| 2015 | 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015, Rio de Janeiro, Brazil, June 22-25, 2015 |
| 2015 | A Quality Control Engine for Complex Physical Systems. Haifeng Chen, Takehiko Mizoguchi, Yan Tan, Kai Zhang, Geoff Jiang |
| 2015 | A Statistical Approach for Timed Reachability in AADL Models. Harold Bruintjes, Joost-Pieter Katoen, David Lesens |
| 2015 | AVATAR: A Variable-Retention-Time (VRT) Aware Refresh for DRAM Systems. Moinuddin K. Qureshi, Dae-Hyun Kim, Samira Manabi Khan, Prashant J. Nair, Onur Mutlu |
| 2015 | Avoiding Pitfalls in Fault-Injection Based Comparison of Program Susceptibility to Soft Errors. Horst Schirmeier, Christoph Borchert, Olaf Spinczyk |
| 2015 | BAAT: Towards Dynamically Managing Battery Aging in Green Datacenters. Longjun Liu, Chao Li, Hongbin Sun, Yang Hu, Juncheng Gu, Tao Li |
| 2015 | Consensus Refined. Ognjen Maric, Christoph Sprenger, David A. Basin |
| 2015 | Decomposable Trust for Android Applications. Earlence Fernandes, Ajit Aluri, Alexander Crowell, Atul Prakash |
| 2015 | Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis. An Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen |
| 2015 | Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data. Alina Oprea, Zhou Li, Ting-Fang Yen, Sang H. Chin, Sumayah A. Alrwais |
| 2015 | Discovering and Visualizing Operations Processes with POD-Discovery and POD-Viz. Ingo Weber, Chao Li, Len Bass, Xiwei Xu, Liming Zhu |
| 2015 | Enabling Efficient and Reliable Transition from Replication to Erasure Coding for Clustered File Systems. Runhui Li, Yuchong Hu, Patrick P. C. Lee |
| 2015 | Energy Resilience Modelling for Smart Houses. Hamed Ghasemieh, Boudewijn R. Haverkort, Marijn R. Jongerden, Anne Remke |
| 2015 | Enhancing Software Dependability and Security with Hardware Supported Instruction Address Space Randomization. Seung-Hun Kim, Lei Xu, Ziyi Liu, Zhiqiang Lin, Won Woo Ro, Weidong Shi |
| 2015 | Experiences with Building Disaster Recovery for Enterprise-Class Clouds. Long Wang, Harigovind V. Ramasamy, Richard E. Harper, Mahesh Viswanathan, Edmond Plattier |
| 2015 | Fine-Grained Characterization of Faults Causing Long Latency Crashes in Programs. Guanpeng Li, Qining Lu, Karthik Pattabiraman |
| 2015 | FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks. Haopei Wang, Lei Xu, Guofei Gu |
| 2015 | Formal Assurance Arguments: A Solution in Search of a Problem? Patrick John Graydon |
| 2015 | Grouping-Based Elastic Striping with Hotness Awareness for Improving SSD RAID Performance. Yubiao Pan, Yongkun Li, Yinlong Xu, Zhipeng Li |
| 2015 | HeapTherapy: An Efficient End-to-End Solution against Heap Buffer Overflows. Qiang Zeng, Mingyi Zhao, Peng Liu |
| 2015 | Hide & Share: Landmark-Based Similarity for Private KNN Computation. Davide Frey, Rachid Guerraoui, Anne-Marie Kermarrec, Antoine Rault, François Taïani, Jingjing Wang |
| 2015 | Impact of Malfunction on the Energy Efficiency of Batch Processing Systems. Marcello Cinque, Domenico Cotroneo, Flavio Frattini, Stefano Russo |
| 2015 | Improving Reliability with Dynamic Syndrome Allocation in Intelligent Software Defined Data Centers. Ulya Bayram, Dwight Divine, Pin Zhou, Eric William Davis Rozier |
| 2015 | Incinerator - Eliminating Stale References in Dynamic OSGi Applications. Koutheir Attouchi, Gaël Thomas, Gilles Muller, Julia Lawall, André Bottaro |
| 2015 | Joza: Hybrid Taint Inference for Defeating Web Application SQL Injection Attacks. Abbas Naderi-Afooshteh, Anh Nguyen-Tuong, Mandana Bagheri-Marzijarani, Jason D. Hiser, Jack W. Davidson |
| 2015 | LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis. Zhongshu Gu, Kexin Pei, Qifan Wang, Luo Si, Xiangyu Zhang, Dongyan Xu |
| 2015 | Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations. Samuel Jero, Hyojeong Lee, Cristina Nita-Rotaru |
