| 2016 | 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016, Toulouse, France, June 28 - July 1, 2016 |
| 2016 | A Model-Based Approach to Support Safety-Related Decisions in the Petroleum Domain. Leonardo Montecchi, Atle Refsdal, Paolo Lollini, Andrea Bondavalli |
| 2016 | A Privacy Analysis of Google and Yandex Safe Browsing. Thomas Gerbet, Amrit Kumar, Cédric Lauradoux |
| 2016 | A Quantitative Methodology for Security Monitor Deployment. Uttam Thakore, Gabriel A. Weaver, William H. Sanders |
| 2016 | A Sharper Sense of Self: Probabilistic Reasoning of Program Behaviors for Anomaly Detection with Context Sensitivity. Kui Xu, Ke Tian, Danfeng Yao, Barbara G. Ryder |
| 2016 | An Evaluation Study on Log Parsing and Its Use in Log Mining. Pinjia He, Jieming Zhu, Shilin He, Jian Li, Michael R. Lyu |
| 2016 | BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks. Xin Hu, Jiyong Jang, Marc Ph. Stoecklin, Ting Wang, Douglas Lee Schales, Dhilung Kirat, Josyula R. Rao |
| 2016 | Balancing Security and Performance for Agility in Dynamic Threat Environments. Michael L. Winterrose, Kevin M. Carter, Neal Wagner, William W. Streilein |
| 2016 | Can We Trust the Privacy Policies of Android Apps? Le Yu, Xiapu Luo, Xule Liu, Tao Zhang |
| 2016 | Can't Touch This: Consistent Network Updates for Multiple Policies. Szymon Dudycz, Arne Ludwig, Stefan Schmid |
| 2016 | Characterizing the Consistency of Online Services (Practical Experience Report). Filipe Freitas, João Leitão, Nuno M. Preguiça, Rodrigo Rodrigues |
| 2016 | DomainProfiler: Discovering Domain Names Abused in Future. Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Takeshi Yada, Tatsuya Mori, Shigeki Goto |
| 2016 | Don't Just BYOD, Bring-Your-Own-App Too! Protection via Virtual Micro Security Perimeters. Gabriel Salles-Loustau, Luis Garcia, Kaustubh R. Joshi, Saman A. Zonouz |
| 2016 | Dynamic Scalable State Machine Replication. Long Hoang Le, Carlos Eduardo Benevides Bezerra, Fernando Pedone |
| 2016 | ELZAR: Triple Modular Redundancy Using Intel AVX (Practical Experience Report). Dmitrii Kuvaiskii, Oleksii Oleksenko, Pramod Bhatotia, Pascal Felber, Christof Fetzer |
| 2016 | Efficient Algorithm-Based Fault Tolerance for Sparse Matrix Operations. Alexander Schöll, Claus Braun, Michael A. Kochte, Hans-Joachim Wunderlich |
| 2016 | Elastic Parity Logging for SSD RAID Arrays. Yongkun Li, Helen H. W. Chan, Patrick P. C. Lee, Yinlong Xu |
| 2016 | Enabling Deep Voltage Scaling in Delay Sensitive L1 Caches. Chao Yan, Russ Joseph |
| 2016 | Equipping WAP with WEAPONS to Detect Vulnerabilities: Practical Experience Report. Iberia Medeiros, Nuno Ferreira Neves, Miguel Correia |
| 2016 | F-DETA: A Framework for Detecting Electricity Theft Attacks in Smart Grids. Varun Badrinath Krishna, Kiryung Lee, Gabriel A. Weaver, Ravishankar K. Iyer, William H. Sanders |
| 2016 | FTP: The Forgotten Cloud. Drew Springall, Zakir Durumeric, J. Alex Halderman |
| 2016 | Formal Analysis for Dependable Supervisory Control and Data Acquisition in Smart Grids. Mohammad Ashiqur Rahman, A. H. M. Jakaria, Ehab Al-Shaer |
| 2016 | HSFI: Accurate Fault Injection Scalable to Large Code Bases. Erik van der Kouwe, Andrew S. Tanenbaum |
| 2016 | JURY: Validating Controller Actions in Software-Defined Networks. Kshiteej Mahajan, Rishabh Poddar, Mohan Dhawan, Vijay Mann |
| 2016 | Kizzle: A Signature Compiler for Detecting Exploit Kits. Ben Stock, Benjamin Livshits, Benjamin G. Zorn |
| 2016 | Leveraging ECC to Mitigate Read Disturbance, False Reads and Write Faults in STT-RAM. Seyed Mohammad Seyedzadeh, Rakan Maddah, Alex K. Jones, Rami G. Melhem |
| 2016 | Making Fast Consensus Generally Faster. Sebastiano Peluso, Alexandru Turcu, Roberto Palmieri, Giuliano Losa, Binoy Ravindran |
| 2016 | Malware Slums: Measurement and Analysis of Malware on Traffic Exchanges. Salman Yousaf, Umar Iqbal, Shehroze Farooqi, Raza Ahmad, Muhammad Zubair Shafiq, Fareed Zaffar |
| 2016 | Managing Data Center Tickets: Prediction and Active Sizing. Ji Xue, Robert Birke, Lydia Y. Chen, Evgenia Smirni |
| 2016 | Mean Field Approximation of Uncertain Stochastic Models. Luca Bortolussi, Nicolas Gast |
| 2016 | Measuring the Role of Greylisting and Nolisting in Fighting Spam. Fabio Pagani, Matteo De Astis, Mariano Graziano, Andrea Lanzi, Davide Balzarotti |
