Abstract is missing.
- Leveraging State Information for Automated Attack Discovery in Transport Protocol ImplementationsSamuel Jero, Hyojeong Lee, Cristina Nita-Rotaru. 1-12 [doi]
- Δ-Encoding: Practical Encoded ProcessingDmitrii Kuvaiskii, Christof Fetzer. 13-24 [doi]
- Measuring and Understanding Extreme-Scale Application Resilience: A Field Study of 5, 000, 000 HPC Application RunsCatello Di Martino, William Kramer, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 25-36 [doi]
- Understanding and Exploiting Spatial Properties of System Failures on Extreme-Scale HPC SystemsSaurabh Gupta, Devesh Tiwari, Christopher Jantzi, James H. Rogers, Don Maxwell. 37-44 [doi]
- Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log DataAlina Oprea, Zhou Li, Ting-Fang Yen, Sang H. Chin, Sumayah A. Alrwais. 45-56 [doi]
- LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program AnalysisZhongshu Gu, Kexin Pei, Qifan Wang, Luo Si, Xiangyu Zhang, Dongyan Xu. 57-68 [doi]
- OnionBots: Subverting Privacy Infrastructure for Cyber AttacksAmirali Sanatinia, Guevara Noubir. 69-80 [doi]
- A Statistical Approach for Timed Reachability in AADL ModelsHarold Bruintjes, Joost-Pieter Katoen, David Lesens. 81-88 [doi]
- Scalable Analysis of Fault Trees with Dynamic FeaturesJan Krcál, Pavel Krcál. 89-100 [doi]
- The Power of Evil Choices in Bloom FiltersThomas Gerbet, Amrit Kumar, Cédric Lauradoux. 101-112 [doi]
- Secure Dynamic Software Loading and Execution Using Cross Component VerificationByungho Min, Vijay Varadharajan. 113-124 [doi]
- Parallax: Implicit Code Integrity Verification Using Return-Oriented ProgrammingDennis Andriesse, Herbert Bos, Asia Slowinska. 125-135 [doi]
- TIP-Code: A Three Independent Parity Code to Tolerate Triple Disk Failures with Optimal Update ComplextiyYongzhe Zhang, Chentao Wu, Jie Li, Minyi Guo. 136-147 [doi]
- Enabling Efficient and Reliable Transition from Replication to Erasure Coding for Clustered File SystemsRunhui Li, Yuchong Hu, Patrick P. C. Lee. 148-159 [doi]
- Grouping-Based Elastic Striping with Hotness Awareness for Improving SSD RAID PerformanceYubiao Pan, Yongkun Li, Yinlong Xu, Zhipeng Li. 160-171 [doi]
- Joza: Hybrid Taint Inference for Defeating Web Application SQL Injection AttacksAbbas Naderi-Afooshteh, Anh Nguyen-Tuong, Mandana Bagheri-Marzijarani, Jason D. Hiser, Jack W. Davidson. 172-183 [doi]
- Private Browsing Mode Not Really That Private: Dealing with Privacy Breach Caused by Browser ExtensionsBin Zhao, Peng Liu. 184-195 [doi]
- Test-Based Interoperability Certification for Web ServicesIvano Alessandro Elia, Nuno Laranjeiro, Marco Vieira. 196-206 [doi]
- Understanding the Dark Side of Big Data Clusters: An Analysis beyond FailuresAndrea Rosà, Lydia Y. Chen, Walter Binder. 207-218 [doi]
- Improving Reliability with Dynamic Syndrome Allocation in Intelligent Software Defined Data CentersUlya Bayram, Dwight Divine, Pin Zhou, Eric William Davis Rozier. 219-230 [doi]
- Experiences with Building Disaster Recovery for Enterprise-Class CloudsLong Wang, HariGovind V. Ramasamy, Richard E. Harper, Mahesh Viswanathan, Edmond Plattier. 231-238 [doi]
- FloodGuard: A DoS Attack Prevention Extension in Software-Defined NetworksHaopei Wang, Lei Xu, Guofei Gu. 239-250 [doi]
- Enhancing Software Dependability and Security with Hardware Supported Instruction Address Space RandomizationSeung-Hun Kim, Lei Xu, Ziyi Liu, Zhiqiang Lin, Won Woo Ro, Weidong Shi. 251-262 [doi]
- Hide & Share: Landmark-Based Similarity for Private KNN ComputationDavide Frey, Rachid Guerraoui, Anne-Marie Kermarrec, Antoine Rault, François Taiani, Jingjing Wang. 263-274 [doi]
- Energy Resilience Modelling for Smart HousesHamed Ghasemieh, Boudewijn R. Haverkort, Marijn R. Jongerden, Anne Remke. 275-286 [doi]
- Impact of Malfunction on the Energy Efficiency of Batch Processing SystemsMarcello Cinque, Domenico Cotroneo, Flavio Frattini, Stefano Russo. 287-298 [doi]
