DSN A

55 papers

YearTitle / Authors
201545th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015, Rio de Janeiro, Brazil, June 22-25, 2015
2015A Quality Control Engine for Complex Physical Systems.
Haifeng Chen, Takehiko Mizoguchi, Yan Tan, Kai Zhang, Geoff Jiang
2015A Statistical Approach for Timed Reachability in AADL Models.
Harold Bruintjes, Joost-Pieter Katoen, David Lesens
2015AVATAR: A Variable-Retention-Time (VRT) Aware Refresh for DRAM Systems.
Moinuddin K. Qureshi, Dae-Hyun Kim, Samira Manabi Khan, Prashant J. Nair, Onur Mutlu
2015Avoiding Pitfalls in Fault-Injection Based Comparison of Program Susceptibility to Soft Errors.
Horst Schirmeier, Christoph Borchert, Olaf Spinczyk
2015BAAT: Towards Dynamically Managing Battery Aging in Green Datacenters.
Longjun Liu, Chao Li, Hongbin Sun, Yang Hu, Juncheng Gu, Tao Li
2015Consensus Refined.
Ognjen Maric, Christoph Sprenger, David A. Basin
2015Decomposable Trust for Android Applications.
Earlence Fernandes, Ajit Aluri, Alexander Crowell, Atul Prakash
2015Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis.
An Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen
2015Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data.
Alina Oprea, Zhou Li, Ting-Fang Yen, Sang H. Chin, Sumayah A. Alrwais
2015Discovering and Visualizing Operations Processes with POD-Discovery and POD-Viz.
Ingo Weber, Chao Li, Len Bass, Xiwei Xu, Liming Zhu
2015Enabling Efficient and Reliable Transition from Replication to Erasure Coding for Clustered File Systems.
Runhui Li, Yuchong Hu, Patrick P. C. Lee
2015Energy Resilience Modelling for Smart Houses.
Hamed Ghasemieh, Boudewijn R. Haverkort, Marijn R. Jongerden, Anne Remke
2015Enhancing Software Dependability and Security with Hardware Supported Instruction Address Space Randomization.
Seung-Hun Kim, Lei Xu, Ziyi Liu, Zhiqiang Lin, Won Woo Ro, Weidong Shi
2015Experiences with Building Disaster Recovery for Enterprise-Class Clouds.
Long Wang, Harigovind V. Ramasamy, Richard E. Harper, Mahesh Viswanathan, Edmond Plattier
2015Fine-Grained Characterization of Faults Causing Long Latency Crashes in Programs.
Guanpeng Li, Qining Lu, Karthik Pattabiraman
2015FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks.
Haopei Wang, Lei Xu, Guofei Gu
2015Formal Assurance Arguments: A Solution in Search of a Problem?
Patrick John Graydon
2015Grouping-Based Elastic Striping with Hotness Awareness for Improving SSD RAID Performance.
Yubiao Pan, Yongkun Li, Yinlong Xu, Zhipeng Li
2015HeapTherapy: An Efficient End-to-End Solution against Heap Buffer Overflows.
Qiang Zeng, Mingyi Zhao, Peng Liu
2015Hide & Share: Landmark-Based Similarity for Private KNN Computation.
Davide Frey, Rachid Guerraoui, Anne-Marie Kermarrec, Antoine Rault, François Taïani, Jingjing Wang
2015Impact of Malfunction on the Energy Efficiency of Batch Processing Systems.
Marcello Cinque, Domenico Cotroneo, Flavio Frattini, Stefano Russo
2015Improving Reliability with Dynamic Syndrome Allocation in Intelligent Software Defined Data Centers.
Ulya Bayram, Dwight Divine, Pin Zhou, Eric William Davis Rozier
2015Incinerator - Eliminating Stale References in Dynamic OSGi Applications.
Koutheir Attouchi, Gaël Thomas, Gilles Muller, Julia Lawall, André Bottaro
2015Joza: Hybrid Taint Inference for Defeating Web Application SQL Injection Attacks.
Abbas Naderi-Afooshteh, Anh Nguyen-Tuong, Mandana Bagheri-Marzijarani, Jason D. Hiser, Jack W. Davidson
2015LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis.
Zhongshu Gu, Kexin Pei, Qifan Wang, Luo Si, Xiangyu Zhang, Dongyan Xu
2015Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations.
Samuel Jero, Hyojeong Lee, Cristina Nita-Rotaru
2015Lightweight Memory Checkpointing.
