default search action
48th DSN 2018: Luxembourg City, Luxembourg
- 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018, Luxembourg City, Luxembourg, June 25-28, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-5596-2
Best Paper Candidates - Pick Your Best Paper
- Kristina Spirovska, Diego Didona, Willy Zwaenepoel:
Wren: Nonblocking Reads in a Partitioned Transactional Causally Consistent Data Store. 1-12 - Vinicius Fratin, Daniel Oliveira, Caio B. Lunardi, Fernando Santos, Gennaro Severino Rodrigues, Paolo Rech:
Code-Dependent and Architecture-Dependent Reliability Behaviors. 13-26 - Guanpeng Li, Karthik Pattabiraman, Siva Kumar Sastry Hari, Michael B. Sullivan, Timothy Tsai:
Modeling Soft-Error Propagation in Programs. 27-38
Session 1 : Byzantine and Multicast (Many Many Generals)
- Paulo R. Coelho, Tarcisio Ceolin Junior, Alysson Bessani, Fernando Luís Dotti, Fernando Pedone:
Byzantine Fault-Tolerant Atomic Multicast. 39-50 - João Sousa, Alysson Bessani, Marko Vukolic:
A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform. 51-58 - Bijun Li, Nico Weichbrodt, Johannes Behl, Pierre-Louis Aublin, Tobias Distler, Rüdiger Kapitza:
Troxy: Transparent Access to Byzantine Fault-Tolerant Systems. 59-70 - Jonathan Behrens, Sagar Jha, Ken Birman, Edward Tremel:
RDMC: A Reliable RDMA Multicast for Large Objects. 71-82
Session 2 : HPC or Not
- Rohan Garg, Tirthak Patel, Gene Cooperman, Devesh Tiwari:
Shiraz: Exploiting System Reliability and Application Resilience Characteristics to Improve Large Scale System Throughput. 83-94 - Bin Nie, Ji Xue, Saurabh Gupta, Tirthak Patel, Christian Engelmann, Evgenia Smirni, Devesh Tiwari:
Machine Learning Models for GPU Error Prediction in a Large Scale HPC System. 95-106 - Mohit Kumar, Saurabh Gupta, Tirthak Patel, Michael Wilder, Weisong Shi, Song Fu, Christian Engelmann, Devesh Tiwari:
Understanding and Analyzing Interconnect Errors and Network Congestion on a Large Scale HPC System. 107-114 - Diyu Zhou, Yuval Tamir:
Fast Hypervisor Recovery Without Reboot. 115-126
Session 3: Critical Infrastructures
- Christian Wressnegger, Ansgar Kellner, Konrad Rieck:
ZOE: Content-Based Anomaly Detection for Industrial Control Systems. 127-138 - Subhash Lakshminarayana, David K. Y. Yau:
Cost-Benefit Analysis of Moving-Target Defense in Power Grids. 139-150 - Zhenqi Huang, Sriharsha Etigowni, Luis Garcia, Sayan Mitra, Saman A. Zonouz:
Algorithmic Attack Synthesis Using Hybrid Dynamics of Power Grid Critical Infrastructures. 151-162 - André Nogueira, Miguel Garcia, Alysson Bessani, Nuno Neves:
On the Challenges of Building a BFT SCADA. 163-170
Session 4 : Storage and Redundancy
- Roberta Barbi, Dorian Burihabwa, Pascal Felber, Hugues Mercier, Valerio Schiavoni:
RECAST: Random Entanglement for Censorship-Resistant Archival STorage. 171-182 - Vero Estrada-Galiñanes, Ethan L. Miller, Pascal Felber, Jehan-François Pâris:
Alpha Entanglement Codes: Practical Erasure Codes to Archive Data in Unreliable Environments. 183-194 - Fritz Alder, Arseny Kurnikov, Andrew Paverd, N. Asokan:
Migrating SGX Enclaves with Persistent State. 195-206 - Stefan Contiu, Rafael Pires, Sébastien Vaucher, Marcelo Pasin, Pascal Felber, Laurent Réveillère:
IBBE-SGX: Cryptographic Group Access Control Using Trusted Execution Environments. 207-218
Session 5 : Attacks and Intrusion Detection
- Shixiong Zhao, Rui Gu, Haoran Qiu, Tsz On Li, Yuexuan Wang, Heming Cui, Junfeng Yang:
OWL: Understanding and Detecting Concurrency Attacks. 219-230 - Meisam Navaki Arefi, Geoffrey Alexander, Hooman Rokham, Aokun Chen, Michalis Faloutsos, Xuetao Wei, Daniela Seabra Oliveira, Jedidiah R. Crandall:
FAROS: Illuminating In-memory Injection Attacks via Provenance-Based Whole-System Dynamic Information Flow Tracking. 231-242 - Zhilong Wang, Xuhua Ding, Chengbin Pang, Jian Guo, Jun Zhu, Bing Mao:
To Detect Stack Buffer Overflow with Polymorphic Canaries. 243-254 - Amy Babay, Thomas Tantillo, Trevor Aron, Marco Platania, Yair Amir:
Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid. 255-266
Session 6 : Modelling and Verification
- Xiaoxiao Yang, Joost-Pieter Katoen, Huimin Lin, Gaoang Liu, Hao Wu:
Branching Bisimulation and Concurrent Object Verification. 267-278 - Guanpeng Li, Karthik Pattabiraman:
Modeling Input-Dependent Error Propagation in Programs. 279-290 - Peter Buchholz, Tugrul Dayar:
Efficient Transient Analysis of a Class of Compositional Fluid Stochastic Petri Nets. 291-302 - Cyrille Jégourel, Jingyi Wang, Jun Sun:
Importance Sampling of Interval Markov Chains. 303-313
Session 7 : Architectures Reliability
- Atieh Lotfi, Nirmal R. Saxena, Richard Bramley, Paul Racunas, Philip P. Shirvani:
Low Overhead Tag Error Mitigation for GPU Architectures. 314-321 - Ilya Tuzov, David de Andrés, Juan Carlos Ruiz:
DAVOS: EDA Toolkit for Dependability Assessment, Verification, Optimisation and Selection of Hardware Models. 322-329 - Konstantinos Parasyris, Panos K. Koutsovasilis, Vassilis Vassiliadis, Christos D. Antonopoulos, Nikolaos Bellas, Spyros Lalis:
A Framework for Evaluating Software on Reduced Margins Hardware. 330-337 - Sam Ainsworth, Timothy M. Jones:
Parallel Error Detection Using Heterogeneous Cores. 338-349
Session 8 : Networks Security
- Qinwen Hu, Muhammad Rizwan Asghar, Nevil Brownlee:
Measuring IPv6 DNS Reconnaissance Attacks and Preventing Them Using DNS Guard. 350-361 - Lin Jin, Shuai Hao, Haining Wang, Chase Cotton:
Your Remnant Tells Secret: Residual Resolution in DDoS Protection Services. 362-373 - Richard Skowyra, Lei Xu, Guofei Gu, Veer Dedhia, Thomas Hobson, Hamed Okhravi, James Landry:
Effective Topology Tampering Attacks and Defenses in Software-Defined Networks. 374-385 - David Goltzsche, Signe Rüsch, Manuel Nieke, Sébastien Vaucher, Nico Weichbrodt, Valerio Schiavoni, Pierre-Louis Aublin, Paolo Costa, Christof Fetzer, Pascal Felber, Peter R. Pietzuch, Rüdiger Kapitza:
EndBox: Scalable Middlebox Functions Using Client-Side Trusted Execution. 386-397
Session 9 : Mobile Devices
- Jia Chen, Ge Han, Shanqing Guo, Wenrui Diao:
FragDroid: Automated User Interface Interaction with Activity and Fragment Analysis in Android Applications. 398-409 - Edgardo Barsallo Yi, Amiya Maji, Saurabh Bagchi:
How Reliable is My Wearable: A Fuzz Testing-Based Study. 410-417 - Le Yu, Jiachi Chen, Hao Zhou, Xiapu Luo, Kang Liu:
Localizing Function Errors in Mobile Apps with User Reviews. 418-429 - Kai Cheng, Qiang Li, Lei Wang, Qian Chen, Yaowen Zheng, Limin Sun, Zhenkai Liang:
DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware. 430-441
Session 10 : Confidentiality and Privacy
- Lei Zhang, Douglas M. Blough:
Deceptive Secret Sharing. 442-453 - Bing Chang, Fengwei Zhang, Bo Chen, Yingjiu Li, Wen Tao Zhu, Yangguang Tian, Zhan Wang, Albert Ching:
MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices. 454-465 - Antoine Boutet, Florestan De Moor, Davide Frey, Rachid Guerraoui, Anne-Marie Kermarrec, Antoine Rault:
