| 2014 | 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2014, Atlanta, GA, USA, June 23-26, 2014 |
| 2014 | A Design and Implementation of an Assurance Case Language. Yutaka Matsuno |
| 2014 | A Markov Decision Process Approach for Optimal Data Backup Scheduling. Ruofan Xia, Fumio Machida, Kishor S. Trivedi |
| 2014 | A Novel Variable Ordering Heuristic for BDD-based K-Terminal Reliability. Minh Lê, Josef Weidendorfer, Max Walter |
| 2014 | A Reliable 3D MLC PCM Architecture with Resistance Drift Predictor. Majid Jalili, Mohammad Arjomand, Hamid Sarbazi-Azad |
| 2014 | A-ABFT: Autonomous Algorithm-Based Fault Tolerance for Matrix Multiplications on Graphics Processing Units. Claus Braun, Sebastian Halder, Hans-Joachim Wunderlich |
| 2014 | Adaptive Low-Power Architecture for High-Performance and Reliable Embedded Computing. Ronaldo Rodrigues Ferreira, Jean da Rolt, Gabriel L. Nazar, Álvaro Freitas Moreira, Luigi Carro |
| 2014 | An Adaptable Rule Placement for Software-Defined Networks. Shuyuan Zhang, Franjo Ivancic, Cristian Lumezanu, Yifei Yuan, Aarti Gupta, Sharad Malik |
| 2014 | An Integrated Security Framework for GOSS Power Grid Analytics Platform. Tara D. Gibson, Selim Ciraci, Sharma Poorva, Craig Allwardt, Mark Rice, Bora A. Akyol |
| 2014 | Anomaly Characterization in Large Scale Networks. Emmanuelle Anceaume, Yann Busnel, Erwan Le Merrer, Romaric Ludinard, Jean Louis Marchand, Bruno Sericola |
| 2014 | Application-Level Autonomic Hardware to Predict and Preempt Software Attacks on Industrial Control Systems. Lee W. Lerner, Zane R. Franklin, William T. Baumann, Cameron D. Patterson |
| 2014 | Automatically Fixing C Buffer Overflows Using Program Transformations. Alex Shaw, Dusten Doggett, Munawar Hafiz |
| 2014 | Availability Evaluation of Digital Library Cloud Services. Julian Araujo, Paulo Romero Martins Maciel, Matheus Torquato, Gustavo Rau de Almeida Callou, Ermeson C. Andrade |
| 2014 | Catch Me If You Can: A Cloud-Enabled DDoS Defense. Quan Jia, Huangxin Wang, Dan Fleck, Fei Li, Angelos Stavrou, Walter Powell |
| 2014 | Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous-Reliability Memory. Yixin Luo, Sriram Govindan, Bikash Sharma, Mark Santaniello, Justin Meza, Aman Kansal, Jie Liu, Badriddine Khessib, Kushagra Vaid, Onur Mutlu |
| 2014 | Clock-RSM: Low-Latency Inter-datacenter State Machine Replication Using Loosely Synchronized Physical Clocks. Jiaqing Du, Daniele Sciascia, Sameh Elnikety, Willy Zwaenepoel, Fernando Pedone |
| 2014 | Coarse-Grained Energy Modeling of Rollback/Recovery Mechanisms. Dewan Ibtesham, David Debonis, Dorian C. Arnold, Kurt B. Ferreira |
| 2014 | Comparison Criticality in Sorting Algorithms. Thomas B. Jones, David H. Ackley |
| 2014 | Crosscheck: Hardening Replicated Multithreaded Services. Arthur Martens, Christoph Borchert, Tobias Oliver Geissler, Daniel Lohmann, Olaf Spinczyk, Rüdiger Kapitza |
| 2014 | DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic. Yizheng Chen, Manos Antonakakis, Roberto Perdisci, Yacin Nadji, David Dagon, Wenke Lee |
| 2014 | Defects per Million (DPM) Evaluation for a Cloud Dealing with VM Failures Using Checkpointing. Subrota K. Mondal, Jogesh K. Muppala |
| 2014 | Degraded-First Scheduling for MapReduce in Erasure-Coded Storage Clusters. Runhui Li, Patrick P. C. Lee, Yuchong Hu |
| 2014 | Design and Evaluation of FA-MPI, a Transactional Resilience Scheme for Non-blocking MPI. Amin Hassani, Anthony Skjellum, Ron Brightwell |
| 2014 | Detecting Malicious Javascript in PDF through Document Instrumentation. Daiping Liu, Haining Wang, Angelos Stavrou |
| 2014 | Developing Correctly Replicated Databases Using Formal Tools. Nicolas Schiper, Vincent Rahli, Robbert van Renesse, Mark Bickford, Robert L. Constable |
| 2014 | Distributed Implementation of Wide-Area Monitoring Algorithms for Power Systems Using a US-Wide ExoGENI-WAMS Testbed. Jianhua Zhang, Aranya Chakrabortty, Yufeng Xin |
| 2014 | Evaluating the Error Resilience of Parallel Programs. Bo Fang, Karthik Pattabiraman, Matei Ripeanu, Sudhanva Gurumurthi |
