DSN A

59 papers

YearTitle / Authors
201646th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016, Toulouse, France, June 28 - July 1, 2016
2016A Model-Based Approach to Support Safety-Related Decisions in the Petroleum Domain.
Leonardo Montecchi, Atle Refsdal, Paolo Lollini, Andrea Bondavalli
2016A Privacy Analysis of Google and Yandex Safe Browsing.
Thomas Gerbet, Amrit Kumar, Cédric Lauradoux
2016A Quantitative Methodology for Security Monitor Deployment.
Uttam Thakore, Gabriel A. Weaver, William H. Sanders
2016A Sharper Sense of Self: Probabilistic Reasoning of Program Behaviors for Anomaly Detection with Context Sensitivity.
Kui Xu, Ke Tian, Danfeng Yao, Barbara G. Ryder
2016An Evaluation Study on Log Parsing and Its Use in Log Mining.
Pinjia He, Jieming Zhu, Shilin He, Jian Li, Michael R. Lyu
2016BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks.
Xin Hu, Jiyong Jang, Marc Ph. Stoecklin, Ting Wang, Douglas Lee Schales, Dhilung Kirat, Josyula R. Rao
2016Balancing Security and Performance for Agility in Dynamic Threat Environments.
Michael L. Winterrose, Kevin M. Carter, Neal Wagner, William W. Streilein
2016Can We Trust the Privacy Policies of Android Apps?
Le Yu, Xiapu Luo, Xule Liu, Tao Zhang
2016Can't Touch This: Consistent Network Updates for Multiple Policies.
Szymon Dudycz, Arne Ludwig, Stefan Schmid
2016Characterizing the Consistency of Online Services (Practical Experience Report).
Filipe Freitas, João Leitão, Nuno M. Preguiça, Rodrigo Rodrigues
2016DomainProfiler: Discovering Domain Names Abused in Future.
Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Takeshi Yada, Tatsuya Mori, Shigeki Goto
2016Don't Just BYOD, Bring-Your-Own-App Too! Protection via Virtual Micro Security Perimeters.
Gabriel Salles-Loustau, Luis Garcia, Kaustubh R. Joshi, Saman A. Zonouz
2016Dynamic Scalable State Machine Replication.
Long Hoang Le, Carlos Eduardo Benevides Bezerra, Fernando Pedone
2016ELZAR: Triple Modular Redundancy Using Intel AVX (Practical Experience Report).
Dmitrii Kuvaiskii, Oleksii Oleksenko, Pramod Bhatotia, Pascal Felber, Christof Fetzer
2016Efficient Algorithm-Based Fault Tolerance for Sparse Matrix Operations.
Alexander Schöll, Claus Braun, Michael A. Kochte, Hans-Joachim Wunderlich
2016Elastic Parity Logging for SSD RAID Arrays.
Yongkun Li, Helen H. W. Chan, Patrick P. C. Lee, Yinlong Xu
2016Enabling Deep Voltage Scaling in Delay Sensitive L1 Caches.
Chao Yan, Russ Joseph
2016Equipping WAP with WEAPONS to Detect Vulnerabilities: Practical Experience Report.
Iberia Medeiros, Nuno Ferreira Neves, Miguel Correia
2016F-DETA: A Framework for Detecting Electricity Theft Attacks in Smart Grids.
Varun Badrinath Krishna, Kiryung Lee, Gabriel A. Weaver, Ravishankar K. Iyer, William H. Sanders
2016FTP: The Forgotten Cloud.
Drew Springall, Zakir Durumeric, J. Alex Halderman
2016Formal Analysis for Dependable Supervisory Control and Data Acquisition in Smart Grids.
Mohammad Ashiqur Rahman, A. H. M. Jakaria, Ehab Al-Shaer
2016HSFI: Accurate Fault Injection Scalable to Large Code Bases.
Erik van der Kouwe, Andrew S. Tanenbaum
2016JURY: Validating Controller Actions in Software-Defined Networks.
Kshiteej Mahajan, Rishabh Poddar, Mohan Dhawan, Vijay Mann
2016Kizzle: A Signature Compiler for Detecting Exploit Kits.
Ben Stock, Benjamin Livshits, Benjamin G. Zorn
2016Leveraging ECC to Mitigate Read Disturbance, False Reads and Write Faults in STT-RAM.
Seyed Mohammad Seyedzadeh, Rakan Maddah, Alex K. Jones, Rami G. Melhem
2016Making Fast Consensus Generally Faster.
Sebastiano Peluso, Alexandru Turcu, Roberto Palmieri, Giuliano Losa, Binoy Ravindran
2016Malware Slums: Measurement and Analysis of Malware on Traffic Exchanges.
Salman Yousaf, Umar Iqbal, Shehroze Farooqi, Raza Ahmad, Muhammad Zubair Shafiq, Fareed Zaffar
2016Managing Data Center Tickets: Prediction and Active Sizing.
Ji Xue, Robert Birke, Lydia Y. Chen, Evgenia Smirni
2016Mean Field Approximation of Uncertain Stochastic Models.
Luca Bortolussi, Nicolas Gast
2016Measuring the Role of Greylisting and Nolisting in Fighting Spam.
