| 2012 | A cost-based heterogeneous recovery scheme for distributed storage systems with RAID-6 codes. Yunfeng Zhu, Patrick P. C. Lee, Liping xiang, Yinlong Xu, Lingling Gao |
| 2012 | A cross-layer approach for IP network protection. Qiang Zheng, Jing Zhao, Guohong Cao |
| 2012 | A dependability analysis of hardware-assisted polling integrity checking systems. Jiang Wang, Kun Sun, Angelos Stavrou |
| 2012 | A framework for efficient evaluation of the fault tolerance of deduplicated storage systems. Eric Rozier, William H. Sanders |
| 2012 | A new symbolic approach for network reliability analysis. Marco Beccuti, Andrea Bobbio, Giuliana Franceschinis, Roberta Terruggia |
| 2012 | A study of soft error consequences in hard disk drives. Timothy K. Tsai, Nawanol Theera-Ampornpunt, Saurabh Bagchi |
| 2012 | Adaptive algorithms for diagnosing large-scale failures in computer networks. Srikar Tati, Bong Jun Ko, Guohong Cao, Ananthram Swami, Thomas La Porta |
| 2012 | Algorithmic approaches to low overhead fault detection for sparse linear algebra. Joseph Sloan, Rakesh Kumar, Greg Bronevetsky |
| 2012 | An empirical study of the robustness of Inter-component Communication in Android. Amiya Kumar Maji, Fahad A. Arshad, Saurabh Bagchi, Jan S. Rellermeyer |
| 2012 | Assessing time coalescence techniques for the analysis of supercomputer logs. Catello Di Martino, Marcello Cinque, Domenico Cotroneo |
| 2012 | Automatic fault characterization via abnormality-enhanced classification. Greg Bronevetsky, Ignacio Laguna, Bronis R. de Supinski, Saurabh Bagchi |
| 2012 | BLOCKWATCH: Leveraging similarity in parallel programs for error detection. Jiesheng Wei, Karthik Pattabiraman |
| 2012 | Binary mutation testing through dynamic translation. Markus Becker, Christoph Kuznik, Mabel M. Joy, Tao Xie, Wolfgang Müller |
| 2012 | CFIMon: Detecting violation of control flow integrity using performance counters. Yubin Xia, Yutao Liu, Haibo Chen, Binyu Zang |
| 2012 | Characterization of the error resiliency of power grid substation devices. Kuan-Yu Tseng, Daniel Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer |
| 2012 | Confidentiality of event data in policy-based monitoring. Mirko Montanari, Roy H. Campbell |
| 2012 | Continuous authentication for mouse dynamics: A pattern-growth approach. Chao Shen, Zhongmin Cai, Xiaohong Guan |
| 2012 | DS-Bench Toolset: Tools for dependability benchmarking with simulation and assurance. Hajime Fujita, Yutaka Matsuno, Toshihiro Hanawa, Mitsuhisa Sato, Shinpei Kato, Yutaka Ishikawa |
| 2012 | Draco: Statistical diagnosis of chronic problems in large distributed systems. Soila Kavulya, Scott Daniels, Kaustubh R. Joshi, Matti A. Hiltunen, Rajeev Gandhi, Priya Narasimhan |
| 2012 | EliMet: Security metric elicitation in power grid critical infrastructures by observing system administrators' responsive behavior. Saman A. Zonouz, Amir Houmansadr, Parisa Haghani |
| 2012 | Epiphany: A location hiding architecture for protecting critical services from DDoS attacks. Vamsi Kambhampati, Christos Papadopoulos, Daniel Massey |
| 2012 | Error injection-based study of soft error propagation in AMD Bulldozer microprocessor module. Cristian Constantinescu, Mike Butler, Chris Weller |
| 2012 | ExtraTime: Modeling and analysis of wearout due to transistor aging at microarchitecture-level. Fabian Oboril, Mehdi Baradaran Tahoori |
| 2012 | Filtering log data: Finding the needles in the Haystack. Li Yu, Ziming Zheng, Zhiling Lan, Terry R. Jones, Jim M. Brandt, Ann C. Gentile |
| 2012 | Finite horizon analysis of infinite CTMDPs. Peter Buchholz |
| 2012 | Heuristics for optimizing matrix-based erasure codes for fault-tolerant storage systems. James S. Plank, Catherine D. Schuman, B. Devin Robison |