| 2014 | Extreme-Scale Viability of Collective Communication for Resilient Task Scheduling and Work Stealing. Jeremiah J. Wilke, Janine Bennett, Hemanth Kolla, Keita Teranishi, Nicole Slattengren, John Floren |
| 2014 | FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine. Zhongshu Gu, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu |
| 2014 | Failure Analysis of Virtual and Physical Machines: Patterns, Causes and Characteristics. Robert Birke, Ioana Giurgiu, Lydia Y. Chen, Dorothea Wiesmann, Ton Engbersen |
| 2014 | GemFI: A Fault Injection Tool for Studying the Behavior of Applications on Unreliable Substrates. Konstantinos Parasyris, Georgios Tziantzoulis, Christos D. Antonopoulos, Nikolaos Bellas |
| 2014 | Grid-Oriented Process Clustering System for Partial Message Logging. Hideyuki Jitsumoto, Yuki Todoroki, Yutaka Ishikawa, Mitsuhisa Sato |
| 2014 | HV Code: An All-Around MDS Code to Improve Efficiency and Reliability of RAID-6 Systems. Zhirong Shen, Jiwu Shu |
| 2014 | Hard Drive Failure Prediction Using Classification and Regression Trees. Jing Li, Xinpu Ji, Yuhan Jia, Bingpeng Zhu, Gang Wang, Zhongwei Li, Xiaoguang Liu |
| 2014 | Hardware-Software Integrated Diagnosis for Intermittent Hardware Faults. Majid Dadashi, Layali Rashid, Karthik Pattabiraman, Sathish Gopalakrishnan |
| 2014 | Harnessing Unreliable Cores in Heterogeneous Architecture: The PyDac Programming Model and Runtime. Bin Huang, Ron Sass, Nathan DeBardeleben, Sean Blanchard |
| 2014 | HeteroCheckpoint: Efficient Checkpointing for Accelerator-Based Systems. Sudarsun Kannan, Naila Farooqui, Ada Gavrilovska, Karsten Schwan |
| 2014 | Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems. Masood Parvania, Georgia Koutsandria, Vishak Muthukumar, Sean Peisert, Chuck McParland, Anna Scaglione |
| 2014 | Impact of GPUs Parallelism Management on Safety-Critical and HPC Applications Reliability. Paolo Rech, Laércio Lima Pilla, Philippe Olivier Alexandre Navaux, Luigi Carro |
| 2014 | Interoperability between Fingerprint Biometric Systems: An Empirical Study. Stephen Mason, Ilir Gashi, Luca Lugini, Emanuela Marasco, Bojan Cukic |
| 2014 | Ironstack: Performance, Stability and Security for Power Grid Data Networks. Zhiyuan Teo, Vera Kutsenko, Ken Birman, Robbert van Renesse |
| 2014 | Lazy Checkpointing: Exploiting Temporal Locality in Failures to Mitigate Checkpointing Overheads on Extreme-Scale Systems. Devesh Tiwari, Saurabh Gupta, Sudharshan S. Vazhkudai |
| 2014 | Lessons Learned from the Analysis of System Failures at Petascale: The Case of Blue Waters. Catello Di Martino, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Fabio Baccanico, Joseph Fullop, William Kramer |
| 2014 | Mining Historical Issue Repositories to Heal Large-Scale Online Service Systems. Rui Ding, Qiang Fu, Jian-Guang Lou, Qingwei Lin, Dongmei Zhang, Tao Xie |
| 2014 | Mitigating Write Disturbance in Super-Dense Phase Change Memories. Lei Jiang, Youtao Zhang, Jun Yang |
| 2014 | Model Checking Stochastic Automata for Dependability and Performance Measures. Peter Buchholz, Jan Kriege, Dimitri Scheftelowitsch |
| 2014 | Monitor Based Oracles for Cyber-Physical System Testing: Practical Experience Report. Aaron Kane, Thomas E. Fuhrman, Philip Koopman |
| 2014 | NV-Hypervisor: Hypervisor-Based Persistence for Virtual Machines. Vasily A. Sartakov, Rüdiger Kapitza |
| 2014 | Ocasta: Clustering Configuration Settings for Error Recovery. Zhen Huang, David Lie |
| 2014 | On Tracking Information Flows through JNI in Android Applications. Chenxiong Qian, Xiapu Luo, Yuru Shao, Alvin T. S. Chan |
| 2014 | Optical Delusions: A Study of Malicious QR Codes in the Wild. Amin Kharraz, Engin Kirda, William K. Robertson, Davide Balzarotti, Aurélien Francillon |
| 2014 | POD-Diagnosis: Error Diagnosis of Sporadic Operations on Cloud Applications. Xiwei Xu, Liming Zhu, Ingo Weber, Len Bass, Daniel Sun |
| 2014 | Performance Sensitive Replication in Geo-distributed Cloud Datastores. Shankaranarayanan P. N., Ashiwan Sivakumar, Sanjay G. Rao, Mohit Tawarmalani |
| 2014 | Predicting Incident Reports for IT Help Desk. Anneliese Amschler Andrews, Joseph Lucente |
