Dependable Systems and Networks 2014 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


DSN 2014: Atlanta, GA, USA

jump to- DSN 2014
- The Fourth International Workshop on Dependability of Clouds, Data Centers and Virtual Machine Technology (DCDV 2014)
- The First International Workshop on Dependability and Security of System Operation (DSSO 2014)
- The Fourth Fault Tolerance for HPC at eXtreme Scale (FTXS) Workshop 2014
- The First International Workshop on Trustworthiness of Smart Grids (ToSG 2014)

- > Home > Conferences and Workshops > DSN
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2014, Atlanta, GA, USA, June 23-26, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-2233-8
DSN 2014
Best Paper Award Session

Robert Birke, Ioana Giurgiu, Lydia Y. Chen, Dorothea Wiesmann, Ton Engbersen:
Failure Analysis of Virtual and Physical Machines: Patterns, Causes and Characteristics. 1-12
Cuong Manh Pham, Zachary Estrada, Phuong Cao
, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural Invariants. 13-24
Devesh Tiwari, Saurabh Gupta, Sudharshan S. Vazhkudai:
Lazy Checkpointing: Exploiting Temporal Locality in Failures to Mitigate Checkpointing Overheads on Extreme-Scale Systems. 25-36
Session 1A: Identifying Malicious Activity

Osama Haq, Waqar Ahmed, Affan A. Syed:
Titan: Enabling Low Overhead and Multi-faceted Network Fingerprinting of a Bot. 37-44
Gaspar Modelo-Howard, Christopher N. Gutierrez, Fahad A. Arshad, Saurabh Bagchi, Yuan Qi:
pSigene: Webcrawling to Generalize SQL Injection Signatures. 45-56
Haitao Du, Shanchieh Jay Yang:
Probabilistic Inference for Obfuscated Network Attack Sequences. 57-67
Session 1B: Networking

Emmanuelle Anceaume, Yann Busnel
, Erwan Le Merrer, Romaric Ludinard
, Jean Louis Marchand, Bruno Sericola:
Anomaly Characterization in Large Scale Networks. 68-79
Qin Liu
, John C. S. Lui, Cheng He, Lujia Pan, Wei Fan, Yunlong Shi:
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics. 80-87
Shuyuan Zhang, Franjo Ivancic, Cristian Lumezanu, Yifei Yuan, Aarti Gupta
, Sharad Malik
:
An Adaptable Rule Placement for Software-Defined Networks. 88-99
Session 2A: Software Vulnerabilities

Daiping Liu, Haining Wang, Angelos Stavrou
:
Detecting Malicious Javascript in PDF through Document Instrumentation. 100-111
Bin Liang, Wei You, Liangkun Liu, Wenchang Shi, Mario Heiderich:
Scriptless Timing Attacks on Web Browser Privacy. 112-123
Alex Shaw, Dusten Doggett, Munawar Hafiz:
Automatically Fixing C Buffer Overflows Using Program Transformations. 124-135
Session 2B: Cyber-Physical Systems

Lee W. Lerner, Zane R. Franklin, William T. Baumann, Cameron D. Patterson:
Application-Level Autonomic Hardware to Predict and Preempt Software Attacks on Industrial Control Systems. 136-147
Aaron Kane, Thomas E. Fuhrman, Philip Koopman:
Monitor Based Oracles for Cyber-Physical System Testing: Practical Experience Report. 148-155
Mohammad Ashiqur Rahman
, Ehab Al-Shaer, Rajesh G. Kavasseri
:
Security Threat Analytics and Countermeasure Synthesis for Power System State Estimation. 156-167
Session 3A: Apps Attacks

Hossen Asiful Mustafa
, Wenyuan Xu, Ahmad-Reza Sadeghi, Steffen Schulz:
You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks. 168-179
Chenxiong Qian, Xiapu Luo
, Yuru Shao, Alvin T. S. Chan:
On Tracking Information Flows through JNI in Android Applications. 180-191
Amin Kharraz, Engin Kirda, William K. Robertson
, Davide Balzarotti, Aurélien Francillon
:
Optical Delusions: A Study of Malicious QR Codes in the Wild. 192-203
Session 3B: Memory

Majid Jalili, Mohammad Arjomand, Hamid Sarbazi-Azad:
A Reliable 3D MLC PCM Architecture with Resistance Drift Predictor. 204-215
Lei Jiang, Youtao Zhang, Jun Yang:
Mitigating Write Disturbance in Super-Dense Phase Change Memories. 216-227
Jie Fan, Song Jiang, Jiwu Shu, Long Sun, Qingda Hu:
WL-Reviver: A Framework for Reviving any Wear-Leveling Techniques in the Face of Failures on Phase Change Memory. 228-239
Session 4A: Cloud Computing

