Default Cover Image

2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

June 23 2014 to June 26 2014

Atlanta, GA, USA

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-xiii
Message from General ChairFreely available from IEEE.pp. xiv-xv
Message from Program ChairsFreely available from IEEE.pp. xvi-xvi
Organizing CommitteeFreely available from IEEE.pp. xvii-xvii
Program CommitteeFreely available from IEEE.pp. xviii-xix
ReviewersFreely available from IEEE.pp. xx-xx
DCDV 2014 Workshop CommitteeFreely available from IEEE.pp. xxi-xxi
DSSO 2014 Workshop CommitteeFreely available from IEEE.pp. xxii-xxii
FTXS 2014 Workshop CommitteeFreely available from IEEE.pp. xxiii-xxiii
ToSG 2014 Workshop CommitteeFreely available from IEEE.pp. xxiv-xxiv
KeynoteFull-text access may be available. Sign in or learn about subscription options.pp. xxvi-xxvi
Jean-Claude Laprie Award on Dependable ComputingFreely available from IEEE.pp. xxvii-xxvii
William C. Carter AwardFreely available from IEEE.pp. xxviii-xxviii
Titan: Enabling Low Overhead and Multi-faceted Network Fingerprinting of a BotFull-text access may be available. Sign in or learn about subscription options.pp. 37-44
pSigene: Webcrawling to Generalize SQL Injection SignaturesFull-text access may be available. Sign in or learn about subscription options.pp. 45-56
Probabilistic Inference for Obfuscated Network Attack SequencesFull-text access may be available. Sign in or learn about subscription options.pp. 57-67
Anomaly Characterization in Large Scale NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 68-79
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic AnalyticsFull-text access may be available. Sign in or learn about subscription options.pp. 80-87
An Adaptable Rule Placement for Software-Defined NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 88-99
Detecting Malicious Javascript in PDF through Document InstrumentationFull-text access may be available. Sign in or learn about subscription options.pp. 100-111
Scriptless Timing Attacks on Web Browser PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 112-123
Automatically Fixing C Buffer Overflows Using Program TransformationsFull-text access may be available. Sign in or learn about subscription options.pp. 124-135
Monitor Based Oracles for Cyber-Physical System Testing: Practical Experience ReportFull-text access may be available. Sign in or learn about subscription options.pp. 148-155
Security Threat Analytics and Countermeasure Synthesis for Power System State EstimationFull-text access may be available. Sign in or learn about subscription options.pp. 156-167
You Can Call but You Can't Hide: Detecting Caller ID Spoofing AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 168-179
On Tracking Information Flows through JNI in Android ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 180-191
Optical Delusions: A Study of Malicious QR Codes in the WildFull-text access may be available. Sign in or learn about subscription options.pp. 192-203
A Reliable 3D MLC PCM Architecture with Resistance Drift PredictorFull-text access may be available. Sign in or learn about subscription options.pp. 204-215
Mitigating Write Disturbance in Super-Dense Phase Change MemoriesFull-text access may be available. Sign in or learn about subscription options.pp. 216-227
Performance Sensitive Replication in Geo-distributed Cloud DatastoresFull-text access may be available. Sign in or learn about subscription options.pp. 240-251
POD-Diagnosis: Error Diagnosis of Sporadic Operations on Cloud ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 252-263
Catch Me If You Can: A Cloud-Enabled DDoS DefenseFull-text access may be available. Sign in or learn about subscription options.pp. 264-275
Secure Ranked Multi-keyword Search for Multiple Data Owners in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 276-286
S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 287-298
Social Puzzles: Context-Based Access Control in Online Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 299-310
Mining Historical Issue Repositories to Heal Large-Scale Online Service SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 311-322
Understanding Interoperability Issues of Web Service FrameworksFull-text access may be available. Sign in or learn about subscription options.pp. 323-330
Scalable State-Machine ReplicationFull-text access may be available. Sign in or learn about subscription options.pp. 331-342
State Machine Replication for the Masses with BFT-SMARTFull-text access may be available. Sign in or learn about subscription options.pp. 355-362
Hardware-Software Integrated Diagnosis for Intermittent Hardware FaultsFull-text access may be available. Sign in or learn about subscription options.pp. 363-374
Quantifying the Accuracy of High-Level Fault Injection Techniques for Hardware FaultsFull-text access may be available. Sign in or learn about subscription options.pp. 375-382
Hard Drive Failure Prediction Using Classification and Regression TreesFull-text access may be available. Sign in or learn about subscription options.pp. 383-394
