


default search action
48th DSN 2018: Luxembourg City, Luxembourg
- 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018, Luxembourg City, Luxembourg, June 25-28, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-5596-2

Best Paper Candidates - Pick Your Best Paper
- Kristina Spirovska, Diego Didona, Willy Zwaenepoel:

Wren: Nonblocking Reads in a Partitioned Transactional Causally Consistent Data Store. 1-12 - Vinicius Fratin, Daniel Oliveira

, Caio B. Lunardi, Fernando Santos, Gennaro Severino Rodrigues
, Paolo Rech
:
Code-Dependent and Architecture-Dependent Reliability Behaviors. 13-26 - Guanpeng Li

, Karthik Pattabiraman, Siva Kumar Sastry Hari, Michael B. Sullivan, Timothy Tsai:
Modeling Soft-Error Propagation in Programs. 27-38
Session 1 : Byzantine and Multicast (Many Many Generals)
- Paulo R. Coelho

, Tarcisio Ceolin Junior, Alysson Bessani
, Fernando Luís Dotti
, Fernando Pedone
:
Byzantine Fault-Tolerant Atomic Multicast. 39-50 - João Sousa

, Alysson Bessani
, Marko Vukolic:
A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform. 51-58 - Bijun Li, Nico Weichbrodt, Johannes Behl, Pierre-Louis Aublin, Tobias Distler, Rüdiger Kapitza:

Troxy: Transparent Access to Byzantine Fault-Tolerant Systems. 59-70 - Jonathan Behrens, Sagar Jha, Ken Birman

, Edward Tremel
:
RDMC: A Reliable RDMA Multicast for Large Objects. 71-82
Session 2 : HPC or Not
- Rohan Garg, Tirthak Patel

, Gene Cooperman, Devesh Tiwari:
Shiraz: Exploiting System Reliability and Application Resilience Characteristics to Improve Large Scale System Throughput. 83-94 - Bin Nie, Ji Xue, Saurabh Gupta, Tirthak Patel

, Christian Engelmann
, Evgenia Smirni
, Devesh Tiwari:
Machine Learning Models for GPU Error Prediction in a Large Scale HPC System. 95-106 - Mohit Kumar, Saurabh Gupta, Tirthak Patel

, Michael Wilder, Weisong Shi
, Song Fu
, Christian Engelmann
, Devesh Tiwari:
Understanding and Analyzing Interconnect Errors and Network Congestion on a Large Scale HPC System. 107-114 - Diyu Zhou, Yuval Tamir:

Fast Hypervisor Recovery Without Reboot. 115-126
Session 3: Critical Infrastructures
- Christian Wressnegger, Ansgar Kellner, Konrad Rieck:

ZOE: Content-Based Anomaly Detection for Industrial Control Systems. 127-138 - Subhash Lakshminarayana

, David K. Y. Yau:
Cost-Benefit Analysis of Moving-Target Defense in Power Grids. 139-150 - Zhenqi Huang, Sriharsha Etigowni, Luis Garcia

, Sayan Mitra
, Saman A. Zonouz:
Algorithmic Attack Synthesis Using Hybrid Dynamics of Power Grid Critical Infrastructures. 151-162 - André Nogueira, Miguel Garcia

, Alysson Bessani
, Nuno Neves:
On the Challenges of Building a BFT SCADA. 163-170
Session 4 : Storage and Redundancy
- Roberta Barbi, Dorian Burihabwa, Pascal Felber

, Hugues Mercier, Valerio Schiavoni
:
RECAST: Random Entanglement for Censorship-Resistant Archival STorage. 171-182 - Vero Estrada-Galiñanes

, Ethan L. Miller, Pascal Felber
, Jehan-François Pâris:
Alpha Entanglement Codes: Practical Erasure Codes to Archive Data in Unreliable Environments. 183-194 - Fritz Alder

, Arseny Kurnikov, Andrew Paverd
, N. Asokan
:
Migrating SGX Enclaves with Persistent State. 195-206 - Stefan Contiu, Rafael Pires

, Sébastien Vaucher
, Marcelo Pasin
, Pascal Felber
, Laurent Réveillère:
IBBE-SGX: Cryptographic Group Access Control Using Trusted Execution Environments. 207-218
Session 5 : Attacks and Intrusion Detection
- Shixiong Zhao, Rui Gu, Haoran Qiu