Fabio Pagani, Matteo De Astis, Mariano Graziano, Andrea Lanzi, Davide Balzarotti
2016Methuselah Flash: Rewriting Codes for Extra Long Storage Lifetime.
Georgios Mappouras, Alireza Vahid, A. Robert Calderbank, Daniel J. Sorin
2016Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols.
Devin J. Pohly, Patrick D. McDaniel
2016Network Recovery After Massive Failures.
Novella Bartolini, Stefano Ciavarella, Thomas F. La Porta, Simone Silvestri
2016OI-RAID: A Two-Layer RAID Architecture towards Fast Recovery and High Reliability.
Neng Wang, Yinlong Xu, Yongkun Li, Si Wu
2016OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems.
Koustubha Bhat, Dirk Vogt, Erik van der Kouwe, Ben Gras, Lionel Sambuc, Andrew S. Tanenbaum, Herbert Bos, Cristiano Giuffrida
2016On False Data Injection Attacks Against Railway Traction Power Systems.
Subhash Lakshminarayana, Zhan-Teng Teo, Rui Tan, David K. Y. Yau, Pablo Arboleya
2016Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems.
Kaan Onarlioglu, William Robertson, Engin Kirda
2016PARBOR: An Efficient System-Level Technique to Detect Data-Dependent Failures in DRAM.
Samira Manabi Khan, Donghyuk Lee, Onur Mutlu
2016PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing.
Jianping He, Bin Liu, Deguang Kong, Xuan Bao, Na Wang, Hongxia Jin, George Kesidis
2016Power-Capping Aware Checkpointing: On the Interplay Among Power-Capping, Temperature, Reliability, Performance, and Energy.
Kun Tang, Devesh Tiwari, Saurabh Gupta, Ping Huang, Qiqi Lu, Christian Engelmann, Xubin He
2016Practical, Formal Synthesis and Automatic Enforcement of Security Policies for Android.
Hamid Bagheri, Alireza Sadeghi, Reyhaneh Jabbarvand Behrouz, Sam Malek
2016Process-Oriented Non-intrusive Recovery for Sporadic Operations on Cloud.
Min Fu, Liming Zhu, Ingo Weber, Len Bass, Anna Liu, Xiwei Xu
2016ReadDuo: Constructing Reliable MLC Phase Change Memory through Fast and Robust Readout.
Rujia Wang, Youtao Zhang, Jun Yang
2016Reconsidering Single Failure Recovery in Clustered File Systems.
Zhirong Shen, Jiwu Shu, Patrick P. C. Lee
2016Rekeying for Encrypted Deduplication Storage.
Jingwei Li, Chuan Qin, Patrick P. C. Lee, Jin Li
2016Reliability-Centered Maintenance of the Electrically Insulated Railway Joint via Fault Tree Analysis: A Practical Experience Report.
Enno Ruijters, Dennis Guck, Martijn van Noort, Mariëlle Stoelinga
2016Repackage-Proofing Android Apps.
Lannan Luo, Yu Fu, Dinghao Wu, Sencun Zhu, Peng Liu
2016SDNShield: Reconciliating Configurable Application Permissions for SDN App Markets.
Xitao Wen, Bo Yang, Yan Chen, Chengchen Hu, Yi Wang, Bin Liu, Xiaolin Chen
2016Secure Identification of Actively Executed Code on a Generic Trusted Component.
Bruno Vavala, Nuno Ferreira Neves, Peter Steenkiste
2016Secure Point-of-Care Medical Diagnostics via Trusted Sensing and Cyto-Coded Passwords.
Tuan Le, Gabriel Salles-Loustau, Laleh Najafizadeh, Mehdi Javanmard, Saman A. Zonouz
2016Secure and Efficient Multi-Variant Execution Using Hardware-Assisted Process Virtualization.
Koen Koning, Herbert Bos, Cristiano Giuffrida
2016StorM: Enabling Tenant-Defined Cloud Storage Middle-Box Services.
Hui Lu, Abhinav Srivastava, Brendan Saltaformaggio, Dongyan Xu
2016SuperGlue: IDL-Based, System-Level Fault Tolerance for Embedded Systems.
Jiguo Song, Gedare Bloom, Gabriel Parmer
2016Targeted Attacks on Teleoperated Surgical Robots: Dynamic Model-Based Detection and Mitigation.
Homa Alemzadeh, Daniel Chen, Xiao Li, Thenkurussi Kesavadas, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer
2016Towards a Scalable and Write-Free Multi-version Checkpointing Scheme in Solid State Drives.
Hoda Aghaei Khouzani, Chengmo Yang
2016Uncovering Dynamic Fault Trees.
Sebastian Junges, Dennis Guck, Joost-Pieter Katoen, Mariëlle Stoelinga
2016ePVF: An Enhanced Program Vulnerability Factor Methodology for Cross-Layer Resilience Analysis.
Bo Fang, Qining Lu, Karthik Pattabiraman, Matei Ripeanu, Sudhanva Gurumurthi
2016fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars.
Ding Wang, Debiao He, Haibo Cheng, Ping Wang