Developing Correctly Replicated Databases Using Formal ToolsFull-text access may be available. Sign in or learn about subscription options.pp. 395-406
The Energy Efficiency of Database Replication ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 407-418
Degraded-First Scheduling for MapReduce in Erasure-Coded Storage ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 419-430
Warped-Shield: Tolerating Hard Faults in GPGPUsFull-text access may be available. Sign in or learn about subscription options.pp. 431-442
Impact of GPUs Parallelism Management on Safety-Critical and HPC Applications ReliabilityFull-text access may be available. Sign in or learn about subscription options.pp. 455-466
Ocasta: Clustering Configuration Settings for Error RecoveryFull-text access may be available. Sign in or learn about subscription options.pp. 479-490
FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual MachineFull-text access may be available. Sign in or learn about subscription options.pp. 491-502
Model Checking Stochastic Automata for Dependability and Performance MeasuresFull-text access may be available. Sign in or learn about subscription options.pp. 503-514
Scalable Security Models for Assessing Effectiveness of Moving Target DefensesFull-text access may be available. Sign in or learn about subscription options.pp. 515-526
A Novel Variable Ordering Heuristic for BDD-based K-Terminal ReliabilityFull-text access may be available. Sign in or learn about subscription options.pp. 527-537
HV Code: An All-Around MDS Code to Improve Efficiency and Reliability of RAID-6 SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 550-561
Replication-Based Fault-Tolerance for Large-Scale Graph ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 562-573
System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection NeedsFull-text access may be available. Sign in or learn about subscription options.pp. 574-585
Interoperability between Fingerprint Biometric Systems: An Empirical StudyFull-text access may be available. Sign in or learn about subscription options.pp. 586-597
A Design and Implementation of an Assurance Case LanguageFull-text access may be available. Sign in or learn about subscription options.pp. 630-641
Recovery for Failures in Rolling Upgrade on CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 642-647
Crosscheck: Hardening Replicated Multithreaded ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 648-653
NV-Hypervisor: Hypervisor-Based Persistence for Virtual MachinesFull-text access may be available. Sign in or learn about subscription options.pp. 654-659
A Markov Decision Process Approach for Optimal Data Backup SchedulingFull-text access may be available. Sign in or learn about subscription options.pp. 660-665
Availability Evaluation of Digital Library Cloud ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 666-671
Defects per Million (DPM) Evaluation for a Cloud Dealing with VM Failures Using CheckpointingFull-text access may be available. Sign in or learn about subscription options.pp. 672-677
Predicting Incident Reports for IT Help DeskFull-text access may be available. Sign in or learn about subscription options.pp. 678-683
What Vulnerability Do We Need to Patch First?Full-text access may be available. Sign in or learn about subscription options.pp. 684-689
Towards a Taxonomy of Cloud Recovery StrategiesFull-text access may be available. Sign in or learn about subscription options.pp. 696-701
Coarse-Grained Energy Modeling of Rollback/Recovery MechanismsFull-text access may be available. Sign in or learn about subscription options.pp. 708-713
Grid-Oriented Process Clustering System for Partial Message LoggingFull-text access may be available. Sign in or learn about subscription options.pp. 714-719
Evaluating the Error Resilience of Parallel ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 720-725
Comparison Criticality in Sorting AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 726-731
HeteroCheckpoint: Efficient Checkpointing for Accelerator-Based SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 738-743
Harnessing Unreliable Cores in Heterogeneous Architecture: The PyDac Programming Model and RuntimeFull-text access may be available. Sign in or learn about subscription options.pp. 744-749
Design and Evaluation of FA-MPI, a Transactional Resilience Scheme for Non-blocking MPIFull-text access may be available. Sign in or learn about subscription options.pp. 750-755
Stateful Data Delivery Service for Wide Area Monitoring and Control ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 768-773
Towards Secure Metering Data Analysis via Distributed Differential PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 780-785
An Integrated Security Framework for GOSS Power Grid Analytics PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 786-791
Ironstack: Performance, Stability and Security for Power Grid Data NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 792-797
Author indexFreely available from IEEE.pp. 798-801
[Publisher's information]Freely available from IEEE.pp. 802-802
Showing 100 out of 100