Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
DSN
DSN 2014
Generate Citations
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
June 23 2014 to June 26 2014
Atlanta, GA, USA
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-xiii
Message from General Chair
Freely available from IEEE.
pp. xiv-xv
Message from Program Chairs
Freely available from IEEE.
pp. xvi-xvi
Organizing Committee
Freely available from IEEE.
pp. xvii-xvii
Program Committee
Freely available from IEEE.
pp. xviii-xix
Reviewers
Freely available from IEEE.
pp. xx-xx
DCDV 2014 Workshop Committee
Freely available from IEEE.
pp. xxi-xxi
DSSO 2014 Workshop Committee
Freely available from IEEE.
pp. xxii-xxii
FTXS 2014 Workshop Committee
Freely available from IEEE.
pp. xxiii-xxiii
ToSG 2014 Workshop Committee
Freely available from IEEE.
pp. xxiv-xxiv
Keynote
Full-text access may be available. Sign in or learn about subscription options.
pp. xxvi-xxvi
Jean-Claude Laprie Award on Dependable Computing
Freely available from IEEE.
pp. xxvii-xxvii
William C. Carter Award
Freely available from IEEE.
pp. xxviii-xxviii
Failure Analysis of Virtual and Physical Machines: Patterns, Causes and Characteristics
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Robert Birke
,
Ioana Giurgiu
,
Lydia Y. Chen
,
Dorothea Wiesmann
,
Ton Engbersen
Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural Invariants
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-24
by
Cuong Pham
,
Zachary Estrada
,
Phuong Cao
,
Zbigniew Kalbarczyk
,
Ravishankar K. Iyer
Lazy Checkpointing: Exploiting Temporal Locality in Failures to Mitigate Checkpointing Overheads on Extreme-Scale Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-36
by
Devesh Tiwari
,
Saurabh Gupta
,
Sudharshan S. Vazhkudai
Titan: Enabling Low Overhead and Multi-faceted Network Fingerprinting of a Bot
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-44
by
Osama Haq
,
Waqar Ahmed
,
Affan A. Syed
pSigene: Webcrawling to Generalize SQL Injection Signatures
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-56
by
Gaspar Modelo Howard
,
Christopher N. Gutierrez
,
Fahad A. Arshad
,
Saurabh Bagchi
,
Yuan Qi
Probabilistic Inference for Obfuscated Network Attack Sequences
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-67
by
Haitao Du
,
Shanchieh Jay Yang
Anomaly Characterization in Large Scale Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-79
by
Emmanuelle Anceaume
,
Yann Busnel
,
Erwan Le Merrer
,
Romaric Ludinard
,
Jean Louis Marchand
,
Bruno Sericola
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-87
by
Qin Liu
,
John C.S. Lui
,
Cheng He
,
Lujia Pan
,
Wei Fan
,
Yunlong Shi
An Adaptable Rule Placement for Software-Defined Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 88-99
by
Shuyuan Zhang
,
Franjo Ivancic
,
Cristian Lumezanu
,
Yifei Yuan
,
Aarti Gupta
,
Sharad Malik
Detecting Malicious Javascript in PDF through Document Instrumentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-111
by
Daiping Liu
,
Haining Wang
,
Angelos Stavrou
Scriptless Timing Attacks on Web Browser Privacy
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-123
by
Bin Liang
,
Wei You
,
Liangkun Liu
,
Wenchang Shi
,
Mario Heiderich
Automatically Fixing C Buffer Overflows Using Program Transformations
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-135
by
Alex Shaw
,
Dusten Doggett
,
Munawar Hafiz
Application-Level Autonomic Hardware to Predict and Preempt Software Attacks on Industrial Control Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-147
by
Lee W. Lerner
,
Zane R. Franklin
,
William T. Baumann
,
Cameron D. Patterson
Monitor Based Oracles for Cyber-Physical System Testing: Practical Experience Report
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-155
by
Aaron Kane
,
Thomas Fuhrman
,
Philip Koopman
Security Threat Analytics and Countermeasure Synthesis for Power System State Estimation
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-167
by
Mohammad Ashiqur Rahman
,
Ehab Al-Shaer
,
Rajesh G. Kavasseri
You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-179
by
Hossen Mustafa
,
Wenyuan Xu
,
Ahmad Reza Sadeghi
,
Steffen Schulz
On Tracking Information Flows through JNI in Android Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-191
by
Chenxiong Qian
,
Xiapu Luo
,
Yuru Shao
,
Alvin T.S. Chan
Optical Delusions: A Study of Malicious QR Codes in the Wild
Full-text access may be available. Sign in or learn about subscription options.
