Abstract is missing.
- Wren: Nonblocking Reads in a Partitioned Transactional Causally Consistent Data StoreKristina Spirovska, Diego Didona, Willy Zwaenepoel. 1-12 [doi]
- Code-Dependent and Architecture-Dependent Reliability BehaviorsVinicius Fratin, Daniel A. G. de Oliveira, Caio B. Lunardi, Fernando Santos, Gennaro Rodrigues, Paolo Rech. 13-26 [doi]
- Modeling Soft-Error Propagation in ProgramsGuanpeng Li, Karthik Pattabiraman, Siva Kumar Sastry Hari, Michael B. Sullivan, Timothy Tsai. 27-38 [doi]
- Byzantine Fault-Tolerant Atomic MulticastPaulo R. Coelho, Tarcisio Ceolin Junior, Alysson Bessani, Fernando Luís Dotti, Fernando Pedone. 39-50 [doi]
- A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain PlatformJoão Sousa, Alysson Bessani, Marko Vukolic. 51-58 [doi]
- Troxy: Transparent Access to Byzantine Fault-Tolerant SystemsBijun Li, Nico Weichbrodt, Johannes Behl, Pierre-Louis Aublin, Tobias Distler, Rüdiger Kapitza. 59-70 [doi]
- RDMC: A Reliable RDMA Multicast for Large ObjectsJonathan Behrens, Sagar Jha, Ken Birman, Edward Tremel. 71-82 [doi]
- Shiraz: Exploiting System Reliability and Application Resilience Characteristics to Improve Large Scale System ThroughputRohan Garg, Tirthak Patel, Gene Cooperman, Devesh Tiwari. 83-94 [doi]
- Machine Learning Models for GPU Error Prediction in a Large Scale HPC SystemBin Nie, Ji Xue, Saurabh Gupta, Tirthak Patel, Christian Engelmann, Evgenia Smirni, Devesh Tiwari. 95-106 [doi]
- Understanding and Analyzing Interconnect Errors and Network Congestion on a Large Scale HPC SystemMohit Kumar, Saurabh Gupta, Tirthak Patel, Michael Wilder, Weisong Shi, Song Fu, Christian Engelmann, Devesh Tiwari. 107-114 [doi]
- Fast Hypervisor Recovery Without RebootDiyu Zhou, Yuval Tamir. 115-126 [doi]
- ZOE: Content-Based Anomaly Detection for Industrial Control SystemsChristian Wressnegger, Ansgar Kellner, Konrad Rieck. 127-138 [doi]
- Cost-Benefit Analysis of Moving-Target Defense in Power GridsSubhash Lakshminarayana, David K. Y. Yau. 139-150 [doi]
- Algorithmic Attack Synthesis Using Hybrid Dynamics of Power Grid Critical InfrastructuresZhenqi Huang, Sriharsha Etigowni, Luis Garcia, Sayan Mitra, Saman A. Zonouz. 151-162 [doi]
- On the Challenges of Building a BFT SCADAAndré Nogueira, Miguel Garcia, Alysson Bessani, Nuno Neves 0001. 163-170 [doi]
- RECAST: Random Entanglement for Censorship-Resistant Archival STorageRoberta Barbi, Dorian Burihabwa, Pascal Felber, Hugues Mercier, Valerio Schiavoni. 171-182 [doi]
- Alpha Entanglement Codes: Practical Erasure Codes to Archive Data in Unreliable EnvironmentsVero Estrada-Galiñanes, Ethan L. Miller, Pascal Felber, Jehan-François Pâris. 183-194 [doi]
- Migrating SGX Enclaves with Persistent StateFritz Alder, Arseny Kurnikov, Andrew Paverd, N. Asokan. 195-206 [doi]
- IBBE-SGX: Cryptographic Group Access Control Using Trusted Execution EnvironmentsStefan Contiu, Rafael Pires, Sébastien Vaucher, Marcelo Pasin, Pascal Felber, Laurent Réveillère. 207-218 [doi]
- OWL: Understanding and Detecting Concurrency AttacksShixiong Zhao, Rui Gu, Haoran Qiu, Tsz On Li, Yuexuan Wang, Heming Cui, Junfeng Yang. 219-230 [doi]
