


default search action
46th DSN 2016: Toulouse, France
- 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016, Toulouse, France, June 28 - July 1, 2016. IEEE Computer Society 2016, ISBN 978-1-4673-8891-7

Dependability Sessions
Best Paper Candidates
- Uttam Thakore, Gabriel A. Weaver, William H. Sanders:

A Quantitative Methodology for Security Monitor Deployment. 1-12 - Long Hoang Le

, Carlos Eduardo Benevides Bezerra, Fernando Pedone
:
Dynamic Scalable State Machine Replication. 13-24 - Koustubha Bhat, Dirk Vogt, Erik van der Kouwe

, Ben Gras, Lionel Sambuc, Andrew S. Tanenbaum
, Herbert Bos
, Cristiano Giuffrida
:
OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems. 25-36
Storage Systems
- Hoda Aghaei Khouzani

, Chengmo Yang:
Towards a Scalable and Write-Free Multi-version Checkpointing Scheme in Solid State Drives. 37-48 - Yongkun Li, Helen H. W. Chan, Patrick P. C. Lee

, Yinlong Xu:
Elastic Parity Logging for SSD RAID Arrays. 49-60 - Neng Wang, Yinlong Xu, Yongkun Li, Si Wu:

OI-RAID: A Two-Layer RAID Architecture towards Fast Recovery and High Reliability. 61-72
Clouds and Networks
- Hui Lu, Abhinav Srivastava, Brendan Saltaformaggio, Dongyan Xu:

StorM: Enabling Tenant-Defined Cloud Storage Middle-Box Services. 73-84 - Min Fu, Liming Zhu

, Ingo Weber, Len Bass, Anna Liu, Xiwei Xu:
Process-Oriented Non-intrusive Recovery for Sporadic Operations on Cloud. 85-96 - Novella Bartolini

, Stefano Ciavarella, Thomas F. La Porta, Simone Silvestri:
Network Recovery After Massive Failures. 97-108
Software-Defined Networks
- Kshiteej Mahajan, Rishabh Poddar, Mohan Dhawan, Vijay Mann:

JURY: Validating Controller Actions in Software-Defined Networks. 109-120 - Xitao Wen, Bo Yang, Yan Chen, Chengchen Hu, Yi Wang, Bin Liu, Xiaolin Chen:

SDNShield: Reconciliating Configurable Application Permissions for SDN App Markets. 121-132 - Szymon Dudycz

, Arne Ludwig, Stefan Schmid
:
Can't Touch This: Consistent Network Updates for Multiple Policies. 133-143
Software Dependability
- Erik van der Kouwe

, Andrew S. Tanenbaum
:
HSFI: Accurate Fault Injection Scalable to Large Code Bases. 144-155 - Sebastiano Peluso, Alexandru Turcu, Roberto Palmieri

, Giuliano Losa, Binoy Ravindran
:
Making Fast Consensus Generally Faster. 156-167 - Bo Fang, Qining Lu, Karthik Pattabiraman, Matei Ripeanu, Sudhanva Gurumurthi:

ePVF: An Enhanced Program Vulnerability Factor Methodology for Cross-Layer Resilience Analysis. 168-179
Memory and Caches
- Georgios Mappouras, Alireza Vahid, A. Robert Calderbank, Daniel J. Sorin:

Methuselah Flash: Rewriting Codes for Extra Long Storage Lifetime. 180-191 - Chao Yan, Russ Joseph:

Enabling Deep Voltage Scaling in Delay Sensitive L1 Caches. 192-202 - Rujia Wang, Youtao Zhang, Jun Yang:

ReadDuo: Constructing Reliable MLC Phase Change Memory through Fast and Robust Readout. 203-214
Hardware Errors Resiliency
- Seyed Mohammad Seyedzadeh, Rakan Maddah, Alex K. Jones