| 2014 | Probabilistic Inference for Obfuscated Network Attack Sequences. Haitao Du, Shanchieh Jay Yang |
| 2014 | Quantifying the Accuracy of High-Level Fault Injection Techniques for Hardware Faults. Jiesheng Wei, Anna Thomas, Guanpeng Li, Karthik Pattabiraman |
| 2014 | Radiation Sensitivity of High Performance Computing Applications on Kepler-Based GPGPUs. Daniel A. G. de Oliveira, Caio B. Lunardi, Laércio Lima Pilla, Paolo Rech, Philippe Olivier Alexandre Navaux, Luigi Carro |
| 2014 | Recovery for Failures in Rolling Upgrade on Clouds. Min Fu, Liming Zhu, Len Bass, Anna Liu |
| 2014 | Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural Invariants. Cuong Manh Pham, Zachary Estrada, Phuong Cao, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer |
| 2014 | Replication-Based Fault-Tolerance for Large-Scale Graph Processing. Peng Wang, Kaiyuan Zhang, Rong Chen, Haibo Chen, Haibing Guan |
| 2014 | S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social Services. Xiaojing Liao, A. Selcuk Uluagac, Raheem A. Beyah |
| 2014 | SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics. Qin Liu, John C. S. Lui, Cheng He, Lujia Pan, Wei Fan, Yunlong Shi |
| 2014 | Scalable Security Models for Assessing Effectiveness of Moving Target Defenses. Jin B. Hong, Dong Seong Kim |
| 2014 | Scalable State-Machine Replication. Carlos Eduardo Benevides Bezerra, Fernando Pedone, Robbert van Renesse |
| 2014 | Scriptless Timing Attacks on Web Browser Privacy. Bin Liang, Wei You, Liangkun Liu, Wenchang Shi, Mario Heiderich |
| 2014 | Secure Ranked Multi-keyword Search for Multiple Data Owners in Cloud Computing. Wei Zhang, Sheng Xiao, Yaping Lin, Ting, Siwang Zhou |
| 2014 | Security Threat Analytics and Countermeasure Synthesis for Power System State Estimation. Mohammad Ashiqur Rahman, Ehab Al-Shaer, Rajesh G. Kavasseri |
| 2014 | Social Puzzles: Context-Based Access Control in Online Social Networks. Murtuza Jadliwala, Anindya Maiti, Vinod Namboodiri |
| 2014 | State Machine Replication for the Masses with BFT-SMART. Alysson Neves Bessani, João Sousa, Eduardo Adílio Pelinson Alchieri |
| 2014 | Stateful Data Delivery Service for Wide Area Monitoring and Control Applications. Yiming Wu, Davood Babazadeh, Lars Nordström |
| 2014 | System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection Needs. Rui Wu, Ping Chen, Peng Liu, Bing Mao |
| 2014 | The Energy Efficiency of Database Replication Protocols. Nicolas Schiper, Fernando Pedone, Robbert van Renesse |
| 2014 | Titan: Enabling Low Overhead and Multi-faceted Network Fingerprinting of a Bot. Osama Haq, Waqar Ahmed, Affan A. Syed |
| 2014 | Toward Design Decisions to Enable Deployability: Empirical Study of Three Projects Reaching for the Continuous Delivery Holy Grail. Stephany Bellomo, Neil A. Ernst, Robert L. Nord, Rick Kazman |
| 2014 | Towards Secure Metering Data Analysis via Distributed Differential Privacy. Xiaojing Liao, David Formby, Carson Day, Raheem A. Beyah |
| 2014 | Towards a Taxonomy of Cloud Recovery Strategies. Min Fu, Len Bass, Anna Liu |
| 2014 | Understanding Interoperability Issues of Web Service Frameworks. Ivano Alessandro Elia, Nuno Laranjeiro, Marco Vieira |
| 2014 | WL-Reviver: A Framework for Reviving any Wear-Leveling Techniques in the Face of Failures on Phase Change Memory. Jie Fan, Song Jiang, Jiwu Shu, Long Sun, Qingda Hu |
| 2014 | Warped-Shield: Tolerating Hard Faults in GPGPUs. Waleed Dweik, Mohammad Abdel-Majeed, Murali Annavaram |
| 2014 | What Logs Should You Look at When an Application Fails? Insights from an Industrial Case Study. Marcello Cinque, Domenico Cotroneo, Raffaele Della Corte, Antonio Pecchia |
| 2014 | What Vulnerability Do We Need to Patch First? Jin B. Hong, Dong Seong Kim, Abdelkrim Haqiq |
| 2014 | You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks. Hossen Asiful Mustafa, Wenyuan Xu, Ahmad-Reza Sadeghi, Steffen Schulz |
| 2014 | pSigene: Webcrawling to Generalize SQL Injection Signatures. Gaspar Modelo-Howard, Christopher N. Gutierrez, Fahad A. Arshad, Saurabh Bagchi, Yuan Qi |