- phpSAFE: A Security Analysis Tool for OOP Web Application PluginsPaulo Jorge Costa Nunes, José Fonseca, Marco Vieira. 299-306 [doi]
- BAAT: Towards Dynamically Managing Battery Aging in Green DatacentersLongjun Liu, Chao Li, Hongbin Sun, Yang Hu, Juncheng Gu, Tao Li. 307-318 [doi]
- Avoiding Pitfalls in Fault-Injection Based Comparison of Program Susceptibility to Soft ErrorsHorst Schirmeier, Christoph Borchert, Olaf Spinczyk. 319-330 [doi]
- Warped-RE: Low-Cost Error Detection and Correction in GPUsMohammad Abdel-Majeed, Waleed Dweik, Hyeran Jeon, Murali Annavaram. 331-342 [doi]
- Decomposable Trust for Android ApplicationsEarlence Fernandes, Ajit Aluri, Alexander Crowell, Atul Prakash. 343-354 [doi]
- Reducing Refresh Power in Mobile Devices with Morphable ECCChia-Chen Chou, Prashant J. Nair, Moinuddin K. Qureshi. 355-366 [doi]
- TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile DevicesHe Sun, Kun Sun, Yuewu Wang, Jiwu Jing, Haining Wang. 367-378 [doi]
- Delving into Internet DDoS Attacks by Botnets: Characterization and Analysisan Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen. 379-390 [doi]
- Consensus RefinedOgnjen Maric, Christoph Sprenger, David A. Basin. 391-402 [doi]
- Segugio: Efficient Behavior-Based Tracking of Malware-Control Domains in Large ISP NetworksBabak Rahbarinia, Roberto Perdisci, Manos Antonakakis. 403-414 [doi]
- Revisiting Memory Errors in Large-Scale Production Data Centers: Analysis and Modeling of New Trends from the FieldJustin Meza, Qiang Wu, Sanjeev Kumar, Onur Mutlu. 415-426 [doi]
- AVATAR: A Variable-Retention-Time (VRT) Aware Refresh for DRAM SystemsMoinuddin K. Qureshi, Dae-Hyun Kim, Samira Manabi Khan, Prashant J. Nair, Onur Mutlu. 427-437 [doi]
- Read Disturb Errors in MLC NAND Flash Memory: Characterization, Mitigation, and RecoveryYu Cai, Yixin Luo, Saugata Ghose, Onur Mutlu. 438-449 [doi]
- Fine-Grained Characterization of Faults Causing Long Latency Crashes in ProgramsGuanpeng Li, Qining Lu, Karthik Pattabiraman. 450-461 [doi]
- User-Constraint and Self-Adaptive Fault Tolerance for Event Stream Processing SystemsAndre Martin, Tiaraju Smaneoto, Tobias Dietze, Andrey Brito, Christof Fetzer. 462-473 [doi]
- Lightweight Memory CheckpointingDirk Vogt, Cristiano Giuffrida, Herbert Bos, Andrew S. Tanenbaum. 474-484 [doi]
- HeapTherapy: An Efficient End-to-End Solution against Heap Buffer OverflowsQiang Zeng, Mingyi Zhao, Peng Liu. 485-496 [doi]
- Smart-TV Security Analysis: Practical ExperimentsYann Bachy, Frederic Basse, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège, Pierre Lukjanenko. 497-504 [doi]
- On the Metrics for Benchmarking Vulnerability Detection ToolsNuno Antunes, Marco Vieira. 505-516 [doi]
- Formal Assurance Arguments: A Solution in Search of a Problem?Patrick John Graydon. 517-528 [doi]
- A Quality Control Engine for Complex Physical SystemsHaifeng Chen, Mizoguchi Takehiko, Yan Tan, Kai Zhang, Geoff Jiang. 529-536 [doi]
- Discovering and Visualizing Operations Processes with POD-Discovery and POD-VizIngo Weber, Chao Li, Len Bass, Xiwei Xu, Liming Zhu. 537-544 [doi]
- Incinerator - Eliminating Stale References in Dynamic OSGi ApplicationsKoutheir Attouchi, Gaël Thomas 0001, Gilles Muller, Julia L. Lawall, André Bottaro. 545-554 [doi]
- Risk Assessment of Buffer "Heartbleed" Over-Read VulnerabilitiesJun Wang, Mingyi Zhao, Qiang Zeng, Dinghao Wu, Peng Liu. 555-562 [doi]
- Workshop on Dependability Issues on SDN and NFV (DISN)Elias P. Duarte, Matti A. Hiltunen. 563-564 [doi]
- Workshop on Model Based Design for Cyber-Physical Systems (MB4CP)Alberto Avritzer, Daniel Sadoc Menasché, Kishor S. Trivedi, Lucia Happe, Sahra Sedigh Sarvestani. 565-566 [doi]
- Workshop on Recent Advances in the DependabIlity AssessmeNt of Complex systEms (RADIANCE)Ariadne M. B. R. Carvalho, Nuno Antunes, Andrea Ceccarelli, András Zentai. 567-568 [doi]
- Workshop on Safety and Security of Intelligent Vehicles (SSIV)João Carlos Cunha, Kalinka Branco, Antonio Casimiro, Urbano Nunes. 569-570 [doi]