pp. 192-203
by
Amin Kharraz
,
Engin Kirda
,
William Robertson
,
Davide Balzarotti
,
Aurelien Francillon
A Reliable 3D MLC PCM Architecture with Resistance Drift Predictor
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-215
by
Majid Jalili
,
Mohammad Arjomand
,
Hamid Sarbazi-Azad
Mitigating Write Disturbance in Super-Dense Phase Change Memories
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-227
by
Lei Jiang
,
Youtao Zhang
,
Jun Yang
WL-Reviver: A Framework for Reviving any Wear-Leveling Techniques in the Face of Failures on Phase Change Memory
Full-text access may be available. Sign in or learn about subscription options.
pp. 228-239
by
Jie Fan
,
Song Jiang
,
Jiwu Shu
,
Long Sun
,
Qingda Hu
Performance Sensitive Replication in Geo-distributed Cloud Datastores
Full-text access may be available. Sign in or learn about subscription options.
pp. 240-251
by
P.N. Shankaranarayanan
,
Ashiwan Sivakumar
,
Sanjay Rao
,
Mohit Tawarmalani
POD-Diagnosis: Error Diagnosis of Sporadic Operations on Cloud Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-263
by
Xiwei Xu
,
Liming Zhu
,
Ingo Weber
,
Len Bass
,
Daniel Sun
Catch Me If You Can: A Cloud-Enabled DDoS Defense
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-275
by
Quan Jia
,
Huangxin Wang
,
Dan Fleck
,
Fei Li
,
Angelos Stavrou
,
Walter Powell
Secure Ranked Multi-keyword Search for Multiple Data Owners in Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 276-286
by
Wei Zhang
,
Sheng Xiao
,
Yaping Lin
,
Ting Zhou
,
Siwang Zhou
S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-298
by
Xiaojing Liao
,
Selcuk Uluagac
,
Raheem A. Beyah
Social Puzzles: Context-Based Access Control in Online Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 299-310
by
Murtuza Jadliwala
,
Anindya Maiti
,
Vinod Namboodiri
Mining Historical Issue Repositories to Heal Large-Scale Online Service Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-322
by
Rui Ding
,
Qiang Fu
,
Jian Guang Lou
,
Qingwei Lin
,
Dongmei Zhang
,
Tao Xie
Understanding Interoperability Issues of Web Service Frameworks
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-330
by
Ivano Alessandro Elia
,
Nuno Laranjeiro
,
Marco Vieira
Scalable State-Machine Replication
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-342
by
Carlos Eduardo Bezerra
,
Fernando Pedone
,
Robbert Van Renesse
Clock-RSM: Low-Latency Inter-datacenter State Machine Replication Using Loosely Synchronized Physical Clocks
Full-text access may be available. Sign in or learn about subscription options.
pp. 343-354
by
Jiaqing Du
,
Daniele Sciascia
,
Sameh Elnikety
,
Willy Zwaenepoel
,
Fernando Pedone
State Machine Replication for the Masses with BFT-SMART
Full-text access may be available. Sign in or learn about subscription options.
pp. 355-362
by
Alysson Bessani
,
João Sousa
,
Eduardo E.P. Alchieri
Hardware-Software Integrated Diagnosis for Intermittent Hardware Faults
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-374
by
Majid Dadashi
,
Layali Rashid
,
Karthik Pattabiraman
,
Sathish Gopalakrishnan
Quantifying the Accuracy of High-Level Fault Injection Techniques for Hardware Faults
Full-text access may be available. Sign in or learn about subscription options.
