


default search action
DSN 2015: Rio de Janeiro, Brazil
- 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015, Rio de Janeiro, Brazil, June 22-25, 2015. IEEE Computer Society 2015, ISBN 978-1-4799-8629-3

Best Paper Award Session
- Samuel Jero, Hyojeong Lee

, Cristina Nita-Rotaru:
Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations. 1-12 - Dmitrii Kuvaiskii, Christof Fetzer:

Δ-Encoding: Practical Encoded Processing. 13-24 - Catello Di Martino, William Kramer, Zbigniew Kalbarczyk, Ravishankar K. Iyer:

Measuring and Understanding Extreme-Scale Application Resilience: A Field Study of 5, 000, 000 HPC Application Runs. 25-36
Session 1A: Large-Scale Systems
- Saurabh Gupta, Devesh Tiwari, Christopher Jantzi, James H. Rogers, Don Maxwell:

Understanding and Exploiting Spatial Properties of System Failures on Extreme-Scale HPC Systems. 37-44 - Alina Oprea, Zhou Li

, Ting-Fang Yen, Sang H. Chin, Sumayah A. Alrwais:
Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data. 45-56
Session 1B: Attack Mitigation
- Zhongshu Gu, Kexin Pei, Qifan Wang, Luo Si, Xiangyu Zhang, Dongyan Xu:

LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis. 57-68 - Amirali Sanatinia, Guevara Noubir:

OnionBots: Subverting Privacy Infrastructure for Cyber Attacks. 69-80
Session 1C: Modeling and Metrics
- Harold Bruintjes, Joost-Pieter Katoen

, David Lesens:
A Statistical Approach for Timed Reachability in AADL Models. 81-88 - Jan Krcál, Pavel Krcál:

Scalable Analysis of Fault Trees with Dynamic Features. 89-100
Session 2A: Secure Execution
- Thomas Gerbet, Amrit Kumar, Cédric Lauradoux:

The Power of Evil Choices in Bloom Filters. 101-112 - Byungho Min, Vijay Varadharajan

:
Secure Dynamic Software Loading and Execution Using Cross Component Verification. 113-124 - Dennis Andriesse, Herbert Bos

, Asia Slowinska:
Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming. 125-135
Session 2B: Storage Systems
- Yongzhe Zhang, Chentao Wu, Jie Li

, Minyi Guo:
TIP-Code: A Three Independent Parity Code to Tolerate Triple Disk Failures with Optimal Update Complextiy. 136-147 - Runhui Li, Yuchong Hu, Patrick P. C. Lee

:
Enabling Efficient and Reliable Transition from Replication to Erasure Coding for Clustered File Systems. 148-159 - Yubiao Pan, Yongkun Li, Yinlong Xu, Zhipeng Li:

Grouping-Based Elastic Striping with Hotness Awareness for Improving SSD RAID Performance. 160-171
Session 2C: Web Services
- Abbas Naderi-Afooshteh, Anh Nguyen-Tuong, Mandana Bagheri-Marzijarani, Jason D. Hiser, Jack W. Davidson:

Joza: Hybrid Taint Inference for Defeating Web Application SQL Injection Attacks. 172-183 - Bin Zhao

, Peng Liu:
Private Browsing Mode Not Really That Private: Dealing with Privacy Breach Caused by Browser Extensions. 184-195 - Ivano Alessandro Elia

, Nuno Laranjeiro
, Marco Vieira
:
Test-Based Interoperability Certification for Web Services. 196-206
Session 3A: Data Clusters, Servers and Clouds
- Andrea Rosà

, Lydia Y. Chen, Walter Binder
:
Understanding the Dark Side of Big Data Clusters: An Analysis beyond Failures. 207-218 - Ulya Bayram

, Dwight Divine, Pin Zhou, Eric William Davis Rozier:
Improving Reliability with Dynamic Syndrome Allocation in Intelligent Software Defined Data Centers. 219-230 - Long Wang, Harigovind V. Ramasamy, Richard E. Harper, Mahesh Viswanathan, Edmond Plattier:

Experiences with Building Disaster Recovery for Enterprise-Class Clouds. 231-238
Session 3B: Attack Prevention
- Haopei Wang, Lei Xu, Guofei Gu:

FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks. 239-250 - Seung-Hun Kim, Lei Xu

, Ziyi Liu, Zhiqiang Lin, Won Woo Ro, Weidong Shi:
Enhancing Software Dependability and Security with Hardware Supported Instruction Address Space Randomization. 251-262 - Davide Frey

, Rachid Guerraoui
, Anne-Marie Kermarrec
, Antoine Rault, François Taïani
, Jingjing Wang:
Hide & Share: Landmark-Based Similarity for Private KNN Computation. 263-274
Session 3C: Modeling and Assessment
- Hamed Ghasemieh, Boudewijn R. Haverkort

, Marijn R. Jongerden
, Anne Remke:
Energy Resilience Modelling for Smart Houses. 275-286 - Marcello Cinque

, Domenico Cotroneo, Flavio Frattini, Stefano Russo
:
Impact of Malfunction on the Energy Efficiency of Batch Processing Systems. 287-298 - Paulo Jorge Costa Nunes, José Fonseca