Shankaranarayanan P. N., Ashiwan Sivakumar, Sanjay G. Rao, Mohit Tawarmalani
:
Performance Sensitive Replication in Geo-distributed Cloud Datastores. 240-251
Xiwei Xu, Liming Zhu
, Ingo Weber
, Len Bass, Daniel Sun:
POD-Diagnosis: Error Diagnosis of Sporadic Operations on Cloud Applications. 252-263
Quan Jia, Huangxin Wang, Dan Fleck
, Fei Li, Angelos Stavrou
, Walter Powell:
Catch Me If You Can: A Cloud-Enabled DDoS Defense. 264-275
Wei Zhang, Sheng Xiao, Yaping Lin, Ting, Siwang Zhou:
Secure Ranked Multi-keyword Search for Multiple Data Owners in Cloud Computing. 276-286
Session 4B: Social and Online Services

Xiaojing Liao, A. Selcuk Uluagac, Raheem A. Beyah
:
S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social Services. 287-298
Murtuza Jadliwala, Anindya Maiti, Vinod Namboodiri:
Social Puzzles: Context-Based Access Control in Online Social Networks. 299-310
Rui Ding, Qiang Fu, Jian-Guang Lou, Qingwei Lin, Dongmei Zhang
, Tao Xie:
Mining Historical Issue Repositories to Heal Large-Scale Online Service Systems. 311-322
Ivano Alessandro Elia
, Nuno Laranjeiro
, Marco Vieira
:
Understanding Interoperability Issues of Web Service Frameworks. 323-330
Session 5A: State Machine Replication
Session 5B: Faults

Majid Dadashi, Layali Rashid, Karthik Pattabiraman, Sathish Gopalakrishnan:
Hardware-Software Integrated Diagnosis for Intermittent Hardware Faults. 363-374
Jiesheng Wei, Anna Thomas, Guanpeng Li
, Karthik Pattabiraman:
Quantifying the Accuracy of High-Level Fault Injection Techniques for Hardware Faults. 375-382
Jing Li, Xinpu Ji, Yuhan Jia, Bingpeng Zhu, Gang Wang, Zhongwei Li, Xiaoguang Liu:
Hard Drive Failure Prediction Using Classification and Regression Trees. 383-394
Session 6A: Databases and Storage

Nicolas Schiper, Vincent Rahli
, Robbert van Renesse, Mark Bickford, Robert L. Constable:
Developing Correctly Replicated Databases Using Formal Tools. 395-406
Nicolas Schiper, Fernando Pedone
, Robbert van Renesse:
The Energy Efficiency of Database Replication Protocols. 407-418
Runhui Li, Patrick P. C. Lee
, Yuchong Hu:
Degraded-First Scheduling for MapReduce in Erasure-Coded Storage Clusters. 419-430
Session 6B: GPUs
Session 7A: System Configuration and Provisioning

Yixin Luo, Sriram Govindan, Bikash Sharma, Mark Santaniello, Justin Meza, Aman Kansal, Jie Liu, Badriddine Khessib, Kushagra Vaid, Onur Mutlu
:
Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous-Reliability Memory. 467-478
Zhen Huang
, David Lie:
Ocasta: Clustering Configuration Settings for Error Recovery. 479-490
Zhongshu Gu, Brendan Saltaformaggio, Xiangyu Zhang
, Dongyan Xu:
FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine. 491-502
Session 7B: Formal Methods
Session 8A: System and Component Reliability

Ronaldo Rodrigues Ferreira, Jean da Rolt, Gabriel L. Nazar, Álvaro Freitas Moreira, Luigi Carro:
Adaptive Low-Power Architecture for High-Performance and Reliable Embedded Computing. 538-549
Zhirong Shen, Jiwu Shu:
HV Code: An All-Around MDS Code to Improve Efficiency and Reliability of RAID-6 Systems. 550-561
Peng Wang, Kaiyuan Zhang, Rong Chen, Haibo Chen, Haibing Guan:
Replication-Based Fault-Tolerance for Large-Scale Graph Processing. 562-573
Session 8B: Miscellaneous

Rui Wu, Ping Chen, Peng Liu, Bing Mao:
System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection Needs. 574-585
Stephen Mason, Ilir Gashi
, Luca Lugini, Emanuela Marasco, Bojan Cukic
:
Interoperability between Fingerprint Biometric Systems: An Empirical Study. 586-597
Yizheng Chen, Manos Antonakakis, Roberto Perdisci
, Yacin Nadji, David Dagon, Wenke Lee:
DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic. 598-609
Session 9: Failure Analysis and Assurance

Catello Di Martino, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Fabio Baccanico, Joseph Fullop, William Kramer:
Lessons Learned from the Analysis of System Failures at Petascale: The Case of Blue Waters. 610-621
Konstantinos Parasyris, Georgios Tziantzoulis, Christos D. Antonopoulos
, Nikolaos Bellas
:
GemFI: A Fault Injection Tool for Studying the Behavior of Applications on Unreliable Substrates. 622-629
Yutaka Matsuno:
A Design and Implementation of an Assurance Case Language. 630-641
The Fourth International Workshop on Dependability of Clouds, Data Centers and Virtual Machine Technology (DCDV 2014)
(DCDV 2014) Session 1: Cloud Dependability

