state machine model for analyzing security vulnerabilities,” Proceedings of the 2003 International Conference on Dependable Systems and Networks, pp. 605–614, 22–25 June 2003. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1209970&isnumber=27228
  5. Weining Gu, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Zhenyu Yang, “Characterization of Linux kernel behavior under errors,” Proceedings of the 2003 International Conference on Dependable Systems and Networks, pp. 459–468, 22–25 June 2003. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1209956
  6. D. J. Beauregard, Z. Kalbarczyk, R. K. Iyer, S. Chau, L. Alkalai, “Error-injection-based failure characterization of the IEEE 1394 bus,” Proceedings of the 9th IEEE International On-Line Testing Symposium (IOLTS’03), pp. 202–206, 7–9 July 2003. URL:  http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1214399
  7. Ravishankar K. Iyer, Shuo Chen, Jun Xu, Zbigniew Kalbarczyk, “Security vulnerabilities—from data analysis to protection mechanisms,” The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems, 2003, WORDS 2003 Fall, pp. 331–338, 1–3 Oct. 2003. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1410980&isnumber=30574
  8. Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “Transparent runtime randomization for security,” Proceedings of the 22nd International Symposium on Reliable Distributed Systems, 2003,  pp. 260–269, 6–8 Oct. 2003. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1238076&isnumber=27777
  9. Ravishankar K. Iyer, “Measurement-based analysis of networked system availability,” Performance Evaluation—Stories and Perspectives, G. Kotsis, ed., vol. 175 in the series OCG Schriftenreihe, Austrian Computer Society, Dec. 2003.