2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS)

26-29 Sept. 2016

Filter Results

Displaying Results 1 - 25 of 52
  • [Front cover]

    Publication Year: 2016, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1965 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2016, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2016, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (132 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • Message from the General Co-Chairs

    Publication Year: 2016, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Message from the Technical Program Co-Chairs

    Publication Year: 2016, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • Symposium Organizers

    Publication Year: 2016, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (103 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2016, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • External Reviewers

    Publication Year: 2016, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • The Rowhammer Attack Injection Methodology

    Publication Year: 2016, Page(s):1 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    This paper presents a systematic methodology to identify and validate security attacks that exploit user influenceable hardware faults (i.e., rowhammer errors). We break down rowhammer attack procedures into nine generalized steps where some steps are designed to increase the attack success probabilities. Our framework can perform those nine operations (e.g., pressuring system memory and spraying ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ShareIff: A Sticky Policy Middleware for Self-Destructing Messages in Android Applications

    Publication Year: 2016, Page(s):11 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (369 KB) | HTML iconHTML

    Self-destructing messaging applications have garnered immense popularity due to the arrival of Snapchat. However, Snapchat's history has shown that building such services on modern mobile platforms is very challenging. In fact, either caused by programming errors or due to the limitations of existing mobile operating systems, in Snapchat and other similar applications it is possible to recover sup... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lateral Movement Detection Using Distributed Data Fusion

    Publication Year: 2016, Page(s):21 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    Attackers often attempt to move laterally from host to host, infecting them until an overall goal is achieved. One possible defense against this strategy is to detect such coordinated and sequential actions by fusing data from multiple sources. In this paper, we propose a framework for distributed data fusion that specifies the communication architecture and data transformation functions. Then, we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-round Master-Worker Computing: A Repeated Game Approach

    Publication Year: 2016, Page(s):31 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (752 KB) | HTML iconHTML

    We consider a computing system where a master processor assigns tasks for execution to worker processors through the Internet. We model the workers' decision of whether to comply (compute the task) or not (return a bogus result to save the computation cost) as a mixed extension of a strategic game among workers. That is, we assume that workers are rational in a game-theoretic sense, and that they ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sirius: Neural Network Based Probabilistic Assertions for Detecting Silent Data Corruption in Parallel Programs

    Publication Year: 2016, Page(s):41 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    The size and complexity of supercomputing clusters are rapidly increasing to cater to the needs of complex scientific applications. At the same time, the feature size and operating voltage level of the internal components are decreasing. This dual trend makes these machines extremely vulnerable to soft errors or random bit flips. For complex parallel applications, these soft errors can lead to sil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CRUDE: Combining Resource Usage Data and Error Logs for Accurate Error Detection in Large-Scale Distributed Systems

    Publication Year: 2016, Page(s):51 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    The use of console logs for error detection in large scale distributed systems has proven to be useful to system administrators. However, such logs are typically redundant and incomplete, making accurate detection very difficult. In an attempt to increase this accuracy, we complement these incomplete console logs with resource usage data, which captures the resource utilisation of every job in the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Achieving High Reliability via Expediting the Repair of Critical Blocks in Replicated Storage Systems

    Publication Year: 2016, Page(s):61 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    High reliability is critical to large data centers consisting of hundreds to thousands of storage nodes where node failures are not rare. Data replication is a typical technique deployed to achieve high reliability. When a node failure is detected, blocks with lost replicas are identified and recovered. Long timeouts are usually used for node failure detection. For blocks with one lost replica, th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Being Accurate Is Not Enough: New Metrics for Disk Failure Prediction

    Publication Year: 2016, Page(s):71 - 80
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    Traditionally, disk failure prediction accuracy is used to evaluate disk failure prediction model. However, accuracy may not reflect their practical usage (protecting against failures, rather than only predicting failures) in cloud storage systems. In this paper, we propose two new metrics for disk failure prediction models: migration rate, which measures how much at-risk data is protected as a re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Norton Zone: Symantec's Secure Cloud Storage System

    Publication Year: 2016, Page(s):81 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    Cloud storage services are the way of the future, if not the present, but broad adoption is limited by a stark trade-off between privacy and functionality. Many popular cloud services provide search capabilities, but make only nominal efforts to keep user data fully private. Alternatives that search private user data on an untrusted server sacrifice functionality and/or scalability. We describe No... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tale of Tails: Anomaly Avoidance in Data Centers

    Publication Year: 2016, Page(s):91 - 100
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (667 KB) | HTML iconHTML

    It is a common practice that today's cloud data centers guard the performance by monitoring the resource usage, e.g., CPU and RAM, and issuing anomaly tickets whenever detecting usages exceeding predefined target values. Ensuring free of such usage anomaly can be extremely challenging, while catering to a large amount of virtual machines (VMs) showing bursty workloads on a limited amount of physic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • vMocity: Traveling VMs Across Heterogeneous Clouds

    Publication Year: 2016, Page(s):101 - 110
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (419 KB) | HTML iconHTML

    Current IaaS cloud providers typically adopt different underlying cloud infrastructures and are reluctant to provide consistent interfaces to facilitate cross-cloud interoperability. Such status quo significantly complicates inter-cloud virtual machine relocation and impedes the adoption of cloud services for more enterprises and individual users. In this paper, we propose vMocity, a middleware fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Storekeeper: A Security-Enhanced Cloud Storage Aggregation Service

    Publication Year: 2016, Page(s):111 - 120
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (854 KB) | HTML iconHTML

    Cloud storage services are currently a commodity that allows users to store data persistently, access the data from everywhere, and share it with friends or co-workers. However, due to the proliferation of cloud storage accounts and lack of interoperability between cloud services, managing and sharing cloud-hosted files is a nightmare for many users. To address this problem, specialized cloud aggr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VMBeam: Zero-Copy Migration of Virtual Machines for Virtual IaaS Clouds

    Publication Year: 2016, Page(s):121 - 126
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (186 KB) | HTML iconHTML

    Virtual Infrastructure-as-a-Service (IaaS) clouds are emerging for secondary cloud service providers to manage their own IaaS clouds on top of existing IaaS clouds. In virtual IaaS clouds, guest virtual machines (VMs) run inside cloud VMs provided by existing IaaS clouds. Unlike traditional IaaS clouds, they can be migrated between cloud VMs co-located at the same host. However, the performance of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inside-Out: Reliable Performance Prediction for Distributed Storage Systems in the Cloud

    Publication Year: 2016, Page(s):127 - 136
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    Many storage systems are undergoing a significant shift from dedicated appliance-based model to software-defined storage (SDS) because the latter is flexible, scalable and cost-effective for modern workloads. However, it is challenging to provide a reliable guarantee of end-to-end performance in SDS due to complex software stack, time-varying workload and performance interference among tenants. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DTC: A Dynamic Transaction Chopping Technique for Geo-replicated Storage Systems

    Publication Year: 2016, Page(s):137 - 146
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    Large Web applications usually require replicating data across geo-distributed datacenters to achieve high locality, durability and availability. However, maintaining strong consistency in geo-replicated systems usually suffers from long latency due to costly coordination across datacenters. Among others, transaction chopping is an effective and efficient approach to cope with such a challenge. In... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.