, Rami G. Melhem:
Leveraging ECC to Mitigate Read Disturbance, False Reads and Write Faults in STT-RAM. 215-226 - Jiguo Song, Gedare Bloom, Gabriel Parmer:

SuperGlue: IDL-Based, System-Level Fault Tolerance for Embedded Systems. 227-238 - Samira Manabi Khan, Donghyuk Lee, Onur Mutlu

:
PARBOR: An Efficient System-Level Technique to Detect Data-Dependent Failures in DRAM. 239-250
Dependability Applications
- Alexander Schöll, Claus Braun, Michael A. Kochte, Hans-Joachim Wunderlich:

Efficient Algorithm-Based Fault Tolerance for Sparse Matrix Operations. 251-262 - Mohammad Ashiqur Rahman

, A. H. M. Jakaria, Ehab Al-Shaer:
Formal Analysis for Dependable Supervisory Control and Data Acquisition in Smart Grids. 263-274 - Leonardo Montecchi

, Atle Refsdal, Paolo Lollini
, Andrea Bondavalli
:
A Model-Based Approach to Support Safety-Related Decisions in the Petroleum Domain. 275-286
Models
- Luca Bortolussi

, Nicolas Gast:
Mean Field Approximation of Uncertain Stochastic Models. 287-298 - Sebastian Junges, Dennis Guck, Joost-Pieter Katoen, Mariëlle Stoelinga

:
Uncovering Dynamic Fault Trees. 299-310
Data Centers Dependability
- Kun Tang, Devesh Tiwari, Saurabh Gupta, Ping Huang, Qiqi Lu, Christian Engelmann

, Xubin He:
Power-Capping Aware Checkpointing: On the Interplay Among Power-Capping, Temperature, Reliability, Performance, and Energy. 311-322 - Zhirong Shen, Jiwu Shu, Patrick P. C. Lee

:
Reconsidering Single Failure Recovery in Clustered File Systems. 323-334 - Ji Xue, Robert Birke, Lydia Y. Chen, Evgenia Smirni:

Managing Data Center Tickets: Prediction and Active Sizing. 335-346
Security Sessions
Privacy
- Thomas Gerbet, Amrit Kumar, Cédric Lauradoux:

A Privacy Analysis of Google and Yandex Safe Browsing. 347-358 - Jianping He, Bin Liu, Deguang Kong, Xuan Bao, Na Wang, Hongxia Jin, George Kesidis:

PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing. 359-370 - Devin J. Pohly, Patrick D. McDaniel:

Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols. 371-382
Cyber-physical Systems Security
- Subhash Lakshminarayana

, Zhan-Teng Teo, Rui Tan, David K. Y. Yau, Pablo Arboleya:
On False Data Injection Attacks Against Railway Traction Power Systems. 383-394 - Homa Alemzadeh

, Daniel Chen, Xiao Li, Thenkurussi Kesavadas, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Targeted Attacks on Teleoperated Surgical Robots: Dynamic Model-Based Detection and Mitigation. 395-406 - Varun Badrinath Krishna, Kiryung Lee, Gabriel A. Weaver, Ravishankar K. Iyer, William H. Sanders:

F-DETA: A Framework for Detecting Electricity Theft Attacks in Smart Grids. 407-418
Operating Systems Security and Privacy
- Bruno Vavala, Nuno Ferreira Neves

, Peter Steenkiste
:
Secure Identification of Actively Executed Code on a Generic Trusted Component. 419-430 - Koen Koning

, Herbert Bos
, Cristiano Giuffrida
:
Secure and Efficient Multi-Variant Execution Using Hardware-Assisted Process Virtualization. 431-442 - Kaan Onarlioglu, William Robertson, Engin Kirda:

Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems. 443-454
Anomaly Detection and Exploits
- Ben Stock

, Benjamin Livshits, Benjamin G. Zorn:
Kizzle: A Signature Compiler for Detecting Exploit Kits. 455-466 - Kui Xu, Ke Tian, Danfeng Yao

