default search action
DSN 2015: Rio de Janeiro, Brazil
- 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015, Rio de Janeiro, Brazil, June 22-25, 2015. IEEE Computer Society 2015, ISBN 978-1-4799-8629-3
Best Paper Award Session
- Samuel Jero, Hyojeong Lee, Cristina Nita-Rotaru:
Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations. 1-12 - Dmitrii Kuvaiskii, Christof Fetzer:
Δ-Encoding: Practical Encoded Processing. 13-24 - Catello Di Martino, William Kramer, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Measuring and Understanding Extreme-Scale Application Resilience: A Field Study of 5, 000, 000 HPC Application Runs. 25-36
Session 1A: Large-Scale Systems
- Saurabh Gupta, Devesh Tiwari, Christopher Jantzi, James H. Rogers, Don Maxwell:
Understanding and Exploiting Spatial Properties of System Failures on Extreme-Scale HPC Systems. 37-44 - Alina Oprea, Zhou Li, Ting-Fang Yen, Sang H. Chin, Sumayah A. Alrwais:
Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data. 45-56
Session 1B: Attack Mitigation
- Zhongshu Gu, Kexin Pei, Qifan Wang, Luo Si, Xiangyu Zhang, Dongyan Xu:
LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis. 57-68 - Amirali Sanatinia, Guevara Noubir:
OnionBots: Subverting Privacy Infrastructure for Cyber Attacks. 69-80
Session 1C: Modeling and Metrics
- Harold Bruintjes, Joost-Pieter Katoen, David Lesens:
A Statistical Approach for Timed Reachability in AADL Models. 81-88 - Jan Krcál, Pavel Krcál:
Scalable Analysis of Fault Trees with Dynamic Features. 89-100
Session 2A: Secure Execution
- Thomas Gerbet, Amrit Kumar, Cédric Lauradoux:
The Power of Evil Choices in Bloom Filters. 101-112 - Byungho Min, Vijay Varadharajan:
Secure Dynamic Software Loading and Execution Using Cross Component Verification. 113-124 - Dennis Andriesse, Herbert Bos, Asia Slowinska:
Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming. 125-135
Session 2B: Storage Systems
- Yongzhe Zhang, Chentao Wu, Jie Li, Minyi Guo:
TIP-Code: A Three Independent Parity Code to Tolerate Triple Disk Failures with Optimal Update Complextiy. 136-147 - Runhui Li, Yuchong Hu, Patrick P. C. Lee:
Enabling Efficient and Reliable Transition from Replication to Erasure Coding for Clustered File Systems. 148-159 - Yubiao Pan, Yongkun Li, Yinlong Xu, Zhipeng Li:
Grouping-Based Elastic Striping with Hotness Awareness for Improving SSD RAID Performance. 160-171
Session 2C: Web Services
- Abbas Naderi-Afooshteh, Anh Nguyen-Tuong, Mandana Bagheri-Marzijarani, Jason D. Hiser, Jack W. Davidson:
Joza: Hybrid Taint Inference for Defeating Web Application SQL Injection Attacks. 172-183 - Bin Zhao, Peng Liu:
Private Browsing Mode Not Really That Private: Dealing with Privacy Breach Caused by Browser Extensions. 184-195 - Ivano Alessandro Elia, Nuno Laranjeiro, Marco Vieira:
Test-Based Interoperability Certification for Web Services. 196-206
Session 3A: Data Clusters, Servers and Clouds
- Andrea Rosà, Lydia Y. Chen, Walter Binder:
Understanding the Dark Side of Big Data Clusters: An Analysis beyond Failures. 207-218 - Ulya Bayram, Dwight Divine, Pin Zhou, Eric William Davis Rozier:
Improving Reliability with Dynamic Syndrome Allocation in Intelligent Software Defined Data Centers. 219-230 - Long Wang, Harigovind V. Ramasamy, Richard E. Harper, Mahesh Viswanathan, Edmond Plattier:
Experiences with Building Disaster Recovery for Enterprise-Class Clouds. 231-238
Session 3B: Attack Prevention
- Haopei Wang, Lei Xu, Guofei Gu:
FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks. 239-250 - Seung-Hun Kim, Lei Xu, Ziyi Liu, Zhiqiang Lin, Won Woo Ro, Weidong Shi:
Enhancing Software Dependability and Security with Hardware Supported Instruction Address Space Randomization. 251-262 - Davide Frey, Rachid Guerraoui, Anne-Marie Kermarrec, Antoine Rault, François Taïani, Jingjing Wang:
Hide & Share: Landmark-Based Similarity for Private KNN Computation. 263-274
Session 3C: Modeling and Assessment
- Hamed Ghasemieh, Boudewijn R. Haverkort, Marijn R. Jongerden, Anne Remke:
Energy Resilience Modelling for Smart Houses. 275-286 - Marcello Cinque, Domenico Cotroneo, Flavio Frattini, Stefano Russo:
Impact of Malfunction on the Energy Efficiency of Batch Processing Systems. 287-298 - Paulo Jorge Costa Nunes, José Fonseca, Marco Vieira:
phpSAFE: A Security Analysis Tool for OOP Web Application Plugins. 299-306
Session 4A: Mitigation of Hardware Faults
- Longjun Liu, Chao Li, Hongbin Sun, Yang Hu, Juncheng Gu, Tao Li:
BAAT: Towards Dynamically Managing Battery Aging in Green Datacenters. 307-318 - Horst Schirmeier, Christoph Borchert, Olaf Spinczyk:
Avoiding Pitfalls in Fault-Injection Based Comparison of Program Susceptibility to Soft Errors. 319-330 - Mohammad Abdel-Majeed, Waleed Dweik, Hyeran Jeon, Murali Annavaram:
Warped-RE: Low-Cost Error Detection and Correction in GPUs. 331-342
Session 4B: Mobile Devices
- Earlence Fernandes, Ajit Aluri, Alexander Crowell, Atul Prakash:
Decomposable Trust for Android Applications. 343-354 - Chia-Chen Chou, Prashant J. Nair, Moinuddin K. Qureshi:
Reducing Refresh Power in Mobile Devices with Morphable ECC. 355-366 - He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, Haining Wang:
TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices. 367-378
Session 5A: Network Security and Consensus
- An Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen:
Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis. 379-390 - Ognjen Maric, Christoph Sprenger, David A. Basin:
Consensus Refined. 391-402 - Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis:
Segugio: Efficient Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks. 403-414
Session 5B: Memory Errors
- Justin Meza, Qiang Wu, Sanjeev Kumar, Onur Mutlu:
Revisiting Memory Errors in Large-Scale Production Data Centers: Analysis and Modeling of New Trends from the Field. 415-426 - Moinuddin K. Qureshi, Dae-Hyun Kim, Samira Manabi Khan, Prashant J. Nair, Onur Mutlu:
AVATAR: A Variable-Retention-Time (VRT) Aware Refresh for DRAM Systems. 427-437 - Yu Cai, Yixin Luo, Saugata Ghose, Onur Mutlu:
Read Disturb Errors in MLC NAND Flash Memory: Characterization, Mitigation, and Recovery. 438-449
Session 6A: Fault Tolerance
- Guanpeng Li, Qining Lu, Karthik Pattabiraman:
Fine-Grained Characterization of Faults Causing Long Latency Crashes in Programs. 450-461 - André Martin, Tiaraju Smaneoto, Tobias Dietze, Andrey Brito, Christof Fetzer:
User-Constraint and Self-Adaptive Fault Tolerance for Event Stream Processing Systems. 462-473 - Dirk Vogt, Cristiano Giuffrida, Herbert Bos, Andrew S. Tanenbaum:
Lightweight Memory Checkpointing. 474-484
Session 6B: Vulnerability Detection and Mitigation
- Qiang Zeng, Mingyi Zhao, Peng Liu:
HeapTherapy: An Efficient End-to-End Solution against Heap Buffer Overflows. 485-496 - Yann Bachy, Frederic Basse, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège, Pierre Lukjanenko:
Smart-TV Security Analysis: Practical Experiments. 497-504 - Nuno Antunes, Marco Vieira:
On the Metrics for Benchmarking Vulnerability Detection Tools. 505-516
Session 7A: Assurance of Complex Systems
- Patrick John Graydon:
Formal Assurance Arguments: A Solution in Search of a Problem? 517-528 - Haifeng Chen, Takehiko Mizoguchi, Yan Tan, Kai Zhang, Geoff Jiang:
A Quality Control Engine for Complex Physical Systems. 529-536 - Ingo Weber, Chao Li, Len Bass, Xiwei Xu, Liming Zhu:
Discovering and Visualizing Operations Processes with POD-Discovery and POD-Viz. 537-544
Session 7B: Preventing Memory and Information Leakage
- Koutheir Attouchi, Gaël Thomas, Gilles Muller, Julia Lawall, André Bottaro:
Incinerator - Eliminating Stale References in Dynamic OSGi Applications. 545-554 - Jun Wang, Mingyi Zhao, Qiang Zeng, Dinghao Wu, Peng Liu:
Risk Assessment of Buffer "Heartbleed" Over-Read Vulnerabilities. 555-562
Workshops Summary
- Elias P. Duarte Jr., Matti A. Hiltunen:
Workshop on Dependability Issues on SDN and NFV (DISN). 563-564 - Alberto Avritzer, Daniel Sadoc Menasché, Kishor S. Trivedi, Lucia Happe, Sahra Sedigh Sarvestani:
Workshop on Model Based Design for Cyber-Physical Systems (MB4CP). 565-566 - Ariadne Maria Brito Rizzoni Carvalho, Nuno Antunes, Andrea Ceccarelli, András Zentai:
Workshop on Recent Advances in the DependabIlity AssessmeNt of Complex systEms (RADIANCE). 567-568 - João Carlos Cunha, Kalinka Branco, António Casimiro, Urbano Nunes:
Workshop on Safety and Security of Intelligent Vehicles (SSIV). 569-570
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.