| 2012 | High-performance parallel accelerator for flexible and efficient run-time monitoring. Daniel Y. Deng, G. Edward Suh |
| 2012 | IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2012, Boston, MA, USA, June 25-28, 2012 Robert S. Swarz, Philip Koopman, Michel Cukier |
| 2012 | Instrumenting AUTOSAR for dependability assessment: A guidance framework. Thorsten Piper, Stefan Winter, Paul Manns, Neeraj Suri |
| 2012 | Keep net working - on a dependable and fast networking stack. Tomás Hrubý, Dirk Vogt, Herbert Bos, Andrew S. Tanenbaum |
| 2012 | Latent fault detection in large scale services. Moshe Gabel, Assaf Schuster, Ran Gilad-Bachrach, Nikolaj S. Bjørner |
| 2012 | Lightweight cooperative logging for fault replication in concurrent programs. Nuno Machado, Paolo Romano, Luís E. T. Rodrigues |
| 2012 | Low-cost program-level detectors for reducing silent data corruptions. Siva Kumar Sastry Hari, Sarita V. Adve, Helia Naeimi |
| 2012 | Mitigating random variation with spare RIBs: Redundant intermediate bitslices. David J. Palframan, Nam Sung Kim, Mikko H. Lipasti |
| 2012 | Mitigating the impact of ambient noise on Wireless Mesh Networks using adaptive link-quality-based packet replication. Jesus Friginal, Juan-Carlos Ruiz-Garcia, David de Andrés, Antonio Bustos |
| 2012 | Model-driven consolidation of Java workloads on multicores. Danilo Ansaloni, Lydia Y. Chen, Evgenia Smirni, Walter Binder |
| 2012 | Multi-Ring Paxos. Parisa Jalili Marandi, Marco Primi, Fernando Pedone |
| 2012 | NINEPIN: Non-invasive and energy efficient performance isolation in virtualized servers. Palden Lama, Xiaobo Zhou |
| 2012 | Optimization of data collection strategies for model-based evaluation and decision-making. Robert Cain, Aad P. A. van Moorsel |
| 2012 | Perspectives on software safety case development for unmanned aircraft. Ewen Denney, Ganesh Pai, Ibrahim Habli |
| 2012 | Practical scrubbing: Getting to the bad sector at the right time. George Amvrosiadis, Alina Oprea, Bianca Schroeder |
| 2012 | RDIS: A recursively defined invertible set scheme to tolerate multiple stuck-at faults in resistive memory. Rami G. Melhem, Rakan Maddah, Sangyeun Cho |
| 2012 | RePRAM: Re-cycling PRAM faulty blocks for extended lifetime. Jie Chen, Guru Venkataramani, H. Howie Huang |
| 2012 | Robust data sharing with key-value stores. Cristina Basescu, Christian Cachin, Ittay Eyal, Robert Haas, Alessandro Sorniotti, Marko Vukolic, Ido Zachevsky |
| 2012 | Safeguarding academic accounts and resources with the University Credential Abuse Auditing System. Jing Zhang, Robin Berthier, Will Rhee, Michael D. Bailey, Partha P. Pal, Farnam Jahanian, William H. Sanders |
| 2012 | Scalable deferred update replication. Daniele Sciascia, Fernando Pedone, Flavio Junqueira |
| 2012 | Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees. Arpan Roy, Dong Seong Kim, Kishor S. Trivedi |
| 2012 | Taming Mr Hayes: Mitigating signaling based attacks on smartphones. Collin Mulliner, Steffen Liebergeld, Matthias Lange, Jean-Pierre Seifert |
| 2012 | Time-efficient and cost-effective network hardening using attack graphs. Massimiliano Albanese, Sushil Jajodia, Steven Noel |
| 2012 | Toward comprehensive and accurate simulation performance prediction of parallel file systems. Miguel A. Erazo, Ting Li, Jason Liu, Stephan J. Eidenbenz |
| 2012 | Understanding soft error propagation using Efficient vulnerability-driven fault injection. Xin Xu, Man-Lap Li |
| 2012 | VARIUS-NTV: A microarchitectural model to capture the increased sensitivity of manycores to process variations at near-threshold voltages. Ulya R. Karpuzcu, Krishna B. Kolluru, Nam Sung Kim, Josep Torrellas |