Default Cover Image

2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

June 24 2019 to June 27 2019

Portland, OR, USA

ISSN: 1530-0889

ISBN: 978-1-7281-0057-9

Table of Contents

[Title page i]Freely available from IEEE.pp. 1-1
[Title page iii]Freely available from IEEE.pp. 3-3
Best Paper Award [3 candidate papers]Freely available from IEEE.pp. 20-20
Copyright PageFreely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-12
The Jean-Claude Laprie AwardFreely available from IEEE.pp. 22-22
Message from the General ChairFreely available from IEEE.pp. 13-13
Message from the Research Track ChairsFreely available from IEEE.pp. 14-15
Steering CommitteeFreely available from IEEE.pp. 16-16
Organizing CommitteeFreely available from IEEE.pp. 17-17
Research Track Program CommitteeFreely available from IEEE.pp. 18-19
William C. Carter AwardFreely available from IEEE.pp. 21-21
Test-of-Time AwardFreely available from IEEE.pp. 23-23
[Keynotes - 4 abstracts]Full-text access may be available. Sign in or learn about subscription options.pp. 24-27
Efficient Treatment of Uncertainty in System Reliability Analysis using Importance MeasuresFull-text access may be available. Sign in or learn about subscription options.pp. 76-87
SponsorsFreely available from IEEE.pp. 28-28
GreenFlag: Protecting 3D-Racetrack Memory from Shift ErrorsFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Classifying Malware Represented as Control Flow Graphs using Deep Graph Convolutional Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 52-63
ZK-GanDef: A GAN Based Zero Knowledge Adversarial Training Defense for Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 64-75
Extensions of Network Reliability AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 88-99
An Online Approach to Estimate Parameters of Phase-Type DistributionsFull-text access may be available. Sign in or learn about subscription options.pp. 100-111
Deep Validation: Toward Detecting Real-World Corner Cases for Deep Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 125-137
SOTER: A Runtime Assurance Framework for Programming Safe Robotics SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 138-150
OneFile: A Wait-Free Persistent Transactional MemoryFull-text access may be available. Sign in or learn about subscription options.pp. 151-163
Sparkle: Speculative Deterministic Concurrency Control for Partially Replicated Transactional StoresFull-text access may be available. Sign in or learn about subscription options.pp. 164-175
White-Box Atomic MulticastFull-text access may be available. Sign in or learn about subscription options.pp. 176-187
Fault Tolerance Through Redundant Execution on COTS Multicores: Exploring Trade-OffsFull-text access may be available. Sign in or learn about subscription options.pp. 188-200
ParaMedic: Heterogeneous Parallel Error CorrectionFull-text access may be available. Sign in or learn about subscription options.pp. 201-213
BenchIoT: A Security Benchmark for the Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 234-246
Exploiting Memory Corruption Vulnerabilities in Connman for IoT DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 247-255
Rigorous, Effortless and Timely Assessment of Cellular Network ChangesFull-text access may be available. Sign in or learn about subscription options.pp. 256-263
Bonsai: Efficient Fast Failover Routing Using Small ArborescencesFull-text access may be available. Sign in or learn about subscription options.pp. 276-288
SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM ProcessorsFull-text access may be available. Sign in or learn about subscription options.pp. 289-301
Deploying Intrusion-Tolerant SCADA for the Power GridFull-text access may be available. Sign in or learn about subscription options.pp. 328-335
Exploiting Latency and Error Tolerance of GPGPU Applications for an Energy-Efficient DRAMFull-text access may be available. Sign in or learn about subscription options.pp. 362-374
SuDoku: Tolerating High-Rate of Transient Failures for Enabling Scalable STTRAMFull-text access may be available. Sign in or learn about subscription options.pp. 388-400
NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGXFull-text access may be available. Sign in or learn about subscription options.pp. 401-413
TEE-Perf: A Profiler for Trusted Execution EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 414-421
Pseudo-Honeypot: Toward Efficient and Scalable Spam SnifferFull-text access may be available. Sign in or learn about subscription options.pp. 435-446
BorderPatrol: Securing BYOD using Fine-Grained Contextual InformationFull-text access may be available. Sign in or learn about subscription options.pp. 460-472
Characterizing and Understanding HPC Job Failures Over The 2K-Day Life of IBM BlueGene/Q SystemFull-text access may be available. Sign in or learn about subscription options.pp. 473-484
Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSSFull-text access may be available. Sign in or learn about subscription options.pp. 485-492
Where Are You Taking Me? Behavioral Analysis of Open DNS ResolversFull-text access may be available. Sign in or learn about subscription options.pp. 493-504
POLaR: Per-Allocation Object Layout RandomizationFull-text access may be available. Sign in or learn about subscription options.pp. 505-516
FabZK: Supporting Privacy-Preserving, Auditable Smart Contracts in Hyperledger FabricFull-text access may be available. Sign in or learn about subscription options.pp. 543-555
Fast Predictive Repair in Erasure-Coded StorageFull-text access may be available. Sign in or learn about subscription options.pp. 556-567
UChecker: Automatically Detecting PHP-Based Unrestricted File Upload VulnerabilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 581-592
PrivAnalyzer: Measuring the Efficacy of Linux Privilege UseFull-text access may be available. Sign in or learn about subscription options.pp. 593-604
1dVul: Discovering 1-Day Vulnerabilities through Binary PatchesFull-text access may be available. Sign in or learn about subscription options.pp. 605-616
Robust Anomaly Detection on Unreliable DataFull-text access may be available. Sign in or learn about subscription options.pp. 630-637
Author indexFreely available from IEEE.pp. 645-648
Publisher's InformationFreely available from IEEE.pp. 650-650
Showing 71 out of 71