- FAROS: Illuminating In-memory Injection Attacks via Provenance-Based Whole-System Dynamic Information Flow TrackingMeisam Navaki Arefi, Geoffrey Alexander, Hooman Rokham, Aokun Chen, Michalis Faloutsos, Xuetao Wei, Daniela Seabra Oliveira, Jedidiah R. Crandall. 231-242 [doi]
- To Detect Stack Buffer Overflow with Polymorphic CanariesZhilong Wang, Xuhua Ding, Chengbin Pang, Jian Guo, Jun Zhu, Bing Mao. 243-254 [doi]
- Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power GridAmy Babay, Thomas Tantillo, Trevor Aron, Marco Platania, Yair Amir. 255-266 [doi]
- Branching Bisimulation and Concurrent Object VerificationXiaoxiao Yang, Joost-Pieter Katoen, Huimin Lin, Gaoang Liu, Hao Wu 0013. 267-278 [doi]
- Modeling Input-Dependent Error Propagation in ProgramsGuanpeng Li, Karthik Pattabiraman. 279-290 [doi]
- Efficient Transient Analysis of a Class of Compositional Fluid Stochastic Petri NetsPeter Buchholz 0001, Tugrul Dayar. 291-302 [doi]
- Importance Sampling of Interval Markov ChainsCyrille Jégourel, Jingyi Wang, Jun Sun 0001. 303-313 [doi]
- Low Overhead Tag Error Mitigation for GPU ArchitecturesAtieh Lotfi, Nirmal R. Saxena, Richard Bramley, Paul Racunas, Philip P. Shirvani. 314-321 [doi]
- DAVOS: EDA Toolkit for Dependability Assessment, Verification, Optimisation and Selection of Hardware ModelsIlya Tuzov, David de Andrés, Juan Carlos Ruiz. 322-329 [doi]
- A Framework for Evaluating Software on Reduced Margins HardwareKonstantinos Parasyris, Panos K. Koutsovasilis, Vassilis Vassiliadis, Christos D. Antonopoulos, Nikolaos Bellas, Spyros Lalis. 330-337 [doi]
- Parallel Error Detection Using Heterogeneous CoresSam Ainsworth, Timothy M. Jones 0001. 338-349 [doi]
- Measuring IPv6 DNS Reconnaissance Attacks and Preventing Them Using DNS GuardQinwen Hu, Muhammad Rizwan Asghar, Nevil Brownlee. 350-361 [doi]
- Your Remnant Tells Secret: Residual Resolution in DDoS Protection ServicesLin Jin, Shuai Hao, Haining Wang, Chase Cotton. 362-373 [doi]
- Effective Topology Tampering Attacks and Defenses in Software-Defined NetworksRichard Skowyra, Lei Xu, Guofei Gu, Veer Dedhia, Thomas Hobson, Hamed Okhravi, James Landry. 374-385 [doi]
- EndBox: Scalable Middlebox Functions Using Client-Side Trusted ExecutionDavid Goltzsche, Signe Rüsch, Manuel Nieke, Sébastien Vaucher, Nico Weichbrodt, Valerio Schiavoni, Pierre-Louis Aublin, Paolo Costa, Christof Fetzer, Pascal Felber, Peter R. Pietzuch, Rüdiger Kapitza. 386-397 [doi]
- FragDroid: Automated User Interface Interaction with Activity and Fragment Analysis in Android ApplicationsJia Chen, Ge Han, Shanqing Guo, Wenrui Diao. 398-409 [doi]
- How Reliable is My Wearable: A Fuzz Testing-Based StudyEdgardo Barsallo Yi, Amiya Maji, Saurabh Bagchi. 410-417 [doi]
- Localizing Function Errors in Mobile Apps with User ReviewsLe Yu, Jiachi Chen, Hao Zhou, Xiapu Luo, Kang Liu 0001. 418-429 [doi]
- DTaint: Detecting the Taint-Style Vulnerability in Embedded Device FirmwareKai Cheng, Qiang Li, Lei Wang, Qian Chen, Yaowen Zheng, Limin Sun, Zhenkai Liang. 430-441 [doi]
- Deceptive Secret SharingLei Zhang, Douglas Blough. 442-453 [doi]
- MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile DevicesBing Chang, Fengwei Zhang, Bo Chen, Yingjiu Li, Wen Tao Zhu, Yangguang Tian, Zhan Wang, Albert Ching. 454-465 [doi]