, Marco Vieira
:
phpSAFE: A Security Analysis Tool for OOP Web Application Plugins. 299-306
Session 4A: Mitigation of Hardware Faults
- Longjun Liu

, Chao Li, Hongbin Sun, Yang Hu, Juncheng Gu, Tao Li:
BAAT: Towards Dynamically Managing Battery Aging in Green Datacenters. 307-318 - Horst Schirmeier

, Christoph Borchert, Olaf Spinczyk:
Avoiding Pitfalls in Fault-Injection Based Comparison of Program Susceptibility to Soft Errors. 319-330 - Mohammad Abdel-Majeed

, Waleed Dweik
, Hyeran Jeon, Murali Annavaram
:
Warped-RE: Low-Cost Error Detection and Correction in GPUs. 331-342
Session 4B: Mobile Devices
- Earlence Fernandes, Ajit Aluri, Alexander Crowell, Atul Prakash

:
Decomposable Trust for Android Applications. 343-354 - Chia-Chen Chou, Prashant J. Nair, Moinuddin K. Qureshi:

Reducing Refresh Power in Mobile Devices with Morphable ECC. 355-366 - He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, Haining Wang:

TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices. 367-378
Session 5A: Network Security and Consensus
- An Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen:

Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis. 379-390 - Ognjen Maric, Christoph Sprenger

, David A. Basin:
Consensus Refined. 391-402 - Babak Rahbarinia, Roberto Perdisci

, Manos Antonakakis:
Segugio: Efficient Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks. 403-414
Session 5B: Memory Errors
- Justin Meza, Qiang Wu, Sanjeev Kumar, Onur Mutlu

:
Revisiting Memory Errors in Large-Scale Production Data Centers: Analysis and Modeling of New Trends from the Field. 415-426 - Moinuddin K. Qureshi, Dae-Hyun Kim

, Samira Manabi Khan, Prashant J. Nair, Onur Mutlu
:
AVATAR: A Variable-Retention-Time (VRT) Aware Refresh for DRAM Systems. 427-437 - Yu Cai, Yixin Luo, Saugata Ghose, Onur Mutlu

:
Read Disturb Errors in MLC NAND Flash Memory: Characterization, Mitigation, and Recovery. 438-449
Session 6A: Fault Tolerance
- Guanpeng Li

, Qining Lu, Karthik Pattabiraman:
Fine-Grained Characterization of Faults Causing Long Latency Crashes in Programs. 450-461 - André Martin, Tiaraju Smaneoto, Tobias Dietze, Andrey Brito, Christof Fetzer:

User-Constraint and Self-Adaptive Fault Tolerance for Event Stream Processing Systems. 462-473 - Dirk Vogt, Cristiano Giuffrida

, Herbert Bos
, Andrew S. Tanenbaum
:
Lightweight Memory Checkpointing. 474-484
Session 6B: Vulnerability Detection and Mitigation
- Qiang Zeng, Mingyi Zhao, Peng Liu:

HeapTherapy: An Efficient End-to-End Solution against Heap Buffer Overflows. 485-496 - Yann Bachy, Frederic Basse, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège, Pierre Lukjanenko:

Smart-TV Security Analysis: Practical Experiments. 497-504 - Nuno Antunes

, Marco Vieira
:
On the Metrics for Benchmarking Vulnerability Detection Tools. 505-516
Session 7A: Assurance of Complex Systems
- Patrick John Graydon:

Formal Assurance Arguments: A Solution in Search of a Problem? 517-528 - Haifeng Chen, Takehiko Mizoguchi, Yan Tan, Kai Zhang, Geoff Jiang:

A Quality Control Engine for Complex Physical Systems. 529-536 - Ingo Weber, Chao Li, Len Bass, Xiwei Xu, Liming Zhu

:
Discovering and Visualizing Operations Processes with POD-Discovery and POD-Viz. 537-544
Session 7B: Preventing Memory and Information Leakage
- Koutheir Attouchi, Gaël Thomas, Gilles Muller, Julia Lawall, André Bottaro:

Incinerator - Eliminating Stale References in Dynamic OSGi Applications. 545-554 - Jun Wang, Mingyi Zhao, Qiang Zeng, Dinghao Wu, Peng Liu:

Risk Assessment of Buffer "Heartbleed" Over-Read Vulnerabilities. 555-562
Workshops Summary
- Elias P. Duarte Jr., Matti A. Hiltunen:

Workshop on Dependability Issues on SDN and NFV (DISN). 563-564 - Alberto Avritzer, Daniel Sadoc Menasché, Kishor S. Trivedi, Lucia Happe

, Sahra Sedigh Sarvestani
:
Workshop on Model Based Design for Cyber-Physical Systems (MB4CP). 565-566 - Ariadne Maria Brito Rizzoni Carvalho, Nuno Antunes, Andrea Ceccarelli

, András Zentai:
Workshop on Recent Advances in the DependabIlity AssessmeNt of Complex systEms (RADIANCE). 567-568 - João Carlos Cunha

, Kalinka Branco, António Casimiro
, Urbano Nunes
:
Workshop on Safety and Security of Intelligent Vehicles (SSIV). 569-570

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