Dirk Vogt, Cristiano Giuffrida, Herbert Bos, Andrew S. Tanenbaum
2015Measuring and Understanding Extreme-Scale Application Resilience: A Field Study of 5, 000, 000 HPC Application Runs.
Catello Di Martino, William Kramer, Zbigniew Kalbarczyk, Ravishankar K. Iyer
2015On the Metrics for Benchmarking Vulnerability Detection Tools.
Nuno Antunes, Marco Vieira
2015OnionBots: Subverting Privacy Infrastructure for Cyber Attacks.
Amirali Sanatinia, Guevara Noubir
2015Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming.
Dennis Andriesse, Herbert Bos, Asia Slowinska
2015Private Browsing Mode Not Really That Private: Dealing with Privacy Breach Caused by Browser Extensions.
Bin Zhao, Peng Liu
2015Read Disturb Errors in MLC NAND Flash Memory: Characterization, Mitigation, and Recovery.
Yu Cai, Yixin Luo, Saugata Ghose, Onur Mutlu
2015Reducing Refresh Power in Mobile Devices with Morphable ECC.
Chia-Chen Chou, Prashant J. Nair, Moinuddin K. Qureshi
2015Revisiting Memory Errors in Large-Scale Production Data Centers: Analysis and Modeling of New Trends from the Field.
Justin Meza, Qiang Wu, Sanjeev Kumar, Onur Mutlu
2015Risk Assessment of Buffer "Heartbleed" Over-Read Vulnerabilities.
Jun Wang, Mingyi Zhao, Qiang Zeng, Dinghao Wu, Peng Liu
2015Scalable Analysis of Fault Trees with Dynamic Features.
Jan Krcál, Pavel Krcál
2015Secure Dynamic Software Loading and Execution Using Cross Component Verification.
Byungho Min, Vijay Varadharajan
2015Segugio: Efficient Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks.
Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis
2015Smart-TV Security Analysis: Practical Experiments.
Yann Bachy, Frederic Basse, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège, Pierre Lukjanenko
2015TIP-Code: A Three Independent Parity Code to Tolerate Triple Disk Failures with Optimal Update Complextiy.
Yongzhe Zhang, Chentao Wu, Jie Li, Minyi Guo
2015Test-Based Interoperability Certification for Web Services.
Ivano Alessandro Elia, Nuno Laranjeiro, Marco Vieira
2015The Power of Evil Choices in Bloom Filters.
Thomas Gerbet, Amrit Kumar, Cédric Lauradoux
2015TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices.
He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, Haining Wang
2015Understanding and Exploiting Spatial Properties of System Failures on Extreme-Scale HPC Systems.
Saurabh Gupta, Devesh Tiwari, Christopher Jantzi, James H. Rogers, Don Maxwell
2015Understanding the Dark Side of Big Data Clusters: An Analysis beyond Failures.
Andrea Rosà, Lydia Y. Chen, Walter Binder
2015User-Constraint and Self-Adaptive Fault Tolerance for Event Stream Processing Systems.
André Martin, Tiaraju Smaneoto, Tobias Dietze, Andrey Brito, Christof Fetzer
2015Warped-RE: Low-Cost Error Detection and Correction in GPUs.
Mohammad Abdel-Majeed, Waleed Dweik, Hyeran Jeon, Murali Annavaram
2015Workshop on Dependability Issues on SDN and NFV (DISN).
Elias P. Duarte Jr., Matti A. Hiltunen
2015Workshop on Model Based Design for Cyber-Physical Systems (MB4CP).
Alberto Avritzer, Daniel Sadoc Menasché, Kishor S. Trivedi, Lucia Happe, Sahra Sedigh Sarvestani
2015Workshop on Recent Advances in the DependabIlity AssessmeNt of Complex systEms (RADIANCE).
Ariadne Maria Brito Rizzoni Carvalho, Nuno Antunes, Andrea Ceccarelli, András Zentai
2015Workshop on Safety and Security of Intelligent Vehicles (SSIV).
João Carlos Cunha, Kalinka Branco, António Casimiro, Urbano Nunes
2015phpSAFE: A Security Analysis Tool for OOP Web Application Plugins.
Paulo Jorge Costa Nunes, José Fonseca, Marco Vieira
2015Δ-Encoding: Practical Encoded Processing.
Dmitrii Kuvaiskii, Christof Fetzer