23-26 June 2014
Filter Results
-
[Title page i]
Publication Year: 2014, Page(s): i|
PDF (17 KB)
-
[Title page iii]
Publication Year: 2014, Page(s): iii|
PDF (51 KB)
-
[Copyright notice]
Publication Year: 2014, Page(s): iv|
PDF (72 KB)
-
Table of contents
Publication Year: 2014, Page(s):v - xiii|
PDF (154 KB)
-
Message from General Chair
Publication Year: 2014, Page(s):xiv - xv -
Message from Program Chairs
Publication Year: 2014, Page(s): xvi -
Organizing Committee
Publication Year: 2014, Page(s): xvii|
PDF (136 KB)
-
Program Committee
Publication Year: 2014, Page(s):xviii - xix|
PDF (132 KB)
-
Reviewers
Publication Year: 2014, Page(s): xx|
PDF (93 KB)
-
DCDV 2014 Workshop Committee
Publication Year: 2014, Page(s): xxi|
PDF (122 KB)
-
DSSO 2014 Workshop Committee
Publication Year: 2014, Page(s): xxii|
PDF (123 KB)
-
FTXS 2014 Workshop Committee
Publication Year: 2014, Page(s): xxiii|
PDF (122 KB)
-
ToSG 2014 Workshop Committee
Publication Year: 2014, Page(s): xxiv|
PDF (131 KB)
-
Sponsors/Conference Support
Publication Year: 2014, Page(s): xxv|
PDF (155 KB)
-
Keynote
Publication Year: 2014, Page(s): xxviProvides an abstract for each of the keynote presentations and may include a brief professional biography of each View full abstract»
-
Jean-Claude Laprie Award on Dependable Computing
Publication Year: 2014, Page(s): xxvii|
PDF (217 KB)
-
William C. Carter Award
Publication Year: 2014, Page(s): xxviii|
PDF (145 KB)
-
Failure Analysis of Virtual and Physical Machines: Patterns, Causes and Characteristics
Publication Year: 2014, Page(s):1 - 12
Cited by: Papers (16)In today's commercial data centers, the computation density grows continuously as the number of hardware components and workloads in units of virtual machines increase. The service availability guaranteed by data centers heavily depends on the reliability of the physical and virtual servers. In this study, we conduct an analysis on 10K virtual and physical machines hosted on five commercial data c... View full abstract»
-
Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural Invariants
Publication Year: 2014, Page(s):13 - 24
Cited by: Papers (15)This paper presents a solution that simultaneously addresses both reliability and security (RnS) in a monitoring framework. We identify the commonalities between reliability and security to guide the design of Hyper Tap, a hyper visor-level framework that efficiently supports both types of monitoring in virtualization environments. In Hyper Tap, the logging of system events and states is common ac... View full abstract»
-
Lazy Checkpointing: Exploiting Temporal Locality in Failures to Mitigate Checkpointing Overheads on Extreme-Scale Systems
Publication Year: 2014, Page(s):25 - 36
Cited by: Papers (25)Continuing increase in the computational power of supercomputers has enabled large-scale scientific applications in the areas of astrophysics, fusion, climate and combustion to run larger and longer-running simulations, facilitating deeper scientific insights. However, these long-running simulations are often interrupted by multiple system failures. Therefore, these applications rely on "check poi... View full abstract»
-
Titan: Enabling Low Overhead and Multi-faceted Network Fingerprinting of a Bot
Publication Year: 2014, Page(s):37 - 44
Cited by: Papers (3)Botnets are an evolutionary form of malware, unique in requiring network connectivity for herding by a botmaster that allows coordinated attacks as well as dynamic evasion from detection. Thus, the most interesting features of a bot relate to its rapidly evolving network behavior. The few academic and commercial malware observation systems that exist, however, are either proprietary or have large ... View full abstract»
-
pSigene: Webcrawling to Generalize SQL Injection Signatures
Publication Year: 2014, Page(s):45 - 56
Cited by: Papers (1)Intrusion detection systems (IDS) are an important component to effectively protect computer systems. Misuse detection is the most popular approach to detect intrusions, using a library of signatures to find attacks. The accuracy of the signatures is paramount for an effective IDS, still today's practitioners rely on manual techniques to improve and update those signatures. We present a system, ca... View full abstract»
-
Probabilistic Inference for Obfuscated Network Attack Sequences
Publication Year: 2014, Page(s):57 - 67
Cited by: Papers (5)Facing diverse network attack strategies and overwhelming alters, much work has been devoted to correlate observed malicious events to pre-defined scenarios, attempting to deduce the attack plans based on expert models of how network attacks may transpire. Sophisticated attackers can, however, employ a number of obfuscation techniques to confuse the alert correlation engine or classifier. Recogniz... View full abstract»
-
Anomaly Characterization in Large Scale Networks
Publication Year: 2014, Page(s):68 - 79
Cited by: Papers (2)The context of this work is the online characterization of errors in large scale systems. In particular, we address the following question: Given two successive configurations of the system, can we distinguish massive errors from isolated ones, the former ones impacting a large number of nodes while the second ones affect solely a small number of them, or even a single one? The rationale of this q... View full abstract»
-
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics
Publication Year: 2014, Page(s):80 - 87
Cited by: Papers (2) | Patents (1)Many long-running network analytics applications impose a high-throughput and high reliability requirements on stream processing systems. However, previous stream processing systems cannot sustain high-speed traffic at the core router level. Furthermore, their fault-tolerant schemes cannot provide strong consistency which is essential for network analytics. In this paper, we present the design and... View full abstract»