pp. 375-382
by
Jiesheng Wei
,
Anna Thomas
,
Guanpeng Li
,
Karthik Pattabiraman
Hard Drive Failure Prediction Using Classification and Regression Trees
Full-text access may be available. Sign in or learn about subscription options.
pp. 383-394
by
Jing Li
,
Xinpu Ji
,
Yuhan Jia
,
Bingpeng Zhu
,
Gang Wang
,
Zhongwei Li
,
Xiaoguang Liu
Developing Correctly Replicated Databases Using Formal Tools
Full-text access may be available. Sign in or learn about subscription options.
pp. 395-406
by
Nicolas Schiper
,
Vincent Rahli
,
Robbert Van Renesse
,
Marck Bickford
,
Robert L. Constable
The Energy Efficiency of Database Replication Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 407-418
by
Nicolas Schiper
,
Fernando Pedone
,
Robbert Van Renesse
Degraded-First Scheduling for MapReduce in Erasure-Coded Storage Clusters
Full-text access may be available. Sign in or learn about subscription options.
pp. 419-430
by
Runhui Li
,
Patrick P.C. Lee
,
Yuchong Hu
Warped-Shield: Tolerating Hard Faults in GPGPUs
Full-text access may be available. Sign in or learn about subscription options.
pp. 431-442
by
Waleed Dweik
,
Mohammad Abdel-Majeed
,
Murali Annavaram
A-ABFT: Autonomous Algorithm-Based Fault Tolerance for Matrix Multiplications on Graphics Processing Units
Full-text access may be available. Sign in or learn about subscription options.
pp. 443-454
by
Claus Braun
,
Sebastian Halder
,
Hans Joachim Wunderlich
Impact of GPUs Parallelism Management on Safety-Critical and HPC Applications Reliability
Full-text access may be available. Sign in or learn about subscription options.
pp. 455-466
by
P. Rech
,
L.L. Pilla
,
P.O.A. Navaux
,
L. Carro
Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous-Reliability Memory
Full-text access may be available. Sign in or learn about subscription options.
pp. 467-478
by
Yixin Luo
,
Sriram Govindan
,
Bikash Sharma
,
Mark Santaniello
,
Justin Meza
,
Aman Kansal
,
Jie Liu
,
Badriddine Khessib
,
Kushagra Vaid
,
Onur Mutlu
Ocasta: Clustering Configuration Settings for Error Recovery
Full-text access may be available. Sign in or learn about subscription options.
pp. 479-490
by
Zhen Huang
,
David Lie
FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 491-502
by
Zhongshu Gu
,
Brendan Saltaformaggio
,
Xiangyu Zhang
,
Dongyan Xu
Model Checking Stochastic Automata for Dependability and Performance Measures
Full-text access may be available. Sign in or learn about subscription options.
pp. 503-514
by
Peter Buchholz
,
Jan Krige
,
Dimitri Scheftelowitsch
Scalable Security Models for Assessing Effectiveness of Moving Target Defenses
Full-text access may be available. Sign in or learn about subscription options.
pp. 515-526
by
Jin B. Hong
,
Dong Seong Kim
A Novel Variable Ordering Heuristic for BDD-based K-Terminal Reliability
Full-text access may be available. Sign in or learn about subscription options.
pp. 527-537
by
Minh Le
,
Josef Weidendorfer
,
Max Walter
Adaptive Low-Power Architecture for High-Performance and Reliable Embedded Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 538-549
by
Ronaldo R. Ferreira
,
Jean Da Rolt
,
Gabriel L. Nazar
,
Alvaro F. Moreira
,
Luigi Carro
HV Code: An All-Around MDS Code to Improve Efficiency and Reliability of RAID-6 Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 550-561
by
Zhirong Shen
,
Jiwu Shu
Replication-Based Fault-Tolerance for Large-Scale Graph Processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 562-573
by
Peng Wang
,
Kaiyuan Zhang
,
Rong Chen
,
Haibo Chen
,
Haibing Guan
System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection Needs
Full-text access may be available. Sign in or learn about subscription options.