| 2016 | Methuselah Flash: Rewriting Codes for Extra Long Storage Lifetime. Georgios Mappouras, Alireza Vahid, A. Robert Calderbank, Daniel J. Sorin |
| 2016 | Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols. Devin J. Pohly, Patrick D. McDaniel |
| 2016 | Network Recovery After Massive Failures. Novella Bartolini, Stefano Ciavarella, Thomas F. La Porta, Simone Silvestri |
| 2016 | OI-RAID: A Two-Layer RAID Architecture towards Fast Recovery and High Reliability. Neng Wang, Yinlong Xu, Yongkun Li, Si Wu |
| 2016 | OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems. Koustubha Bhat, Dirk Vogt, Erik van der Kouwe, Ben Gras, Lionel Sambuc, Andrew S. Tanenbaum, Herbert Bos, Cristiano Giuffrida |
| 2016 | On False Data Injection Attacks Against Railway Traction Power Systems. Subhash Lakshminarayana, Zhan-Teng Teo, Rui Tan, David K. Y. Yau, Pablo Arboleya |
| 2016 | Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems. Kaan Onarlioglu, William Robertson, Engin Kirda |
| 2016 | PARBOR: An Efficient System-Level Technique to Detect Data-Dependent Failures in DRAM. Samira Manabi Khan, Donghyuk Lee, Onur Mutlu |
| 2016 | PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing. Jianping He, Bin Liu, Deguang Kong, Xuan Bao, Na Wang, Hongxia Jin, George Kesidis |
| 2016 | Power-Capping Aware Checkpointing: On the Interplay Among Power-Capping, Temperature, Reliability, Performance, and Energy. Kun Tang, Devesh Tiwari, Saurabh Gupta, Ping Huang, Qiqi Lu, Christian Engelmann, Xubin He |
| 2016 | Practical, Formal Synthesis and Automatic Enforcement of Security Policies for Android. Hamid Bagheri, Alireza Sadeghi, Reyhaneh Jabbarvand Behrouz, Sam Malek |
| 2016 | Process-Oriented Non-intrusive Recovery for Sporadic Operations on Cloud. Min Fu, Liming Zhu, Ingo Weber, Len Bass, Anna Liu, Xiwei Xu |
| 2016 | ReadDuo: Constructing Reliable MLC Phase Change Memory through Fast and Robust Readout. Rujia Wang, Youtao Zhang, Jun Yang |
| 2016 | Reconsidering Single Failure Recovery in Clustered File Systems. Zhirong Shen, Jiwu Shu, Patrick P. C. Lee |
| 2016 | Rekeying for Encrypted Deduplication Storage. Jingwei Li, Chuan Qin, Patrick P. C. Lee, Jin Li |
| 2016 | Reliability-Centered Maintenance of the Electrically Insulated Railway Joint via Fault Tree Analysis: A Practical Experience Report. Enno Ruijters, Dennis Guck, Martijn van Noort, Mariëlle Stoelinga |
| 2016 | Repackage-Proofing Android Apps. Lannan Luo, Yu Fu, Dinghao Wu, Sencun Zhu, Peng Liu |
| 2016 | SDNShield: Reconciliating Configurable Application Permissions for SDN App Markets. Xitao Wen, Bo Yang, Yan Chen, Chengchen Hu, Yi Wang, Bin Liu, Xiaolin Chen |
| 2016 | Secure Identification of Actively Executed Code on a Generic Trusted Component. Bruno Vavala, Nuno Ferreira Neves, Peter Steenkiste |
| 2016 | Secure Point-of-Care Medical Diagnostics via Trusted Sensing and Cyto-Coded Passwords. Tuan Le, Gabriel Salles-Loustau, Laleh Najafizadeh, Mehdi Javanmard, Saman A. Zonouz |
| 2016 | Secure and Efficient Multi-Variant Execution Using Hardware-Assisted Process Virtualization. Koen Koning, Herbert Bos, Cristiano Giuffrida |
| 2016 | StorM: Enabling Tenant-Defined Cloud Storage Middle-Box Services. Hui Lu, Abhinav Srivastava, Brendan Saltaformaggio, Dongyan Xu |
| 2016 | SuperGlue: IDL-Based, System-Level Fault Tolerance for Embedded Systems. Jiguo Song, Gedare Bloom, Gabriel Parmer |
| 2016 | Targeted Attacks on Teleoperated Surgical Robots: Dynamic Model-Based Detection and Mitigation. Homa Alemzadeh, Daniel Chen, Xiao Li, Thenkurussi Kesavadas, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer |
| 2016 | Towards a Scalable and Write-Free Multi-version Checkpointing Scheme in Solid State Drives. Hoda Aghaei Khouzani, Chengmo Yang |
| 2016 | Uncovering Dynamic Fault Trees. Sebastian Junges, Dennis Guck, Joost-Pieter Katoen, Mariëlle Stoelinga |
| 2016 | ePVF: An Enhanced Program Vulnerability Factor Methodology for Cross-Layer Resilience Analysis. Bo Fang, Qining Lu, Karthik Pattabiraman, Matei Ripeanu, Sudhanva Gurumurthi |
| 2016 | fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars. Ding Wang, Debiao He, Haibo Cheng, Ping Wang |