default search action
DSN 2014: Atlanta, GA, USA
- 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2014, Atlanta, GA, USA, June 23-26, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-2233-8
DSN 2014
Best Paper Award Session
- Robert Birke, Ioana Giurgiu, Lydia Y. Chen, Dorothea Wiesmann, Ton Engbersen:
Failure Analysis of Virtual and Physical Machines: Patterns, Causes and Characteristics. 1-12 - Cuong Manh Pham, Zachary Estrada, Phuong Cao, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural Invariants. 13-24 - Devesh Tiwari, Saurabh Gupta, Sudharshan S. Vazhkudai:
Lazy Checkpointing: Exploiting Temporal Locality in Failures to Mitigate Checkpointing Overheads on Extreme-Scale Systems. 25-36
Session 1A: Identifying Malicious Activity
- Osama Haq, Waqar Ahmed, Affan A. Syed:
Titan: Enabling Low Overhead and Multi-faceted Network Fingerprinting of a Bot. 37-44 - Gaspar Modelo-Howard, Christopher N. Gutierrez, Fahad A. Arshad, Saurabh Bagchi, Yuan Qi:
pSigene: Webcrawling to Generalize SQL Injection Signatures. 45-56 - Haitao Du, Shanchieh Jay Yang:
Probabilistic Inference for Obfuscated Network Attack Sequences. 57-67
Session 1B: Networking
- Emmanuelle Anceaume, Yann Busnel, Erwan Le Merrer, Romaric Ludinard, Jean Louis Marchand, Bruno Sericola:
Anomaly Characterization in Large Scale Networks. 68-79 - Qin Liu, John C. S. Lui, Cheng He, Lujia Pan, Wei Fan, Yunlong Shi:
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics. 80-87 - Shuyuan Zhang, Franjo Ivancic, Cristian Lumezanu, Yifei Yuan, Aarti Gupta, Sharad Malik:
An Adaptable Rule Placement for Software-Defined Networks. 88-99
Session 2A: Software Vulnerabilities
- Daiping Liu, Haining Wang, Angelos Stavrou:
Detecting Malicious Javascript in PDF through Document Instrumentation. 100-111 - Bin Liang, Wei You, Liangkun Liu, Wenchang Shi, Mario Heiderich:
Scriptless Timing Attacks on Web Browser Privacy. 112-123 - Alex Shaw, Dusten Doggett, Munawar Hafiz:
Automatically Fixing C Buffer Overflows Using Program Transformations. 124-135
Session 2B: Cyber-Physical Systems
- Lee W. Lerner, Zane R. Franklin, William T. Baumann, Cameron D. Patterson:
Application-Level Autonomic Hardware to Predict and Preempt Software Attacks on Industrial Control Systems. 136-147 - Aaron Kane, Thomas E. Fuhrman, Philip Koopman:
Monitor Based Oracles for Cyber-Physical System Testing: Practical Experience Report. 148-155 - Mohammad Ashiqur Rahman, Ehab Al-Shaer, Rajesh G. Kavasseri:
Security Threat Analytics and Countermeasure Synthesis for Power System State Estimation. 156-167
Session 3A: Apps Attacks
- Hossen Asiful Mustafa, Wenyuan Xu, Ahmad-Reza Sadeghi, Steffen Schulz:
You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks. 168-179 - Chenxiong Qian, Xiapu Luo, Yuru Shao, Alvin T. S. Chan:
On Tracking Information Flows through JNI in Android Applications. 180-191 - Amin Kharraz, Engin Kirda, William K. Robertson, Davide Balzarotti, Aurélien Francillon:
Optical Delusions: A Study of Malicious QR Codes in the Wild. 192-203
Session 3B: Memory
- Majid Jalili, Mohammad Arjomand, Hamid Sarbazi-Azad:
A Reliable 3D MLC PCM Architecture with Resistance Drift Predictor. 204-215 - Lei Jiang, Youtao Zhang, Jun Yang:
Mitigating Write Disturbance in Super-Dense Phase Change Memories. 216-227 - Jie Fan, Song Jiang, Jiwu Shu, Long Sun, Qingda Hu:
WL-Reviver: A Framework for Reviving any Wear-Leveling Techniques in the Face of Failures on Phase Change Memory. 228-239