pp. 574-585
by
Rui Wu
,
Ping Chen
,
Peng Liu
,
Bing Mao
Interoperability between Fingerprint Biometric Systems: An Empirical Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 586-597
by
Stephen Mason
,
Ilir Gashi
,
Luca Lugini
,
Emanuela Marasco
,
Bojan Cukic
DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 598-609
by
Yizheng Chen
,
Manos Antonakakis
,
Roberto Perdisci
,
Yacin Nadji
,
David Dagon
,
Wenke Lee
Lessons Learned from the Analysis of System Failures at Petascale: The Case of Blue Waters
Full-text access may be available. Sign in or learn about subscription options.
pp. 610-621
by
Catello Di Martino
,
Zbigniew Kalbarczyk
,
Ravishankar K. Iyer
,
Fabio Baccanico
,
Joseph Fullop
,
William Kramer
GemFI: A Fault Injection Tool for Studying the Behavior of Applications on Unreliable Substrates
Full-text access may be available. Sign in or learn about subscription options.
pp. 622-629
by
Konstantinos Parasyris
,
Georgios Tziantzoulis
,
Christos D. Antonopoulos
,
Nikolaos Bellas
A Design and Implementation of an Assurance Case Language
Full-text access may be available. Sign in or learn about subscription options.
pp. 630-641
by
Yutaka Matsuno
Recovery for Failures in Rolling Upgrade on Clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 642-647
by
Min Fu
,
Liming Zhu
,
Len Bass
,
Anna Liu
Crosscheck: Hardening Replicated Multithreaded Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 648-653
by
Arthur Martens
,
Christoph Borchert
,
Tobias Oliver Geissler
,
Daniel Lohmann
,
Olaf Spinczyk
,
Rudiger Kapitza
NV-Hypervisor: Hypervisor-Based Persistence for Virtual Machines
Full-text access may be available. Sign in or learn about subscription options.
pp. 654-659
by
Vasily A. Sartakov
,
Rudiger Kapitza
A Markov Decision Process Approach for Optimal Data Backup Scheduling
Full-text access may be available. Sign in or learn about subscription options.
pp. 660-665
by
Ruofan Xia
,
Fumio Machida
,
Kishor Trivedi
Availability Evaluation of Digital Library Cloud Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 666-671
by
Julian Araujo
,
Paulo Maciel
,
Matheus Torquato
,
Gustavo Callou
,
Ermeson Andrade
Defects per Million (DPM) Evaluation for a Cloud Dealing with VM Failures Using Checkpointing
Full-text access may be available. Sign in or learn about subscription options.
pp. 672-677
by
Subrota K. Mondal
,
Jogesh K. Muppala
Predicting Incident Reports for IT Help Desk
Full-text access may be available. Sign in or learn about subscription options.
pp. 678-683
by
Anneliese Andrews
,
Joseph Lucente
What Vulnerability Do We Need to Patch First?
Full-text access may be available. Sign in or learn about subscription options.
pp. 684-689
by
Jin B. Hong
,
Dong Seong Kim
,
Abdelkrim Haqiq
What Logs Should You Look at When an Application Fails? Insights from an Industrial Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 690-695
by
Marcello Cinque
,
Domenico Cotroneo
,
Raffaele Della Corte
,
Antonio Pecchia
Towards a Taxonomy of Cloud Recovery Strategies
Full-text access may be available. Sign in or learn about subscription options.
pp. 696-701
by
Min Fu
,
Len Bass
,
Anna Liu
Toward Design Decisions to Enable Deployability: Empirical Study of Three Projects Reaching for the Continuous Delivery Holy Grail
Full-text access may be available. Sign in or learn about subscription options.