Min Fu, Liming Zhu
, Len Bass, Anna Liu:
Recovery for Failures in Rolling Upgrade on Clouds. 642-647
Arthur Martens, Christoph Borchert, Tobias Oliver Geissler, Daniel Lohmann, Olaf Spinczyk, Rüdiger Kapitza:
Crosscheck: Hardening Replicated Multithreaded Services. 648-653
Vasily A. Sartakov, Rüdiger Kapitza:
NV-Hypervisor: Hypervisor-Based Persistence for Virtual Machines. 654-659
Session 2: Dependability Evaluation
The First International Workshop on Dependability and Security of System Operation (DSSO 2014)
(DSSO 2014) Session 1: Error Detection and Diagnosis
Session 2: Design Strategies for Dependability

Min Fu, Len Bass, Anna Liu:
Towards a Taxonomy of Cloud Recovery Strategies. 696-701
Stephany Bellomo, Neil A. Ernst
, Robert L. Nord
, Rick Kazman:
Toward Design Decisions to Enable Deployability: Empirical Study of Three Projects Reaching for the Continuous Delivery Holy Grail. 702-707
The Fourth Fault Tolerance for HPC at eXtreme Scale (FTXS) Workshop 2014
Session 1: Checkpoint/Restart Modeling and Message Logging

Dewan Ibtesham, David Debonis, Dorian C. Arnold, Kurt B. Ferreira:
Coarse-Grained Energy Modeling of Rollback/Recovery Mechanisms. 708-713
Hideyuki Jitsumoto, Yuki Todoroki, Yutaka Ishikawa, Mitsuhisa Sato:
Grid-Oriented Process Clustering System for Partial Message Logging. 714-719
Session 2: Application and Algorithm Resiliency

Bo Fang, Karthik Pattabiraman, Matei Ripeanu, Sudhanva Gurumurthi:
Evaluating the Error Resilience of Parallel Programs. 720-725
Thomas B. Jones, David H. Ackley:
Comparison Criticality in Sorting Algorithms. 726-731
Session 3: Hardware - Reliability Studies and Tailored Resilience Techniques

Daniel A. G. de Oliveira
, Caio B. Lunardi, Laércio Lima Pilla
, Paolo Rech
, Philippe Olivier Alexandre Navaux, Luigi Carro:
Radiation Sensitivity of High Performance Computing Applications on Kepler-Based GPGPUs. 732-737
Sudarsun Kannan
, Naila Farooqui, Ada Gavrilovska, Karsten Schwan:
HeteroCheckpoint: Efficient Checkpointing for Accelerator-Based Systems. 738-743
Bin Huang, Ron Sass, Nathan DeBardeleben, Sean Blanchard:
Harnessing Unreliable Cores in Heterogeneous Architecture: The PyDac Programming Model and Runtime. 744-749
Session 4: Resiliency in HPC Messaging

Amin Hassani, Anthony Skjellum, Ron Brightwell:
Design and Evaluation of FA-MPI, a Transactional Resilience Scheme for Non-blocking MPI. 750-755
Jeremiah J. Wilke, Janine Bennett, Hemanth Kolla, Keita Teranishi, Nicole Slattengren, John Floren:
Extreme-Scale Viability of Collective Communication for Resilient Task Scheduling and Work Stealing. 756-761
The First International Workshop on Trustworthiness of Smart Grids (ToSG 2014)
(ToSG 2014) Session

Jianhua Zhang, Aranya Chakrabortty
, Yufeng Xin
:
Distributed Implementation of Wide-Area Monitoring Algorithms for Power Systems Using a US-Wide ExoGENI-WAMS Testbed. 762-767
Yiming Wu, Davood Babazadeh
, Lars Nordström:
Stateful Data Delivery Service for Wide Area Monitoring and Control Applications. 768-773
Masood Parvania
, Georgia Koutsandria
, Vishak Muthukumar, Sean Peisert
, Chuck McParland, Anna Scaglione
:
Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems. 774-779
Xiaojing Liao, David Formby, Carson Day, Raheem A. Beyah
:
Towards Secure Metering Data Analysis via Distributed Differential Privacy. 780-785
Session

Tara D. Gibson, Selim Ciraci, Sharma Poorva, Craig Allwardt, Mark Rice, Bora A. Akyol:
An Integrated Security Framework for GOSS Power Grid Analytics Platform. 786-791
Zhiyuan Teo, Vera Kutsenko, Ken Birman
, Robbert van Renesse:
Ironstack: Performance, Stability and Security for Power Grid Data Networks. 792-797

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