Collaborative Filtering Under a Sybil Attack: Similarity Metrics do Matter! 466-477 - Julien Duchêne, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Colas Le Guernic:
Specification-Based Protocol Obfuscation. 478-489
Session 11 : Security
- Sangwoo Kim, Seokmyung Hong, Jaesang Oh, Heejo Lee:
Obfuscated VBA Macro Detection Using Machine Learning. 490-501 - Christopher Michael Bailey, Rogério de Lemos:
Evaluating Self-Adaptive Authorisation Infrastructures Through Gamification. 502-513 - Ahmed M. Fawaz, Mohammad A. Noureddine, William H. Sanders:
POWERALERT: Integrity Checking Using Power Measurement and a Game-Theoretic Strategy. 514-525 - Elena Troubitsyna, Irum Rauf:
Generating Cloud Monitors from Models to Secure Clouds. 526-533
Session 12 : Distributed systems
- Francisco Neves, Nuno Machado, José Pereira:
Falcon: A Practical Log-Based Analysis Tool for Distributed Systems. 534-541 - Simon Bouget, Yérom-David Bromberg, Adrien Luxey, François Taïani:
Pleiades: Distributed Structural Invariants at Scale. 542-553 - Daniel Porto, João Leitão, Flavio Junqueira, Rodrigo Rodrigues:
The Tortoise and the Hare: Characterizing Synchrony in Distributed Environments (Practical Experience Report). 554-561 - Sadegh Torabi, Elias Bou-Harb, Chadi Assi, Mario Galluscio, Amine Boukhtouta, Mourad Debbabi:
Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective. 562-573
Session 13 : The Future of Things
- Pinyao Guo, Hunmin Kim, Nurali Virani, Jun Xu, Minghui Zhu, Peng Liu:
RoboADS: Anomaly Detection Against Sensor and Actuator Misbehaviors in Mobile Robots. 574-585 - Subho S. Banerjee, Saurabh Jha, James Cyriac, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Hands Off the Wheel in Autonomous Vehicles?: A Systems Perspective on over a Million Miles of Field Data. 586-597 - Radha Venkatagiri, Karthik Swaminathan, Chung-Ching Lin, Liang Wang, Alper Buyuktosunoglu, Pradip Bose, Sarita V. Adve:
Impact of Software Approximations on the Resiliency of a Video Summarization System. 598-609 - Jiwon Choi, Hayoung Jeoung, Jihun Kim, Youngjoo Ko, Wonup Jung, Hanjun Kim, Jong Kim:
Detecting and Identifying Faulty IoT Devices in Smart Home with Context Extraction. 610-621
Session 14 : Routing in Networks
- Kun Xie, Heng Tao, Xin Wang, Gaogang Xie, Jigang Wen, Jiannong Cao, Zheng Qin:
Divide and Conquer for Fast SRLG Disjoint Routing. 622-633 - Tomas Hlavacek, Amir Herzberg, Haya Schulmann, Michael Waidner:
Practical Experience: Methodologies for Measuring Route Origin Validation. 634-641 - Catello Di Martino, Ugo Giordano, Nishok Mohanasamy, Stefano Russo, Marina Thottan:
In Production Performance Testing of SDN Control Plane for Telecom Operators. 642-653 - Baojun Liu, Chaoyi Lu, Zhou Li, Ying Liu, Hai-Xin Duan, Shuang Hao, Zaifeng Zhang:
A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly. 654-665
Session 15 : Symbolic Execution & Static Analysis
- Hui Xu, Yangfan Zhou, Yu Kang, Fengzhi Tu, Michael R. Lyu:
Manufacturing Resilient Bi-Opaque Predicates Against Symbolic Execution. 666-677 - Angello Astorga, Siwakorn Srisakaokul, Xusheng Xiao, Tao Xie:
PreInfer: Automatic Inference of Preconditions via Symbolic Analysis. 678-689 - Zhenyu Ning, Fengwei Zhang:
DexLego: Reassembleable Bytecode Extraction for Aiding Static Analysis. 690-701
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.