Abstract is missing.
- Failure Analysis of Virtual and Physical Machines: Patterns, Causes and CharacteristicsRobert Birke, Ioana Giurgiu, Lydia Y. Chen, Dorothea Wiesmann, Ton Engbersen. 1-12 [doi]
- Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural InvariantsCuong Manh Pham, Zachary Estrada, Phuong Cao, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer. 13-24 [doi]
- Lazy Checkpointing: Exploiting Temporal Locality in Failures to Mitigate Checkpointing Overheads on Extreme-Scale SystemsDevesh Tiwari, Saurabh Gupta, Sudharshan S. Vazhkudai. 25-36 [doi]
- Titan: Enabling Low Overhead and Multi-faceted Network Fingerprinting of a BotOsama Haq, Waqar Ahmed, Affan A. Syed. 37-44 [doi]
- pSigene: Webcrawling to Generalize SQL Injection SignaturesGaspar Modelo-Howard, Christopher N. Gutierrez, Fahad A. Arshad, Saurabh Bagchi, Yuan Qi. 45-56 [doi]
- Probabilistic Inference for Obfuscated Network Attack SequencesHaitao Du, Shanchieh Jay Yang. 57-67 [doi]
- Anomaly Characterization in Large Scale NetworksEmmanuelle Anceaume, Yann Busnel, Erwan Le Merrer, Romaric Ludinard, Jean Louis Marchand, Bruno Sericola. 68-79 [doi]
- SAND: A Fault-Tolerant Streaming Architecture for Network Traffic AnalyticsQin Liu, John C. S. Lui, Cheng He, Lujia Pan, Wei Fan, Yunlong Shi. 80-87 [doi]
- An Adaptable Rule Placement for Software-Defined NetworksShuyuan Zhang, Franjo Ivancic, Cristian Lumezanu, Yifei Yuan, Aarti Gupta, Sharad Malik. 88-99 [doi]
- Detecting Malicious Javascript in PDF through Document InstrumentationDaiping Liu, Haining Wang, Angelos Stavrou. 100-111 [doi]
- Scriptless Timing Attacks on Web Browser PrivacyBin Liang, Wei You, Liangkun Liu, Wenchang Shi, Mario Heiderich. 112-123 [doi]
- Automatically Fixing C Buffer Overflows Using Program TransformationsAlex Shaw, Dusten Doggett, Munawar Hafiz. 124-135 [doi]
- Application-Level Autonomic Hardware to Predict and Preempt Software Attacks on Industrial Control SystemsLee W. Lerner, Zane R. Franklin, William T. Baumann, Cameron D. Patterson. 136-147 [doi]
- Monitor Based Oracles for Cyber-Physical System Testing: Practical Experience ReportAaron Kane, Thomas E. Fuhrman, Philip Koopman. 148-155 [doi]
- Security Threat Analytics and Countermeasure Synthesis for Power System State EstimationMohammad Ashiqur Rahman, Ehab Al-Shaer, Rajesh G. Kavasseri. 156-167 [doi]
- You Can Call but You Can't Hide: Detecting Caller ID Spoofing AttacksHossen A. Mustafa, Wenyuan Xu, Ahmad-Reza Sadeghi, Steffen Schulz. 168-179 [doi]
- On Tracking Information Flows through JNI in Android ApplicationsChenxiong Qian, Xiapu Luo, Yuru Shao, Alvin T. S. Chan. 180-191 [doi]
- Optical Delusions: A Study of Malicious QR Codes in the WildAmin Kharraz, Engin Kirda, William K. Robertson, Davide Balzarotti, Aurélien Francillon. 192-203 [doi]
- A Reliable 3D MLC PCM Architecture with Resistance Drift PredictorMajid Jalili 0001, Mohammad Arjomand, Hamid Sarbazi-Azad. 204-215 [doi]
- Mitigating Write Disturbance in Super-Dense Phase Change MemoriesLei Jiang, Youtao Zhang, Jun Yang. 216-227 [doi]