pp. 702-707
by
Stephany Bellomo
,
Neil Ernst
,
Robert Nord
,
Rick Kazman
Coarse-Grained Energy Modeling of Rollback/Recovery Mechanisms
Full-text access may be available. Sign in or learn about subscription options.
pp. 708-713
by
Dewan Ibtesham
,
David DeBonis
,
Dorian Arnold
,
Kurt B. Ferreira
Grid-Oriented Process Clustering System for Partial Message Logging
Full-text access may be available. Sign in or learn about subscription options.
pp. 714-719
by
Hideyuki Jitsumoto
,
Yuki Todoroki
,
Yutaka Ishikawa
,
Mitsuhisa Sato
Evaluating the Error Resilience of Parallel Programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 720-725
by
Bo Fang
,
Karthik Pattabiraman
,
Matei Ripeanu
,
Sudhanva Gurumurthi
Comparison Criticality in Sorting Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 726-731
by
Thomas B. Jones
,
David H. Ackley
Radiation Sensitivity of High Performance Computing Applications on Kepler-Based GPGPUs
Full-text access may be available. Sign in or learn about subscription options.
pp. 732-737
by
Daniel A.G. Oliveira
,
Caio B. Lunardi
,
Laercio L. Pilla
,
Paolo Rech
,
Philippe O.A. Navaux
,
Luigi Carro
HeteroCheckpoint: Efficient Checkpointing for Accelerator-Based Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 738-743
by
Sudarsun Kannan
,
Naila Farooqui
,
Ada Gavrilovska
,
Karsten Schwan
Harnessing Unreliable Cores in Heterogeneous Architecture: The PyDac Programming Model and Runtime
Full-text access may be available. Sign in or learn about subscription options.
pp. 744-749
by
Bin Huang
,
Ron Sass
,
Nathan Debardeleben
,
Sean Blanchard
Design and Evaluation of FA-MPI, a Transactional Resilience Scheme for Non-blocking MPI
Full-text access may be available. Sign in or learn about subscription options.
pp. 750-755
by
Amin Hassani
,
Anthony Skjellum
,
Ron Brightwell
Extreme-Scale Viability of Collective Communication for Resilient Task Scheduling and Work Stealing
Full-text access may be available. Sign in or learn about subscription options.
pp. 756-761
by
Jeremiah Wilke
,
Janine Bennett
,
Hemanth Kolla
,
Keita Teranishi
,
Nicole Slattengren
,
John Floren
Distributed Implementation of Wide-Area Monitoring Algorithms for Power Systems Using a US-Wide ExoGENI-WAMS Testbed
Full-text access may be available. Sign in or learn about subscription options.
pp. 762-767
by
Jianhua Zhang
,
Aranya Chakrabortty
,
Yufeng Xin
Stateful Data Delivery Service for Wide Area Monitoring and Control Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 768-773
by
Yiming Wu
,
Davood Babazadeh
,
Lars Nordstrom
Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 774-779
by
Masood Parvania
,
Georgia Koutsandria
,
Vishak Muthukumary
,
Sean Peisert
,
Chuck McParland
,
Anna Scaglione
Towards Secure Metering Data Analysis via Distributed Differential Privacy
Full-text access may be available. Sign in or learn about subscription options.
pp. 780-785
by
Xiaojing Liao
,
David Formby
,
Carson Day
,
Raheem A. Beyah
An Integrated Security Framework for GOSS Power Grid Analytics Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 786-791
by
Tara Gibson
,
Selim Ciraci
,
Poorva Sharma
,
Craig Allwardt
,
Mark Rice
,
Bora Akyol
Ironstack: Performance, Stability and Security for Power Grid Data Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 792-797
by
Zhiyuan Teo
,
Vera Kutsenko
,
Ken Birman
,
Robbert van Renesse
Author index
Freely available from IEEE.
pp. 798-801
[Publisher's information]
Freely available from IEEE.
pp. 802-802
Showing 100 out of 100