DSN A

63 papers

YearTitle / Authors
201848th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018, Luxembourg City, Luxembourg, June 25-28, 2018
2018A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform.
João Sousa, Alysson Bessani, Marko Vukolic
2018A Framework for Evaluating Software on Reduced Margins Hardware.
Konstantinos Parasyris, Panos K. Koutsovasilis, Vassilis Vassiliadis, Christos D. Antonopoulos, Nikolaos Bellas, Spyros Lalis
2018A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly.
Baojun Liu, Chaoyi Lu, Zhou Li, Ying Liu, Hai-Xin Duan, Shuang Hao, Zaifeng Zhang
2018Algorithmic Attack Synthesis Using Hybrid Dynamics of Power Grid Critical Infrastructures.
Zhenqi Huang, Sriharsha Etigowni, Luis Garcia, Sayan Mitra, Saman A. Zonouz
2018Alpha Entanglement Codes: Practical Erasure Codes to Archive Data in Unreliable Environments.
Vero Estrada-Galiñanes, Ethan L. Miller, Pascal Felber, Jehan-François Pâris
2018Branching Bisimulation and Concurrent Object Verification.
Xiaoxiao Yang, Joost-Pieter Katoen, Huimin Lin, Gaoang Liu, Hao Wu
2018Byzantine Fault-Tolerant Atomic Multicast.
Paulo R. Coelho, Tarcisio Ceolin Junior, Alysson Bessani, Fernando Luís Dotti, Fernando Pedone
2018Code-Dependent and Architecture-Dependent Reliability Behaviors.
Vinicius Fratin, Daniel Oliveira, Caio B. Lunardi, Fernando Santos, Gennaro Severino Rodrigues, Paolo Rech
2018Collaborative Filtering Under a Sybil Attack: Similarity Metrics do Matter!
Antoine Boutet, Florestan De Moor, Davide Frey, Rachid Guerraoui, Anne-Marie Kermarrec, Antoine Rault
2018Cost-Benefit Analysis of Moving-Target Defense in Power Grids.
Subhash Lakshminarayana, David K. Y. Yau
2018DAVOS: EDA Toolkit for Dependability Assessment, Verification, Optimisation and Selection of Hardware Models.
Ilya Tuzov, David de Andrés, Juan Carlos Ruiz
2018DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware.
Kai Cheng, Qiang Li, Lei Wang, Qian Chen, Yaowen Zheng, Limin Sun, Zhenkai Liang
2018Deceptive Secret Sharing.
Lei Zhang, Douglas M. Blough
2018Detecting and Identifying Faulty IoT Devices in Smart Home with Context Extraction.
Jiwon Choi, Hayoung Jeoung, Jihun Kim, Youngjoo Ko, Wonup Jung, Hanjun Kim, Jong Kim
2018DexLego: Reassembleable Bytecode Extraction for Aiding Static Analysis.
Zhenyu Ning, Fengwei Zhang
2018Divide and Conquer for Fast SRLG Disjoint Routing.
Kun Xie, Heng Tao, Xin Wang, Gaogang Xie, Jigang Wen, Jiannong Cao, Zheng Qin
2018Effective Topology Tampering Attacks and Defenses in Software-Defined Networks.
Richard Skowyra, Lei Xu, Guofei Gu, Veer Dedhia, Thomas Hobson, Hamed Okhravi, James Landry
2018Efficient Transient Analysis of a Class of Compositional Fluid Stochastic Petri Nets.
Peter Buchholz, Tugrul Dayar
2018EndBox: Scalable Middlebox Functions Using Client-Side Trusted Execution.
David Goltzsche, Signe Rüsch, Manuel Nieke, Sébastien Vaucher, Nico Weichbrodt, Valerio Schiavoni, Pierre-Louis Aublin, Paolo Costa, Christof Fetzer, Pascal Felber, Peter R. Pietzuch, Rüdiger Kapitza
2018Evaluating Self-Adaptive Authorisation Infrastructures Through Gamification.
Christopher Michael Bailey, Rogério de Lemos
2018FAROS: Illuminating In-memory Injection Attacks via Provenance-Based Whole-System Dynamic Information Flow Tracking.
Meisam Navaki Arefi, Geoffrey Alexander, Hooman Rokham, Aokun Chen, Michalis Faloutsos, Xuetao Wei, Daniela Seabra Oliveira, Jedidiah R. Crandall
2018Falcon: A Practical Log-Based Analysis Tool for Distributed Systems.
Francisco Neves, Nuno Machado, José Pereira
2018Fast Hypervisor Recovery Without Reboot.
Diyu Zhou, Yuval Tamir
2018FragDroid: Automated User Interface Interaction with Activity and Fragment Analysis in Android Applications.
Jia Chen, Ge Han, Shanqing Guo, Wenrui Diao
2018Generating Cloud Monitors from Models to Secure Clouds.
Elena Troubitsyna, Irum Rauf
2018Hands Off the Wheel in Autonomous Vehicles?: A Systems Perspective on over a Million Miles of Field Data.
Subho S. Banerjee, Saurabh Jha, James Cyriac, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer
2018How Reliable is My Wearable: A Fuzz Testing-Based Study.
Edgardo Barsallo Yi, Amiya Maji, Saurabh Bagchi
2018IBBE-SGX: Cryptographic Group Access Control Using Trusted Execution Environments.
Stefan Contiu, Rafael Pires, Sébastien Vaucher, Marcelo Pasin, Pascal Felber, Laurent Réveillère
2018Impact of Software Approximations on the Resiliency of a Video Summarization System.
Radha Venkatagiri, Karthik Swaminathan, Chung-Ching Lin, Liang Wang, Alper Buyuktosunoglu, Pradip Bose, Sarita V. Adve
2018Importance Sampling of Interval Markov Chains.