- WL-Reviver: A Framework for Reviving any Wear-Leveling Techniques in the Face of Failures on Phase Change MemoryJie Fan, Song Jiang, Jiwu Shu, Long Sun, Qingda Hu. 228-239 [doi]
- Performance Sensitive Replication in Geo-distributed Cloud DatastoresShankaranarayanan P. N., Ashiwan Sivakumar, Sanjay G. Rao, Mohit Tawarmalani. 240-251 [doi]
- POD-Diagnosis: Error Diagnosis of Sporadic Operations on Cloud ApplicationsXiwei Xu, Liming Zhu, Ingo Weber, Len Bass, Daniel Sun. 252-263 [doi]
- Catch Me If You Can: A Cloud-Enabled DDoS DefenseQuan Jia, Huangxin Wang, Dan Fleck, Fei Li, Angelos Stavrou, Walter Powell. 264-275 [doi]
- Secure Ranked Multi-keyword Search for Multiple Data Owners in Cloud ComputingWei Zhang, Sheng Xiao, Yaping Lin, Ting, Si-wang Zhou. 276-286 [doi]
- S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social ServicesXiaojing Liao, A. Selcuk Uluagac, Raheem A. Beyah. 287-298 [doi]
- Social Puzzles: Context-Based Access Control in Online Social NetworksMurtuza Jadliwala, Anindya Maiti, Vinod Namboodiri. 299-310 [doi]
- Mining Historical Issue Repositories to Heal Large-Scale Online Service SystemsRui Ding, Qiang Fu, Jian-Guang Lou, Qingwei Lin, Dongmei Zhang, Tao Xie. 311-322 [doi]
- Understanding Interoperability Issues of Web Service FrameworksIvano Alessandro Elia, Nuno Laranjeiro, Marco Vieira. 323-330 [doi]
- Scalable State-Machine ReplicationCarlos Eduardo Benevides Bezerra, Fernando Pedone, Robbert van Renesse. 331-342 [doi]
- Clock-RSM: Low-Latency Inter-datacenter State Machine Replication Using Loosely Synchronized Physical ClocksJiaqing Du, Daniele Sciascia, Sameh Elnikety, Willy Zwaenepoel, Fernando Pedone. 343-354 [doi]
- State Machine Replication for the Masses with BFT-SMARTAlysson Neves Bessani, João Sousa, Eduardo Adílio Pelinson Alchieri. 355-362 [doi]
- Hardware-Software Integrated Diagnosis for Intermittent Hardware FaultsMajid Dadashi, Layali Rashid, Karthik Pattabiraman, Sathish Gopalakrishnan. 363-374 [doi]
- Quantifying the Accuracy of High-Level Fault Injection Techniques for Hardware FaultsJiesheng Wei, Anna Thomas, Guanpeng Li, Karthik Pattabiraman. 375-382 [doi]
- Hard Drive Failure Prediction Using Classification and Regression TreesJing Li, Xinpu Ji, Yuhan Jia, Bingpeng Zhu, Gang Wang, Zhongwei Li, Xiaoguang Liu. 383-394 [doi]
- Developing Correctly Replicated Databases Using Formal ToolsNicolas Schiper, Vincent Rahli, Robbert van Renesse, Mark Bickford, Robert L. Constable. 395-406 [doi]
- The Energy Efficiency of Database Replication ProtocolsNicolas Schiper, Fernando Pedone, Robbert van Renesse. 407-418 [doi]
- Degraded-First Scheduling for MapReduce in Erasure-Coded Storage ClustersRunhui Li, Patrick P. C. Lee, Yuchong Hu. 419-430 [doi]
- Warped-Shield: Tolerating Hard Faults in GPGPUsWaleed Dweik, Mohammad Abdel-Majeed, Murali Annavaram. 431-442 [doi]
- A-ABFT: Autonomous Algorithm-Based Fault Tolerance for Matrix Multiplications on Graphics Processing UnitsClaus Braun, Sebastian Halder, Hans-Joachim Wunderlich. 443-454 [doi]
- Impact of GPUs Parallelism Management on Safety-Critical and HPC Applications ReliabilityPaolo Rech, Laércio Lima Pilla, Philippe Olivier Alexandre Navaux, Luigi Carro. 455-466 [doi]
- Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous-Reliability MemoryYixin Luo, Sriram Govindan, Bikash Sharma, Mark Santaniello, Justin Meza, Aman Kansal, Jie Liu, Badriddine Khessib, Kushagra Vaid, Onur Mutlu. 467-478 [doi]
- Ocasta: Clustering Configuration Settings for Error RecoveryZhen Huang, David Lie. 479-490 [doi]
- FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual MachineZhongshu Gu, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu. 491-502 [doi]
- Model Checking Stochastic Automata for Dependability and Performance MeasuresPeter Buchholz, Jan Kriege, Dimitri Scheftelowitsch. 503-514 [doi]
- Scalable Security Models for Assessing Effectiveness of Moving Target DefensesJin B. Hong, Dong Seong Kim. 515-526 [doi]
- A Novel Variable Ordering Heuristic for BDD-based K-Terminal ReliabilityMinh Lê, Josef Weidendorfer, Max Walter. 527-537 [doi]
- Adaptive Low-Power Architecture for High-Performance and Reliable Embedded ComputingRonaldo Rodrigues Ferreira, Jean da Rolt, Gabriel L. Nazar, Álvaro Freitas Moreira, Luigi Carro. 538-549 [doi]
- HV Code: An All-Around MDS Code to Improve Efficiency and Reliability of RAID-6 SystemsZhirong Shen, Jiwu Shu. 550-561 [doi]
- Replication-Based Fault-Tolerance for Large-Scale Graph ProcessingPeng Wang, Kaiyuan Zhang, Rong Chen, Haibo Chen, Haibing Guan. 562-573 [doi]
- System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection NeedsRui Wu, Ping Chen, Peng Liu 0005, Bing Mao. 574-585 [doi]
- Interoperability between Fingerprint Biometric Systems: An Empirical StudyStephen Mason, Ilir Gashi, Luca Lugini, Emanuela Marasco, Bojan Cukic. 586-597 [doi]
- DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS TrafficYizheng Chen, Manos Antonakakis, Roberto Perdisci, Yacin Nadji, David Dagon, Wenke Lee. 598-609 [doi]
- Lessons Learned from the Analysis of System Failures at Petascale: The Case of Blue WatersCatello Di Martino, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Fabio Baccanico, Joseph Fullop, William Kramer. 610-621 [doi]
- GemFI: A Fault Injection Tool for Studying the Behavior of Applications on Unreliable SubstratesKonstantinos Parasyris, Georgios Tziantzoulis, Christos D. Antonopoulos, Nikolaos Bellas. 622-629 [doi]
- A Design and Implementation of an Assurance Case LanguageYutaka Matsuno. 630-641 [doi]
- Recovery for Failures in Rolling Upgrade on CloudsMin Fu, Liming Zhu, Len Bass, Anna Liu. 642-647 [doi]
- Crosscheck: Hardening Replicated Multithreaded ServicesArthur Martens, Christoph Borchert, Tobias Oliver Geissler, Daniel Lohmann, Olaf Spinczyk, Rüdiger Kapitza. 648-653 [doi]
- NV-Hypervisor: Hypervisor-Based Persistence for Virtual MachinesVasily A. Sartakov, Rudiger Kapitza. 654-659 [doi]
- A Markov Decision Process Approach for Optimal Data Backup SchedulingRuofan Xia, Fumio Machida, Kishor S. Trivedi. 660-665 [doi]
- Availability Evaluation of Digital Library Cloud ServicesJulian Araujo, Paulo Romero Martins Maciel, Matheus Torquato, Gustavo Rau de Almeida Callou, Ermeson Andrade. 666-671 [doi]
- Defects per Million (DPM) Evaluation for a Cloud Dealing with VM Failures Using CheckpointingSubrota K. Mondal, Jogesh K. Muppala. 672-677 [doi]