| 2015 | Lightweight Memory Checkpointing. Dirk Vogt, Cristiano Giuffrida, Herbert Bos, Andrew S. Tanenbaum |
| 2015 | Measuring and Understanding Extreme-Scale Application Resilience: A Field Study of 5, 000, 000 HPC Application Runs. Catello Di Martino, William Kramer, Zbigniew Kalbarczyk, Ravishankar K. Iyer |
| 2015 | On the Metrics for Benchmarking Vulnerability Detection Tools. Nuno Antunes, Marco Vieira |
| 2015 | OnionBots: Subverting Privacy Infrastructure for Cyber Attacks. Amirali Sanatinia, Guevara Noubir |
| 2015 | Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming. Dennis Andriesse, Herbert Bos, Asia Slowinska |
| 2015 | Private Browsing Mode Not Really That Private: Dealing with Privacy Breach Caused by Browser Extensions. Bin Zhao, Peng Liu |
| 2015 | Read Disturb Errors in MLC NAND Flash Memory: Characterization, Mitigation, and Recovery. Yu Cai, Yixin Luo, Saugata Ghose, Onur Mutlu |
| 2015 | Reducing Refresh Power in Mobile Devices with Morphable ECC. Chia-Chen Chou, Prashant J. Nair, Moinuddin K. Qureshi |
| 2015 | Revisiting Memory Errors in Large-Scale Production Data Centers: Analysis and Modeling of New Trends from the Field. Justin Meza, Qiang Wu, Sanjeev Kumar, Onur Mutlu |
| 2015 | Risk Assessment of Buffer "Heartbleed" Over-Read Vulnerabilities. Jun Wang, Mingyi Zhao, Qiang Zeng, Dinghao Wu, Peng Liu |
| 2015 | Scalable Analysis of Fault Trees with Dynamic Features. Jan Krcál, Pavel Krcál |
| 2015 | Secure Dynamic Software Loading and Execution Using Cross Component Verification. Byungho Min, Vijay Varadharajan |
| 2015 | Segugio: Efficient Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks. Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis |
| 2015 | Smart-TV Security Analysis: Practical Experiments. Yann Bachy, Frederic Basse, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège, Pierre Lukjanenko |
| 2015 | TIP-Code: A Three Independent Parity Code to Tolerate Triple Disk Failures with Optimal Update Complextiy. Yongzhe Zhang, Chentao Wu, Jie Li, Minyi Guo |
| 2015 | Test-Based Interoperability Certification for Web Services. Ivano Alessandro Elia, Nuno Laranjeiro, Marco Vieira |
| 2015 | The Power of Evil Choices in Bloom Filters. Thomas Gerbet, Amrit Kumar, Cédric Lauradoux |
| 2015 | TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices. He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, Haining Wang |
| 2015 | Understanding and Exploiting Spatial Properties of System Failures on Extreme-Scale HPC Systems. Saurabh Gupta, Devesh Tiwari, Christopher Jantzi, James H. Rogers, Don Maxwell |
| 2015 | Understanding the Dark Side of Big Data Clusters: An Analysis beyond Failures. Andrea Rosà, Lydia Y. Chen, Walter Binder |
| 2015 | User-Constraint and Self-Adaptive Fault Tolerance for Event Stream Processing Systems. André Martin, Tiaraju Smaneoto, Tobias Dietze, Andrey Brito, Christof Fetzer |
| 2015 | Warped-RE: Low-Cost Error Detection and Correction in GPUs. Mohammad Abdel-Majeed, Waleed Dweik, Hyeran Jeon, Murali Annavaram |
| 2015 | Workshop on Dependability Issues on SDN and NFV (DISN). Elias P. Duarte Jr., Matti A. Hiltunen |
| 2015 | Workshop on Model Based Design for Cyber-Physical Systems (MB4CP). Alberto Avritzer, Daniel Sadoc Menasché, Kishor S. Trivedi, Lucia Happe, Sahra Sedigh Sarvestani |
| 2015 | Workshop on Recent Advances in the DependabIlity AssessmeNt of Complex systEms (RADIANCE). Ariadne Maria Brito Rizzoni Carvalho, Nuno Antunes, Andrea Ceccarelli, András Zentai |
| 2015 | Workshop on Safety and Security of Intelligent Vehicles (SSIV). João Carlos Cunha, Kalinka Branco, António Casimiro, Urbano Nunes |
| 2015 | phpSAFE: A Security Analysis Tool for OOP Web Application Plugins. Paulo Jorge Costa Nunes, José Fonseca, Marco Vieira |
| 2015 | Δ-Encoding: Practical Encoded Processing. Dmitrii Kuvaiskii, Christof Fetzer |