Cyrille Jégourel, Jingyi Wang, Jun Sun
2018In Production Performance Testing of SDN Control Plane for Telecom Operators.
Catello Di Martino, Ugo Giordano, Nishok Mohanasamy, Stefano Russo, Marina Thottan
2018Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective.
Sadegh Torabi, Elias Bou-Harb, Chadi Assi, Mario Galluscio, Amine Boukhtouta, Mourad Debbabi
2018Localizing Function Errors in Mobile Apps with User Reviews.
Le Yu, Jiachi Chen, Hao Zhou, Xiapu Luo, Kang Liu
2018Low Overhead Tag Error Mitigation for GPU Architectures.
Atieh Lotfi, Nirmal R. Saxena, Richard Bramley, Paul Racunas, Philip P. Shirvani
2018Machine Learning Models for GPU Error Prediction in a Large Scale HPC System.
Bin Nie, Ji Xue, Saurabh Gupta, Tirthak Patel, Christian Engelmann, Evgenia Smirni, Devesh Tiwari
2018Manufacturing Resilient Bi-Opaque Predicates Against Symbolic Execution.
Hui Xu, Yangfan Zhou, Yu Kang, Fengzhi Tu, Michael R. Lyu
2018Measuring IPv6 DNS Reconnaissance Attacks and Preventing Them Using DNS Guard.
Qinwen Hu, Muhammad Rizwan Asghar, Nevil Brownlee
2018Migrating SGX Enclaves with Persistent State.
Fritz Alder, Arseny Kurnikov, Andrew Paverd, N. Asokan
2018MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices.
Bing Chang, Fengwei Zhang, Bo Chen, Yingjiu Li, Wen Tao Zhu, Yangguang Tian, Zhan Wang, Albert Ching
2018Modeling Input-Dependent Error Propagation in Programs.
Guanpeng Li, Karthik Pattabiraman
2018Modeling Soft-Error Propagation in Programs.
Guanpeng Li, Karthik Pattabiraman, Siva Kumar Sastry Hari, Michael B. Sullivan, Timothy Tsai
2018Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid.
Amy Babay, Thomas Tantillo, Trevor Aron, Marco Platania, Yair Amir
2018OWL: Understanding and Detecting Concurrency Attacks.
Shixiong Zhao, Rui Gu, Haoran Qiu, Tsz On Li, Yuexuan Wang, Heming Cui, Junfeng Yang
2018Obfuscated VBA Macro Detection Using Machine Learning.
Sangwoo Kim, Seokmyung Hong, Jaesang Oh, Heejo Lee
2018On the Challenges of Building a BFT SCADA.
André Nogueira, Miguel Garcia, Alysson Bessani, Nuno Neves
2018POWERALERT: Integrity Checking Using Power Measurement and a Game-Theoretic Strategy.
Ahmed M. Fawaz, Mohammad A. Noureddine, William H. Sanders
2018Parallel Error Detection Using Heterogeneous Cores.
Sam Ainsworth, Timothy M. Jones
2018Pleiades: Distributed Structural Invariants at Scale.
Simon Bouget, Yérom-David Bromberg, Adrien Luxey, François Taïani
2018Practical Experience: Methodologies for Measuring Route Origin Validation.
Tomas Hlavacek, Amir Herzberg, Haya Schulmann, Michael Waidner
2018PreInfer: Automatic Inference of Preconditions via Symbolic Analysis.
Angello Astorga, Siwakorn Srisakaokul, Xusheng Xiao, Tao Xie
2018RDMC: A Reliable RDMA Multicast for Large Objects.
Jonathan Behrens, Sagar Jha, Ken Birman, Edward Tremel
2018RECAST: Random Entanglement for Censorship-Resistant Archival STorage.
Roberta Barbi, Dorian Burihabwa, Pascal Felber, Hugues Mercier, Valerio Schiavoni
2018RoboADS: Anomaly Detection Against Sensor and Actuator Misbehaviors in Mobile Robots.
Pinyao Guo, Hunmin Kim, Nurali Virani, Jun Xu, Minghui Zhu, Peng Liu
2018Shiraz: Exploiting System Reliability and Application Resilience Characteristics to Improve Large Scale System Throughput.
Rohan Garg, Tirthak Patel, Gene Cooperman, Devesh Tiwari
2018Specification-Based Protocol Obfuscation.
Julien Duchêne, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Colas Le Guernic
2018The Tortoise and the Hare: Characterizing Synchrony in Distributed Environments (Practical Experience Report).
Daniel Porto, João Leitão, Flavio Junqueira, Rodrigo Rodrigues
2018To Detect Stack Buffer Overflow with Polymorphic Canaries.
Zhilong Wang, Xuhua Ding, Chengbin Pang, Jian Guo, Jun Zhu, Bing Mao
2018Troxy: Transparent Access to Byzantine Fault-Tolerant Systems.
Bijun Li, Nico Weichbrodt, Johannes Behl, Pierre-Louis Aublin, Tobias Distler, Rüdiger Kapitza
2018Understanding and Analyzing Interconnect Errors and Network Congestion on a Large Scale HPC System.
Mohit Kumar, Saurabh Gupta, Tirthak Patel, Michael Wilder, Weisong Shi, Song Fu, Christian Engelmann, Devesh Tiwari
2018Wren: Nonblocking Reads in a Partitioned Transactional Causally Consistent Data Store.
Kristina Spirovska, Diego Didona, Willy Zwaenepoel
2018Your Remnant Tells Secret: Residual Resolution in DDoS Protection Services.
Lin Jin, Shuai Hao, Haining Wang, Chase Cotton
2018ZOE: Content-Based Anomaly Detection for Industrial Control Systems.
Christian Wressnegger, Ansgar Kellner, Konrad Rieck