Session 4A: Cloud Computing
- Shankaranarayanan P. N., Ashiwan Sivakumar, Sanjay G. Rao, Mohit Tawarmalani:
Performance Sensitive Replication in Geo-distributed Cloud Datastores. 240-251 - Xiwei Xu, Liming Zhu, Ingo Weber, Len Bass, Daniel Sun:
POD-Diagnosis: Error Diagnosis of Sporadic Operations on Cloud Applications. 252-263 - Quan Jia, Huangxin Wang, Dan Fleck, Fei Li, Angelos Stavrou, Walter Powell:
Catch Me If You Can: A Cloud-Enabled DDoS Defense. 264-275 - Wei Zhang, Sheng Xiao, Yaping Lin, Ting, Siwang Zhou:
Secure Ranked Multi-keyword Search for Multiple Data Owners in Cloud Computing. 276-286
Session 4B: Social and Online Services
- Xiaojing Liao, A. Selcuk Uluagac, Raheem A. Beyah:
S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social Services. 287-298 - Murtuza Jadliwala, Anindya Maiti, Vinod Namboodiri:
Social Puzzles: Context-Based Access Control in Online Social Networks. 299-310 - Rui Ding, Qiang Fu, Jian-Guang Lou, Qingwei Lin, Dongmei Zhang, Tao Xie:
Mining Historical Issue Repositories to Heal Large-Scale Online Service Systems. 311-322 - Ivano Alessandro Elia, Nuno Laranjeiro, Marco Vieira:
Understanding Interoperability Issues of Web Service Frameworks. 323-330
Session 5A: State Machine Replication
- Carlos Eduardo Benevides Bezerra, Fernando Pedone, Robbert van Renesse:
Scalable State-Machine Replication. 331-342 - Jiaqing Du, Daniele Sciascia, Sameh Elnikety, Willy Zwaenepoel, Fernando Pedone:
Clock-RSM: Low-Latency Inter-datacenter State Machine Replication Using Loosely Synchronized Physical Clocks. 343-354 - Alysson Neves Bessani, João Sousa, Eduardo Adílio Pelinson Alchieri:
State Machine Replication for the Masses with BFT-SMART. 355-362
Session 5B: Faults
- Majid Dadashi, Layali Rashid, Karthik Pattabiraman, Sathish Gopalakrishnan:
Hardware-Software Integrated Diagnosis for Intermittent Hardware Faults. 363-374 - Jiesheng Wei, Anna Thomas, Guanpeng Li, Karthik Pattabiraman:
Quantifying the Accuracy of High-Level Fault Injection Techniques for Hardware Faults. 375-382 - Jing Li, Xinpu Ji, Yuhan Jia, Bingpeng Zhu, Gang Wang, Zhongwei Li, Xiaoguang Liu:
Hard Drive Failure Prediction Using Classification and Regression Trees. 383-394
Session 6A: Databases and Storage
- Nicolas Schiper, Vincent Rahli, Robbert van Renesse, Mark Bickford, Robert L. Constable:
Developing Correctly Replicated Databases Using Formal Tools. 395-406 - Nicolas Schiper, Fernando Pedone, Robbert van Renesse:
The Energy Efficiency of Database Replication Protocols. 407-418 - Runhui Li, Patrick P. C. Lee, Yuchong Hu:
Degraded-First Scheduling for MapReduce in Erasure-Coded Storage Clusters. 419-430
Session 6B: GPUs
- Waleed Dweik, Mohammad Abdel-Majeed, Murali Annavaram:
Warped-Shield: Tolerating Hard Faults in GPGPUs. 431-442 - Claus Braun, Sebastian Halder, Hans-Joachim Wunderlich:
A-ABFT: Autonomous Algorithm-Based Fault Tolerance for Matrix Multiplications on Graphics Processing Units. 443-454 - Paolo Rech, Laércio Lima Pilla, Philippe Olivier Alexandre Navaux, Luigi Carro:
Impact of GPUs Parallelism Management on Safety-Critical and HPC Applications Reliability. 455-466
Session 7A: System Configuration and Provisioning
- Yixin Luo, Sriram Govindan, Bikash Sharma, Mark Santaniello, Justin Meza, Aman Kansal, Jie Liu, Badriddine Khessib, Kushagra Vaid, Onur Mutlu:
Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous-Reliability Memory. 467-478 - Zhen Huang, David Lie:
Ocasta: Clustering Configuration Settings for Error Recovery. 479-490 - Zhongshu Gu, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine. 491-502
Session 7B: Formal Methods
- Peter Buchholz, Jan Kriege, Dimitri Scheftelowitsch:
Model Checking Stochastic Automata for Dependability and Performance Measures. 503-514 - Jin B. Hong, Dong Seong Kim:
Scalable Security Models for Assessing Effectiveness of Moving Target Defenses. 515-526 - Minh Lê, Josef Weidendorfer, Max Walter:
A Novel Variable Ordering Heuristic for BDD-based K-Terminal Reliability. 527-537
Session 8A: System and Component Reliability
- Ronaldo Rodrigues Ferreira, Jean da Rolt, Gabriel L. Nazar, Álvaro Freitas Moreira, Luigi Carro:
Adaptive Low-Power Architecture for High-Performance and Reliable Embedded Computing. 538-549 - Zhirong Shen, Jiwu Shu:
HV Code: An All-Around MDS Code to Improve Efficiency and Reliability of RAID-6 Systems. 550-561 - Peng Wang, Kaiyuan Zhang, Rong Chen, Haibo Chen, Haibing Guan:
Replication-Based Fault-Tolerance for Large-Scale Graph Processing. 562-573
Session 8B: Miscellaneous
- Rui Wu, Ping Chen, Peng Liu, Bing Mao:
System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection Needs. 574-585 - Stephen Mason, Ilir Gashi, Luca Lugini, Emanuela Marasco, Bojan Cukic:
Interoperability between Fingerprint Biometric Systems: An Empirical Study. 586-597 - Yizheng Chen, Manos Antonakakis, Roberto Perdisci, Yacin Nadji, David Dagon, Wenke Lee:
DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic. 598-609
Session 9: Failure Analysis and Assurance
- Catello Di Martino, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Fabio Baccanico, Joseph Fullop, William Kramer:
Lessons Learned from the Analysis of System Failures at Petascale: The Case of Blue Waters. 610-621 - Konstantinos Parasyris, Georgios Tziantzoulis, Christos D. Antonopoulos, Nikolaos Bellas:
GemFI: A Fault Injection Tool for Studying the Behavior of Applications on Unreliable Substrates. 622-629 - Yutaka Matsuno:
A Design and Implementation of an Assurance Case Language. 630-641
The Fourth International Workshop on Dependability of Clouds, Data Centers and Virtual Machine Technology (DCDV 2014)
(DCDV 2014) Session 1: Cloud Dependability
- Min Fu, Liming Zhu, Len Bass, Anna Liu:
Recovery for Failures in Rolling Upgrade on Clouds. 642-647 - Arthur Martens, Christoph Borchert, Tobias Oliver Geissler, Daniel Lohmann, Olaf Spinczyk, Rüdiger Kapitza:
Crosscheck: Hardening Replicated Multithreaded Services. 648-653 - Vasily A. Sartakov, Rüdiger Kapitza:
NV-Hypervisor: Hypervisor-Based Persistence for Virtual Machines. 654-659
Session 2: Dependability Evaluation
- Ruofan Xia, Fumio Machida, Kishor S. Trivedi:
A Markov Decision Process Approach for Optimal Data Backup Scheduling. 660-665 - Julian Araujo, Paulo Romero Martins Maciel, Matheus Torquato, Gustavo Rau de Almeida Callou, Ermeson C. Andrade:
Availability Evaluation of Digital Library Cloud Services. 666-671 - Subrota K. Mondal, Jogesh K. Muppala:
Defects per Million (DPM) Evaluation for a Cloud Dealing with VM Failures Using Checkpointing. 672-677
The First International Workshop on Dependability and Security of System Operation (DSSO 2014)
(DSSO 2014) Session 1: Error Detection and Diagnosis
- Anneliese Amschler Andrews, Joseph Lucente:
Predicting Incident Reports for IT Help Desk. 678-683 - Jin B. Hong, Dong Seong Kim, Abdelkrim Haqiq:
What Vulnerability Do We Need to Patch First? 684-689 - Marcello Cinque, Domenico Cotroneo, Raffaele Della Corte, Antonio Pecchia:
What Logs Should You Look at When an Application Fails? Insights from an Industrial Case Study. 690-695
Session 2: Design Strategies for Dependability
- Min Fu, Len Bass, Anna Liu:
Towards a Taxonomy of Cloud Recovery Strategies. 696-701 - Stephany Bellomo, Neil A. Ernst, Robert L. Nord, Rick Kazman:
Toward Design Decisions to Enable Deployability: Empirical Study of Three Projects Reaching for the Continuous Delivery Holy Grail. 702-707
The Fourth Fault Tolerance for HPC at eXtreme Scale (FTXS) Workshop 2014
Session 1: Checkpoint/Restart Modeling and Message Logging
- Dewan Ibtesham, David Debonis, Dorian C. Arnold, Kurt B. Ferreira:
Coarse-Grained Energy Modeling of Rollback/Recovery Mechanisms. 708-713 - Hideyuki Jitsumoto, Yuki Todoroki, Yutaka Ishikawa, Mitsuhisa Sato:
Grid-Oriented Process Clustering System for Partial Message Logging. 714-719
Session 2: Application and Algorithm Resiliency
- Bo Fang, Karthik Pattabiraman, Matei Ripeanu, Sudhanva Gurumurthi:
Evaluating the Error Resilience of Parallel Programs. 720-725 - Thomas B. Jones, David H. Ackley:
Comparison Criticality in Sorting Algorithms. 726-731
Session 3: Hardware - Reliability Studies and Tailored Resilience Techniques
- Daniel A. G. de Oliveira, Caio B. Lunardi, Laércio Lima Pilla, Paolo Rech, Philippe Olivier Alexandre Navaux, Luigi Carro:
Radiation Sensitivity of High Performance Computing Applications on Kepler-Based GPGPUs. 732-737 - Sudarsun Kannan, Naila Farooqui, Ada Gavrilovska, Karsten Schwan:
HeteroCheckpoint: Efficient Checkpointing for Accelerator-Based Systems. 738-743 - Bin Huang, Ron Sass, Nathan DeBardeleben, Sean Blanchard:
Harnessing Unreliable Cores in Heterogeneous Architecture: The PyDac Programming Model and Runtime. 744-749
Session 4: Resiliency in HPC Messaging
- Amin Hassani, Anthony Skjellum, Ron Brightwell:
Design and Evaluation of FA-MPI, a Transactional Resilience Scheme for Non-blocking MPI. 750-755 - Jeremiah J. Wilke, Janine Bennett, Hemanth Kolla, Keita Teranishi, Nicole Slattengren, John Floren:
Extreme-Scale Viability of Collective Communication for Resilient Task Scheduling and Work Stealing. 756-761
The First International Workshop on Trustworthiness of Smart Grids (ToSG 2014)
(ToSG 2014) Session
- Jianhua Zhang, Aranya Chakrabortty, Yufeng Xin:
Distributed Implementation of Wide-Area Monitoring Algorithms for Power Systems Using a US-Wide ExoGENI-WAMS Testbed. 762-767 - Yiming Wu, Davood Babazadeh, Lars Nordström:
Stateful Data Delivery Service for Wide Area Monitoring and Control Applications. 768-773 - Masood Parvania, Georgia Koutsandria, Vishak Muthukumar, Sean Peisert, Chuck McParland, Anna Scaglione:
Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems. 774-779 - Xiaojing Liao, David Formby, Carson Day, Raheem A. Beyah:
Towards Secure Metering Data Analysis via Distributed Differential Privacy. 780-785
Session
- Tara D. Gibson, Selim Ciraci, Sharma Poorva, Craig Allwardt, Mark Rice, Bora A. Akyol:
An Integrated Security Framework for GOSS Power Grid Analytics Platform. 786-791 - Zhiyuan Teo, Vera Kutsenko, Ken Birman, Robbert van Renesse:
Ironstack: Performance, Stability and Security for Power Grid Data Networks. 792-797
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.