default search action
46th DSN 2016: Toulouse, France
- 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016, Toulouse, France, June 28 - July 1, 2016. IEEE Computer Society 2016, ISBN 978-1-4673-8891-7
Dependability Sessions
Best Paper Candidates
- Uttam Thakore, Gabriel A. Weaver, William H. Sanders:
A Quantitative Methodology for Security Monitor Deployment. 1-12 - Long Hoang Le, Carlos Eduardo Benevides Bezerra, Fernando Pedone:
Dynamic Scalable State Machine Replication. 13-24 - Koustubha Bhat, Dirk Vogt, Erik van der Kouwe, Ben Gras, Lionel Sambuc, Andrew S. Tanenbaum, Herbert Bos, Cristiano Giuffrida:
OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems. 25-36
Storage Systems
- Hoda Aghaei Khouzani, Chengmo Yang:
Towards a Scalable and Write-Free Multi-version Checkpointing Scheme in Solid State Drives. 37-48 - Yongkun Li, Helen H. W. Chan, Patrick P. C. Lee, Yinlong Xu:
Elastic Parity Logging for SSD RAID Arrays. 49-60 - Neng Wang, Yinlong Xu, Yongkun Li, Si Wu:
OI-RAID: A Two-Layer RAID Architecture towards Fast Recovery and High Reliability. 61-72
Clouds and Networks
- Hui Lu, Abhinav Srivastava, Brendan Saltaformaggio, Dongyan Xu:
StorM: Enabling Tenant-Defined Cloud Storage Middle-Box Services. 73-84 - Min Fu, Liming Zhu, Ingo Weber, Len Bass, Anna Liu, Xiwei Xu:
Process-Oriented Non-intrusive Recovery for Sporadic Operations on Cloud. 85-96 - Novella Bartolini, Stefano Ciavarella, Thomas F. La Porta, Simone Silvestri:
Network Recovery After Massive Failures. 97-108
Software-Defined Networks
- Kshiteej Mahajan, Rishabh Poddar, Mohan Dhawan, Vijay Mann:
JURY: Validating Controller Actions in Software-Defined Networks. 109-120 - Xitao Wen, Bo Yang, Yan Chen, Chengchen Hu, Yi Wang, Bin Liu, Xiaolin Chen:
SDNShield: Reconciliating Configurable Application Permissions for SDN App Markets. 121-132 - Szymon Dudycz, Arne Ludwig, Stefan Schmid:
Can't Touch This: Consistent Network Updates for Multiple Policies. 133-143
Software Dependability
- Erik van der Kouwe, Andrew S. Tanenbaum:
HSFI: Accurate Fault Injection Scalable to Large Code Bases. 144-155 - Sebastiano Peluso, Alexandru Turcu, Roberto Palmieri, Giuliano Losa, Binoy Ravindran:
Making Fast Consensus Generally Faster. 156-167 - Bo Fang, Qining Lu, Karthik Pattabiraman, Matei Ripeanu, Sudhanva Gurumurthi:
ePVF: An Enhanced Program Vulnerability Factor Methodology for Cross-Layer Resilience Analysis. 168-179
Memory and Caches
- Georgios Mappouras, Alireza Vahid, A. Robert Calderbank, Daniel J. Sorin:
Methuselah Flash: Rewriting Codes for Extra Long Storage Lifetime. 180-191 - Chao Yan, Russ Joseph:
Enabling Deep Voltage Scaling in Delay Sensitive L1 Caches. 192-202 - Rujia Wang, Youtao Zhang, Jun Yang:
ReadDuo: Constructing Reliable MLC Phase Change Memory through Fast and Robust Readout. 203-214
Hardware Errors Resiliency
- Seyed Mohammad Seyedzadeh, Rakan Maddah, Alex K. Jones, Rami G. Melhem:
Leveraging ECC to Mitigate Read Disturbance, False Reads and Write Faults in STT-RAM. 215-226 - Jiguo Song, Gedare Bloom, Gabriel Parmer:
SuperGlue: IDL-Based, System-Level Fault Tolerance for Embedded Systems. 227-238 - Samira Manabi Khan, Donghyuk Lee, Onur Mutlu:
PARBOR: An Efficient System-Level Technique to Detect Data-Dependent Failures in DRAM. 239-250
Dependability Applications
- Alexander Schöll, Claus Braun, Michael A. Kochte, Hans-Joachim Wunderlich:
Efficient Algorithm-Based Fault Tolerance for Sparse Matrix Operations. 251-262 - Mohammad Ashiqur Rahman, A. H. M. Jakaria, Ehab Al-Shaer:
Formal Analysis for Dependable Supervisory Control and Data Acquisition in Smart Grids. 263-274 - Leonardo Montecchi, Atle Refsdal, Paolo Lollini, Andrea Bondavalli:
A Model-Based Approach to Support Safety-Related Decisions in the Petroleum Domain. 275-286
Models
- Luca Bortolussi, Nicolas Gast:
Mean Field Approximation of Uncertain Stochastic Models. 287-298 - Sebastian Junges, Dennis Guck, Joost-Pieter Katoen, Mariëlle Stoelinga:
Uncovering Dynamic Fault Trees. 299-310
Data Centers Dependability
- Kun Tang, Devesh Tiwari, Saurabh Gupta, Ping Huang, Qiqi Lu, Christian Engelmann, Xubin He:
Power-Capping Aware Checkpointing: On the Interplay Among Power-Capping, Temperature, Reliability, Performance, and Energy. 311-322 - Zhirong Shen, Jiwu Shu, Patrick P. C. Lee:
Reconsidering Single Failure Recovery in Clustered File Systems. 323-334 - Ji Xue, Robert Birke, Lydia Y. Chen, Evgenia Smirni:
Managing Data Center Tickets: Prediction and Active Sizing. 335-346
Security Sessions
Privacy
- Thomas Gerbet, Amrit Kumar, Cédric Lauradoux:
A Privacy Analysis of Google and Yandex Safe Browsing. 347-358 - Jianping He, Bin Liu, Deguang Kong, Xuan Bao, Na Wang, Hongxia Jin, George Kesidis:
PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing. 359-370 - Devin J. Pohly, Patrick D. McDaniel:
Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols. 371-382
Cyber-physical Systems Security
- Subhash Lakshminarayana, Zhan-Teng Teo, Rui Tan, David K. Y. Yau, Pablo Arboleya:
On False Data Injection Attacks Against Railway Traction Power Systems. 383-394 - Homa Alemzadeh, Daniel Chen, Xiao Li, Thenkurussi Kesavadas, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Targeted Attacks on Teleoperated Surgical Robots: Dynamic Model-Based Detection and Mitigation. 395-406 - Varun Badrinath Krishna, Kiryung Lee, Gabriel A. Weaver, Ravishankar K. Iyer, William H. Sanders:
F-DETA: A Framework for Detecting Electricity Theft Attacks in Smart Grids. 407-418
Operating Systems Security and Privacy
- Bruno Vavala, Nuno Ferreira Neves, Peter Steenkiste:
Secure Identification of Actively Executed Code on a Generic Trusted Component. 419-430 - Koen Koning, Herbert Bos, Cristiano Giuffrida:
Secure and Efficient Multi-Variant Execution Using Hardware-Assisted Process Virtualization. 431-442 - Kaan Onarlioglu, William Robertson, Engin Kirda:
Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems. 443-454
Anomaly Detection and Exploits
- Ben Stock, Benjamin Livshits, Benjamin G. Zorn:
Kizzle: A Signature Compiler for Detecting Exploit Kits. 455-466 - Kui Xu, Ke Tian, Danfeng Yao, Barbara G. Ryder:
A Sharper Sense of Self: Probabilistic Reasoning of Program Behaviors for Anomaly Detection with Context Sensitivity. 467-478 - Xin Hu, Jiyong Jang, Marc Ph. Stoecklin, Ting Wang, Douglas Lee Schales, Dhilung Kirat, Josyula R. Rao:
BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks. 479-490
Network Security
- Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Takeshi Yada, Tatsuya Mori, Shigeki Goto:
DomainProfiler: Discovering Domain Names Abused in Future. 491-502 - Drew Springall, Zakir Durumeric, J. Alex Halderman:
FTP: The Forgotten Cloud. 503-513
Android Security
- Hamid Bagheri, Alireza Sadeghi, Reyhaneh Jabbarvand Behrouz, Sam Malek:
Practical, Formal Synthesis and Automatic Enforcement of Security Policies for Android. 514-525 - Gabriel Salles-Loustau, Luis Garcia, Kaustubh R. Joshi, Saman A. Zonouz:
Don't Just BYOD, Bring-Your-Own-App Too! Protection via Virtual Micro Security Perimeters. 526-537 - Le Yu, Xiapu Luo, Xule Liu, Tao Zhang:
Can We Trust the Privacy Policies of Android Apps? 538-549
Malware
- Lannan Luo, Yu Fu, Dinghao Wu, Sencun Zhu, Peng Liu:
Repackage-Proofing Android Apps. 550-561 - Fabio Pagani, Matteo De Astis, Mariano Graziano, Andrea Lanzi, Davide Balzarotti:
Measuring the Role of Greylisting and Nolisting in Fighting Spam. 562-571 - Salman Yousaf, Umar Iqbal, Shehroze Farooqi, Raza Ahmad, Muhammad Zubair Shafiq, Fareed Zaffar:
Malware Slums: Measurement and Analysis of Malware on Traffic Exchanges. 572-582
Passwords
- Tuan Le, Gabriel Salles-Loustau, Laleh Najafizadeh, Mehdi Javanmard, Saman A. Zonouz:
Secure Point-of-Care Medical Diagnostics via Trusted Sensing and Cyto-Coded Passwords. 583-594 - Ding Wang, Debiao He, Haibo Cheng, Ping Wang:
fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars. 595-606
Encryption and Security vs. Performance
- Michael L. Winterrose, Kevin M. Carter, Neal Wagner, William W. Streilein:
Balancing Security and Performance for Agility in Dynamic Threat Environments. 607-617 - Jingwei Li, Chuan Qin, Patrick P. C. Lee, Jin Li:
Rekeying for Encrypted Deduplication Storage. 618-629
PER Sessions
Practical Experience Reports I
- Iberia Medeiros, Nuno Ferreira Neves, Miguel Correia:
Equipping WAP with WEAPONS to Detect Vulnerabilities: Practical Experience Report. 630-637 - Filipe Freitas, João Leitão, Nuno M. Preguiça, Rodrigo Rodrigues:
Characterizing the Consistency of Online Services (Practical Experience Report). 638-645
Practical Experience Reports II
- Dmitrii Kuvaiskii, Oleksii Oleksenko, Pramod Bhatotia, Pascal Felber, Christof Fetzer:
ELZAR: Triple Modular Redundancy Using Intel AVX (Practical Experience Report). 646-653 - Pinjia He, Jieming Zhu, Shilin He, Jian Li, Michael R. Lyu:
An Evaluation Study on Log Parsing and Its Use in Log Mining. 654-661 - Enno Ruijters, Dennis Guck, Martijn van Noort, Mariëlle Stoelinga:
Reliability-Centered Maintenance of the Electrically Insulated Railway Joint via Fault Tree Analysis: A Practical Experience Report. 662-669
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.