- Collaborative Filtering Under a Sybil Attack: Similarity Metrics do Matter!Antoine Boutet, Florestant De Moor, Davide Frey, Rachid Guerraoui, Anne-Marie Kermarrec, Antoine Rault. 466-477 [doi]
- Specification-Based Protocol ObfuscationJulien Duchêne, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Colas Le Guernic. 478-489 [doi]
- Obfuscated VBA Macro Detection Using Machine LearningSangwoo Kim, Seokmyung Hong, Jaesang Oh, Heejo Lee. 490-501 [doi]
- Evaluating Self-Adaptive Authorisation Infrastructures Through GamificationChristopher Michael Bailey, Rogério de Lemos. 502-513 [doi]
- POWERALERT: Integrity Checking Using Power Measurement and a Game-Theoretic StrategyAhmed M. Fawaz, Mohammad A. Noureddine, William H. Sanders. 514-525 [doi]
- Generating Cloud Monitors from Models to Secure CloudsElena Troubitsyna, Irum Rauf. 526-533 [doi]
- Falcon: A Practical Log-Based Analysis Tool for Distributed SystemsFrancisco Neves, Nuno Machado, JosA Pereira. 534-541 [doi]
- Pleiades: Distributed Structural Invariants at ScaleSimon Bouget, Yérom-David Bromberg, Adrien Luxey, François Taïani. 542-553 [doi]
- The Tortoise and the Hare: Characterizing Synchrony in Distributed Environments (Practical Experience Report)Daniel Porto, João Leitão 0001, Flavio Junqueira, Rodrigo Rodrigues. 554-561 [doi]
- Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope PerspectiveSadegh Torabi, Elias Bou-Harb, Chadi Assi, Mario Galluscio, Amine Boukhtouta, Mourad Debbabi. 562-573 [doi]
- RoboADS: Anomaly Detection Against Sensor and Actuator Misbehaviors in Mobile RobotsPinyao Guo, Hunmin Kim, Nurali Virani, Jun Xu 0024, Minghui Zhu, Peng Liu 0005. 574-585 [doi]
- Hands Off the Wheel in Autonomous Vehicles?: A Systems Perspective on over a Million Miles of Field DataSubho S. Banerjee, Saurabh Jha, James Cyriac, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer. 586-597 [doi]
- Impact of Software Approximations on the Resiliency of a Video Summarization SystemRadha Venkatagiri, Karthik Swaminathan, Chung-Ching Lin, Liang Wang, Alper Buyuktosunoglu, Pradip Bose, Sarita V. Adve. 598-609 [doi]
- Detecting and Identifying Faulty IoT Devices in Smart Home with Context ExtractionJiwon Choi, Hayoung Jeoung, Jihun Kim, Youngjoo Ko, Wonup Jung, Hanjun Kim, Jong Kim 0001. 610-621 [doi]
- Divide and Conquer for Fast SRLG Disjoint RoutingKun Xie, Heng Tao, Xin Wang 0001, Gaogang Xie, Jigang Wen, Jiannong Cao, Zheng Qin. 622-633 [doi]
- Practical Experience: Methodologies for Measuring Route Origin ValidationTomas Hlavacek, Amir Herzberg, Haya Shulman, Michael Waidner. 634-641 [doi]
- In Production Performance Testing of SDN Control Plane for Telecom OperatorsCatello Di Martino, Ugo Giordano, Nishok Mohanasamy, Stefano Russo, Marina Thottan. 642-653 [doi]
- A Reexamination of Internationalized Domain Names: The Good, the Bad and the UglyBaojun Liu, Chaoyi Lu, Zhou Li, Ying Liu, Hai-Xin Duan, Shuang Hao, Zaifeng Zhang. 654-665 [doi]
- Manufacturing Resilient Bi-Opaque Predicates Against Symbolic ExecutionHui Xu, Yangfan Zhou, Yu Kang, Fengzhi Tu, Michael R. Lyu. 666-677 [doi]
- PreInfer: Automatic Inference of Preconditions via Symbolic AnalysisAngello Astorga, Siwakorn Srisakaokul, Xusheng Xiao, Tao Xie. 678-689 [doi]
- DexLego: Reassembleable Bytecode Extraction for Aiding Static AnalysisZhenyu Ning, Fengwei Zhang. 690-701 [doi]