, Tsz On Li, Yuexuan Wang, Heming Cui, Junfeng Yang:
OWL: Understanding and Detecting Concurrency Attacks. 219-230 - Meisam Navaki Arefi, Geoffrey Alexander, Hooman Rokham

, Aokun Chen, Michalis Faloutsos
, Xuetao Wei, Daniela Seabra Oliveira, Jedidiah R. Crandall
:
FAROS: Illuminating In-memory Injection Attacks via Provenance-Based Whole-System Dynamic Information Flow Tracking. 231-242 - Zhilong Wang, Xuhua Ding

, Chengbin Pang, Jian Guo, Jun Zhu, Bing Mao:
To Detect Stack Buffer Overflow with Polymorphic Canaries. 243-254 - Amy Babay

, Thomas Tantillo, Trevor Aron, Marco Platania, Yair Amir:
Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid. 255-266
Session 6 : Modelling and Verification
- Xiaoxiao Yang, Joost-Pieter Katoen, Huimin Lin, Gaoang Liu, Hao Wu:

Branching Bisimulation and Concurrent Object Verification. 267-278 - Guanpeng Li

, Karthik Pattabiraman:
Modeling Input-Dependent Error Propagation in Programs. 279-290 - Peter Buchholz

, Tugrul Dayar
:
Efficient Transient Analysis of a Class of Compositional Fluid Stochastic Petri Nets. 291-302 - Cyrille Jégourel, Jingyi Wang, Jun Sun:

Importance Sampling of Interval Markov Chains. 303-313
Session 7 : Architectures Reliability
- Atieh Lotfi, Nirmal R. Saxena, Richard Bramley, Paul Racunas, Philip P. Shirvani:

Low Overhead Tag Error Mitigation for GPU Architectures. 314-321 - Ilya Tuzov

, David de Andrés, Juan Carlos Ruiz:
DAVOS: EDA Toolkit for Dependability Assessment, Verification, Optimisation and Selection of Hardware Models. 322-329 - Konstantinos Parasyris, Panos K. Koutsovasilis, Vassilis Vassiliadis, Christos D. Antonopoulos, Nikolaos Bellas, Spyros Lalis

:
A Framework for Evaluating Software on Reduced Margins Hardware. 330-337 - Sam Ainsworth

, Timothy M. Jones
:
Parallel Error Detection Using Heterogeneous Cores. 338-349
Session 8 : Networks Security
- Qinwen Hu, Muhammad Rizwan Asghar

, Nevil Brownlee:
Measuring IPv6 DNS Reconnaissance Attacks and Preventing Them Using DNS Guard. 350-361 - Lin Jin

, Shuai Hao, Haining Wang, Chase Cotton:
Your Remnant Tells Secret: Residual Resolution in DDoS Protection Services. 362-373 - Richard Skowyra, Lei Xu, Guofei Gu, Veer Dedhia, Thomas Hobson, Hamed Okhravi

, James Landry:
Effective Topology Tampering Attacks and Defenses in Software-Defined Networks. 374-385 - David Goltzsche, Signe Rüsch, Manuel Nieke, Sébastien Vaucher

, Nico Weichbrodt, Valerio Schiavoni
, Pierre-Louis Aublin, Paolo Costa, Christof Fetzer, Pascal Felber
, Peter R. Pietzuch, Rüdiger Kapitza:
EndBox: Scalable Middlebox Functions Using Client-Side Trusted Execution. 386-397
Session 9 : Mobile Devices
- Jia Chen, Ge Han

, Shanqing Guo, Wenrui Diao:
FragDroid: Automated User Interface Interaction with Activity and Fragment Analysis in Android Applications. 398-409 - Edgardo Barsallo Yi

, Amiya Maji, Saurabh Bagchi:
How Reliable is My Wearable: A Fuzz Testing-Based Study. 410-417 - Le Yu, Jiachi Chen

, Hao Zhou
, Xiapu Luo, Kang Liu:
Localizing Function Errors in Mobile Apps with User Reviews. 418-429 - Kai Cheng, Qiang Li

, Lei Wang, Qian Chen
, Yaowen Zheng, Limin Sun, Zhenkai Liang
:
DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware. 430-441
Session 10 : Confidentiality and Privacy
- Lei Zhang, Douglas M. Blough:

Deceptive Secret Sharing. 442-453 - Bing Chang, Fengwei Zhang, Bo Chen, Yingjiu Li, Wen Tao Zhu, Yangguang Tian, Zhan Wang, Albert Ching:

MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices. 454-465 - Antoine Boutet, Florestan De Moor, Davide Frey

, Rachid Guerraoui
, Anne-Marie Kermarrec
, Antoine Rault:
Collaborative Filtering Under a Sybil Attack: Similarity Metrics do Matter! 466-477 - Julien Duchêne, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Colas Le Guernic:

Specification-Based Protocol Obfuscation. 478-489
Session 11 : Security
- Sangwoo Kim, Seokmyung Hong, Jaesang Oh, Heejo Lee:

Obfuscated VBA Macro Detection Using Machine Learning. 490-501 - Christopher Michael Bailey, Rogério de Lemos:

Evaluating Self-Adaptive Authorisation Infrastructures Through Gamification. 502-513 - Ahmed M. Fawaz, Mohammad A. Noureddine, William H. Sanders:

POWERALERT: Integrity Checking Using Power Measurement and a Game-Theoretic Strategy. 514-525 - Elena Troubitsyna, Irum Rauf:

Generating Cloud Monitors from Models to Secure Clouds. 526-533
Session 12 : Distributed systems
- Francisco Neves

, Nuno Machado, José Pereira
:
Falcon: A Practical Log-Based Analysis Tool for Distributed Systems. 534-541 - Simon Bouget

, Yérom-David Bromberg, Adrien Luxey
, François Taïani
:
Pleiades: Distributed Structural Invariants at Scale. 542-553 - Daniel Porto, João Leitão

, Flavio Junqueira, Rodrigo Rodrigues
:
The Tortoise and the Hare: Characterizing Synchrony in Distributed Environments (Practical Experience Report). 554-561 - Sadegh Torabi

, Elias Bou-Harb, Chadi Assi, Mario Galluscio, Amine Boukhtouta, Mourad Debbabi
:
Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective. 562-573
Session 13 : The Future of Things
- Pinyao Guo, Hunmin Kim, Nurali Virani, Jun Xu, Minghui Zhu, Peng Liu:

RoboADS: Anomaly Detection Against Sensor and Actuator Misbehaviors in Mobile Robots. 574-585 - Subho S. Banerjee

, Saurabh Jha
, James Cyriac, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Hands Off the Wheel in Autonomous Vehicles?: A Systems Perspective on over a Million Miles of Field Data. 586-597 - Radha Venkatagiri, Karthik Swaminathan, Chung-Ching Lin, Liang Wang, Alper Buyuktosunoglu, Pradip Bose, Sarita V. Adve:

Impact of Software Approximations on the Resiliency of a Video Summarization System. 598-609 - Jiwon Choi, Hayoung Jeoung, Jihun Kim, Youngjoo Ko, Wonup Jung, Hanjun Kim

, Jong Kim:
Detecting and Identifying Faulty IoT Devices in Smart Home with Context Extraction. 610-621
Session 14 : Routing in Networks
- Kun Xie, Heng Tao, Xin Wang, Gaogang Xie, Jigang Wen, Jiannong Cao, Zheng Qin:

Divide and Conquer for Fast SRLG Disjoint Routing. 622-633 - Tomas Hlavacek, Amir Herzberg, Haya Schulmann, Michael Waidner

:
Practical Experience: Methodologies for Measuring Route Origin Validation. 634-641 - Catello Di Martino, Ugo Giordano, Nishok Mohanasamy, Stefano Russo

, Marina Thottan:
In Production Performance Testing of SDN Control Plane for Telecom Operators. 642-653 - Baojun Liu, Chaoyi Lu

, Zhou Li
, Ying Liu, Hai-Xin Duan
, Shuang Hao, Zaifeng Zhang:
A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly. 654-665
Session 15 : Symbolic Execution & Static Analysis
- Hui Xu, Yangfan Zhou, Yu Kang

, Fengzhi Tu, Michael R. Lyu:
Manufacturing Resilient Bi-Opaque Predicates Against Symbolic Execution. 666-677 - Angello Astorga

, Siwakorn Srisakaokul, Xusheng Xiao
, Tao Xie:
PreInfer: Automatic Inference of Preconditions via Symbolic Analysis. 678-689 - Zhenyu Ning, Fengwei Zhang:

DexLego: Reassembleable Bytecode Extraction for Aiding Static Analysis. 690-701

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