- Predicting Incident Reports for IT Help DeskAnneliese Amschler Andrews, Joseph Lucente. 678-683 [doi]
- What Vulnerability Do We Need to Patch First?Jin B. Hong, Dong Seong Kim, Abdelkrim Haqiq. 684-689 [doi]
- What Logs Should You Look at When an Application Fails? Insights from an Industrial Case StudyMarcello Cinque, Domenico Cotroneo, Raffaele Della Corte, Antonio Pecchia. 690-695 [doi]
- Towards a Taxonomy of Cloud Recovery StrategiesMin Fu, Len Bass, Anna Liu. 696-701 [doi]
- Toward Design Decisions to Enable Deployability: Empirical Study of Three Projects Reaching for the Continuous Delivery Holy GrailStephany Bellomo, Neil A. Ernst, Robert L. Nord, Rick Kazman. 702-707 [doi]
- Coarse-Grained Energy Modeling of Rollback/Recovery MechanismsDewan Ibtesham, David Debonis, Dorian Arnold, Kurt B. Ferreira. 708-713 [doi]
- Grid-Oriented Process Clustering System for Partial Message LoggingHideyuki Jitsumoto, Yuki Todoroki, Yutaka Ishikawa, Mitsuhisa Sato. 714-719 [doi]
- Evaluating the Error Resilience of Parallel ProgramsBo Fang, Karthik Pattabiraman, Matei Ripeanu, Sudhanva Gurumurthi. 720-725 [doi]
- Comparison Criticality in Sorting AlgorithmsThomas B. Jones, David H. Ackley. 726-731 [doi]
- Radiation Sensitivity of High Performance Computing Applications on Kepler-Based GPGPUsDaniel A. G. de Oliveira, Caio B. Lunardi, Laércio Lima Pilla, Paolo Rech, Philippe Olivier Alexandre Navaux, Luigi Carro. 732-737 [doi]
- HeteroCheckpoint: Efficient Checkpointing for Accelerator-Based SystemsSudarsun Kannan, Naila Farooqui, Ada Gavrilovska, Karsten Schwan. 738-743 [doi]
- Harnessing Unreliable Cores in Heterogeneous Architecture: The PyDac Programming Model and RuntimeBin Huang, Ron Sass, Nathan DeBardeleben, Sean Blanchard. 744-749 [doi]
- Design and Evaluation of FA-MPI, a Transactional Resilience Scheme for Non-blocking MPIAmin Hassani, Anthony Skjellum, Ron Brightwell. 750-755 [doi]
- Extreme-Scale Viability of Collective Communication for Resilient Task Scheduling and Work StealingJeremiah Wilke, Janine Bennett, Hemanth Kolla, Keita Teranishi, Nicole Slattengren, John Floren. 756-761 [doi]
- Distributed Implementation of Wide-Area Monitoring Algorithms for Power Systems Using a US-Wide ExoGENI-WAMS TestbedJianhua Zhang, Aranya Chakrabortty, Yufeng Xin. 762-767 [doi]
- Stateful Data Delivery Service for Wide Area Monitoring and Control ApplicationsYiming Wu, Davood Babazadeh, Lars Nordström. 768-773 [doi]
- Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution SystemsMasood Parvania, Georgia Koutsandria, Vishak Muthukumary, Sean Peisert, Chuck McParland, Anna Scaglione. 774-779 [doi]
- Towards Secure Metering Data Analysis via Distributed Differential PrivacyXiaojing Liao, David Formby, Carson Day, Raheem A. Beyah. 780-785 [doi]
- An Integrated Security Framework for GOSS Power Grid Analytics PlatformTara D. Gibson, Selim Ciraci, Sharma Poorva, Craig Allwardt, Mark Rice, Bora A. Akyol. 786-791 [doi]
- Ironstack: Performance, Stability and Security for Power Grid Data NetworksZhiyuan Teo, Vera Kutsenko, Ken Birman, Robbert van Renesse. 792-797 [doi]