Abstract is missing.
- A Quantitative Methodology for Security Monitor DeploymentUttam Thakore, Gabriel A. Weaver, William H. Sanders. 1-12 [doi]
- Dynamic Scalable State Machine ReplicationLe Long Hoang, Carlos Eduardo Benevides Bezerra, Fernando Pedone. 13-24 [doi]
- OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating SystemsKoustubha Bhat, Dirk Vogt, Erik van der Kouwe, Ben Gras, Lionel Sambuc, Andrew S. Tanenbaum, Herbert Bos, Cristiano Giuffrida. 25-36 [doi]
- Towards a Scalable and Write-Free Multi-version Checkpointing Scheme in Solid State DrivesHoda Aghaei Khouzani, Chengmo Yang. 37-48 [doi]
- Elastic Parity Logging for SSD RAID ArraysYongkun Li, Helen H. W. Chan, Patrick P. C. Lee, Yinlong Xu. 49-60 [doi]
- OI-RAID: A Two-Layer RAID Architecture towards Fast Recovery and High ReliabilityNeng Wang, Yinlong Xu, Yongkun Li, Si Wu. 61-72 [doi]
- StorM: Enabling Tenant-Defined Cloud Storage Middle-Box ServicesHui Lu, Abhinav Srivastava, Brendan Saltaformaggio, Dongyan Xu. 73-84 [doi]
- Process-Oriented Non-intrusive Recovery for Sporadic Operations on CloudMin Fu, Liming Zhu, Ingo Weber, Len Bass, Anna Liu, Xiwei Xu. 85-96 [doi]
- Network Recovery After Massive FailuresNovella Bartolini, Stefano Ciavarella, Thomas F. La Porta, Simone Silvestri. 97-108 [doi]
- JURY: Validating Controller Actions in Software-Defined NetworksKshiteej Mahajan, Rishabh Poddar, Mohan Dhawan, Vijay Mann. 109-120 [doi]
- SDNShield: Reconciliating Configurable Application Permissions for SDN App MarketsXitao Wen, Bo Yang, Yan Chen, Chengchen Hu, Yi Wang, Bin Liu, Xiaolin Chen. 121-132 [doi]
- Can't Touch This: Consistent Network Updates for Multiple PoliciesSzymon Dudycz, Arne Ludwig, Stefan Schmid. 133-143 [doi]
- HSFI: Accurate Fault Injection Scalable to Large Code BasesErik van der Kouwe, Andrew S. Tanenbaum. 144-155 [doi]
- Making Fast Consensus Generally FasterSebastiano Peluso, Alexandru Turcu, Roberto Palmieri, Giuliano Losa, Binoy Ravindran. 156-167 [doi]
- ePVF: An Enhanced Program Vulnerability Factor Methodology for Cross-Layer Resilience AnalysisBo Fang, Qining Lu, Karthik Pattabiraman, Matei Ripeanu, Sudhanva Gurumurthi. 168-179 [doi]
- Methuselah Flash: Rewriting Codes for Extra Long Storage LifetimeGeorgios Mappouras, Alireza Vahid, A. Robert Calderbank, Daniel J. Sorin. 180-191 [doi]
- Enabling Deep Voltage Scaling in Delay Sensitive L1 CachesChao Yan, Russ Joseph. 192-202 [doi]
- ReadDuo: Constructing Reliable MLC Phase Change Memory through Fast and Robust ReadoutRujia Wang, Youtao Zhang, Jun Yang. 203-214 [doi]
- Leveraging ECC to Mitigate Read Disturbance, False Reads and Write Faults in STT-RAMSeyed Mohammad Seyedzadeh, Rakan Maddah, Alex K. Jones, Rami G. Melhem. 215-226 [doi]
- SuperGlue: IDL-Based, System-Level Fault Tolerance for Embedded SystemsJiguo Song, Gedare Bloom, Gabriel Parmer. 227-238 [doi]
- PARBOR: An Efficient System-Level Technique to Detect Data-Dependent Failures in DRAMSamira Manabi Khan, Donghyuk Lee, Onur Mutlu. 239-250 [doi]
- Efficient Algorithm-Based Fault Tolerance for Sparse Matrix OperationsAlexander Scholl, Claus Braun, Michael A. Kochte, Hans-Joachim Wunderlich. 251-262 [doi]
- Formal Analysis for Dependable Supervisory Control and Data Acquisition in Smart GridsMohammad Ashiqur Rahman, A. H. M. Jakaria, Ehab Al-Shaer. 263-274 [doi]
- A Model-Based Approach to Support Safety-Related Decisions in the Petroleum DomainLeonardo Montecchi, Atle Refsdal, Paolo Lollini, Andrea Bondavalli. 275-286 [doi]
- Mean Field Approximation of Uncertain Stochastic ModelsLuca Bortolussi, Nicolas Gast. 287-298 [doi]
- Uncovering Dynamic Fault TreesSebastian Junges, Dennis Guck, Joost-Pieter Katoen, Mariëlle Stoelinga. 299-310 [doi]
- Power-Capping Aware Checkpointing: On the Interplay Among Power-Capping, Temperature, Reliability, Performance, and EnergyKun Tang, Devesh Tiwari, Saurabh Gupta, Ping Huang, QiQi Lu, Christian Engelmann, Xubin He. 311-322 [doi]
- Reconsidering Single Failure Recovery in Clustered File SystemsZhirong Shen, Jiwu Shu, Patrick P. C. Lee. 323-334 [doi]
- Managing Data Center Tickets: Prediction and Active SizingJi Xue, Robert Birke, Lydia Y. Chen, Evgenia Smirni. 335-346 [doi]
- A Privacy Analysis of Google and Yandex Safe BrowsingThomas Gerbet, Amrit Kumar 0001, Cédric Lauradoux. 347-358 [doi]
- PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image SharingJianping He, Bin Liu, Deguang Kong, Xuan Bao, Na Wang, Hongxia Jin, George Kesidis. 359-370 [doi]
- Modeling Privacy and Tradeoffs in Multichannel Secret Sharing ProtocolsDevin J. Pohly, Patrick Drew McDaniel. 371-382 [doi]
- On False Data Injection Attacks Against Railway Traction Power SystemsSubhash Lakshminarayana, Zhan-Teng Teo, Rui Tan, David K. Y. Yau, Pablo Arboleya. 383-394 [doi]
- Targeted Attacks on Teleoperated Surgical Robots: Dynamic Model-Based Detection and MitigationHoma Alemzadeh, Daniel Chen, Xiao Li, Thenkurussi Kesavadas, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer. 395-406 [doi]
- F-DETA: A Framework for Detecting Electricity Theft Attacks in Smart GridsVarun Badrinath Krishna, Kiryung Lee, Gabriel A. Weaver, Ravishankar K. Iyer, William H. Sanders. 407-418 [doi]
- Secure Identification of Actively Executed Code on a Generic Trusted ComponentBruno Vavala, Nuno Neves, Peter Steenkiste. 419-430 [doi]
- Secure and Efficient Multi-Variant Execution Using Hardware-Assisted Process VirtualizationKoen Koning, Herbert Bos, Cristiano Giuffrida. 431-442 [doi]
- Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating SystemsKaan Onarlioglu, William Robertson, Engin Kirda. 443-454 [doi]
- Kizzle: A Signature Compiler for Detecting Exploit KitsBen Stock, Benjamin Livshits, Benjamin G. Zorn. 455-466 [doi]
- A Sharper Sense of Self: Probabilistic Reasoning of Program Behaviors for Anomaly Detection with Context SensitivityKui Xu, Ke Tian, Danfeng Yao, Barbara G. Ryder. 467-478 [doi]
- BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise NetworksXin Hu, Jiyong Jang, Marc Ph. Stoecklin, Ting Wang, Douglas Lee Schales, Dhilung Kirat, Josyula R. Rao. 479-490 [doi]
- DomainProfiler: Discovering Domain Names Abused in FutureDaiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Takeshi Yada, Tatsuya Mori, Shigeki Goto. 491-502 [doi]
- FTP: The Forgotten CloudDrew Springall, Zakir Durumeric, J. Alex Halderman. 503-513 [doi]
- Practical, Formal Synthesis and Automatic Enforcement of Security Policies for AndroidHamid Bagheri, Alireza Sadeghi, Reyhaneh Jabbarvand Behrouz, Sam Malek. 514-525 [doi]
- Don't Just BYOD, Bring-Your-Own-App Too! Protection via Virtual Micro Security PerimetersGabriel Salles-Loustau, Luis Garcia, Kaustubh R. Joshi, Saman A. Zonouz. 526-537 [doi]
- Can We Trust the Privacy Policies of Android Apps?Le Yu, Xiapu Luo, Xule Liu, Tao Zhang. 538-549 [doi]
- Repackage-Proofing Android AppsLannan Luo, Yu Fu, Dinghao Wu, Sencun Zhu, Peng Liu 0005. 550-561 [doi]
- Measuring the Role of Greylisting and Nolisting in Fighting SpamFabio Pagani, Matteo De Astis, Mariano Graziano, Andrea Lanzi, Davide Balzarotti. 562-571 [doi]
- Malware Slums: Measurement and Analysis of Malware on Traffic ExchangesSalman Yousaf, Umar Iqbal, Shehroze Farooqi, Raza Ahmad, Muhammad Zubair Shafiq, Fareed Zaffar. 572-582 [doi]
- Secure Point-of-Care Medical Diagnostics via Trusted Sensing and Cyto-Coded PasswordsTuan Le, Gabriel Salles-Loustau, Laleh Najafizadeh, Mehdi Javanmard, Saman A. Zonouz. 583-594 [doi]
- fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free GrammarsDing Wang, Debiao He, Haibo Cheng, Ping Wang. 595-606 [doi]
- Balancing Security and Performance for Agility in Dynamic Threat EnvironmentsMichael L. Winterrose, Kevin M. Carter 0001, Neal Wagner, William W. Streilein. 607-617 [doi]
- Rekeying for Encrypted Deduplication StorageJingwei Li, Chuan Qin, Patrick P. C. Lee, Jin Li 0002. 618-629 [doi]
- Equipping WAP with WEAPONS to Detect Vulnerabilities: Practical Experience ReportIberia Medeiros, Nuno Ferreira Neves, Miguel Correia. 630-637 [doi]
- Characterizing the Consistency of Online Services (Practical Experience Report)Filipe Freitas, João Leitão, Nuno M. Preguiça, Rodrigo Rodrigues. 638-645 [doi]
- ELZAR: Triple Modular Redundancy Using Intel AVX (Practical Experience Report)Dmitrii Kuvaiskii, Oleksii Oleksenko, Pramod Bhatotia, Pascal Felber, Christof Fetzer. 646-653 [doi]
- An Evaluation Study on Log Parsing and Its Use in Log MiningPinjia He, Jieming Zhu, Shilin He, Jian Li, Michael R. Lyu. 654-661 [doi]
- Reliability-Centered Maintenance of the Electrically Insulated Railway Joint via Fault Tree Analysis: A Practical Experience ReportEnno Ruijters, Dennis Guck, Martijn van Noort, Mariëlle Stoelinga. 662-669 [doi]