, Barbara G. Ryder:
A Sharper Sense of Self: Probabilistic Reasoning of Program Behaviors for Anomaly Detection with Context Sensitivity. 467-478 - Xin Hu, Jiyong Jang, Marc Ph. Stoecklin, Ting Wang, Douglas Lee Schales, Dhilung Kirat, Josyula R. Rao:

BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks. 479-490
Network Security
- Daiki Chiba

, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Takeshi Yada, Tatsuya Mori
, Shigeki Goto:
DomainProfiler: Discovering Domain Names Abused in Future. 491-502 - Drew Springall, Zakir Durumeric, J. Alex Halderman:

FTP: The Forgotten Cloud. 503-513
Android Security
- Hamid Bagheri, Alireza Sadeghi, Reyhaneh Jabbarvand Behrouz, Sam Malek:

Practical, Formal Synthesis and Automatic Enforcement of Security Policies for Android. 514-525 - Gabriel Salles-Loustau, Luis Garcia

, Kaustubh R. Joshi, Saman A. Zonouz:
Don't Just BYOD, Bring-Your-Own-App Too! Protection via Virtual Micro Security Perimeters. 526-537 - Le Yu, Xiapu Luo

, Xule Liu, Tao Zhang
:
Can We Trust the Privacy Policies of Android Apps? 538-549
Malware
- Lannan Luo, Yu Fu, Dinghao Wu, Sencun Zhu, Peng Liu:

Repackage-Proofing Android Apps. 550-561 - Fabio Pagani, Matteo De Astis, Mariano Graziano, Andrea Lanzi, Davide Balzarotti:

Measuring the Role of Greylisting and Nolisting in Fighting Spam. 562-571 - Salman Yousaf, Umar Iqbal, Shehroze Farooqi, Raza Ahmad, Muhammad Zubair Shafiq, Fareed Zaffar:

Malware Slums: Measurement and Analysis of Malware on Traffic Exchanges. 572-582
Passwords
- Tuan Le, Gabriel Salles-Loustau, Laleh Najafizadeh, Mehdi Javanmard, Saman A. Zonouz:

Secure Point-of-Care Medical Diagnostics via Trusted Sensing and Cyto-Coded Passwords. 583-594 - Ding Wang

, Debiao He, Haibo Cheng, Ping Wang:
fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars. 595-606
Encryption and Security vs. Performance
- Michael L. Winterrose, Kevin M. Carter, Neal Wagner, William W. Streilein:

Balancing Security and Performance for Agility in Dynamic Threat Environments. 607-617 - Jingwei Li

, Chuan Qin, Patrick P. C. Lee
, Jin Li:
Rekeying for Encrypted Deduplication Storage. 618-629
PER Sessions
Practical Experience Reports I
- Iberia Medeiros

, Nuno Ferreira Neves
, Miguel Correia
:
Equipping WAP with WEAPONS to Detect Vulnerabilities: Practical Experience Report. 630-637 - Filipe Freitas

, João Leitão
, Nuno M. Preguiça
, Rodrigo Rodrigues:
Characterizing the Consistency of Online Services (Practical Experience Report). 638-645
Practical Experience Reports II
- Dmitrii Kuvaiskii, Oleksii Oleksenko, Pramod Bhatotia, Pascal Felber

, Christof Fetzer:
ELZAR: Triple Modular Redundancy Using Intel AVX (Practical Experience Report). 646-653 - Pinjia He, Jieming Zhu, Shilin He, Jian Li, Michael R. Lyu:

An Evaluation Study on Log Parsing and Its Use in Log Mining. 654-661 - Enno Ruijters

, Dennis Guck, Martijn van Noort, Mariëlle Stoelinga
:
Reliability-Centered Maintenance of the Electrically Insulated Railway Joint via Fault Tree Analysis: A Practical Experience Report. 662-669

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














