2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks

23-26 June 2014

Filter Results

Displaying Results 1 - 25 of 101
  • [Title page i]

    Publication Year: 2014, Page(s): i
    Request permission for reuse | PDF file iconPDF (17 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2014, Page(s): iii
    Request permission for reuse | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2014, Page(s): iv
    Request permission for reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):v - xiii
    Request permission for reuse | PDF file iconPDF (154 KB)
    Freely Available from IEEE
  • Message from General Chair

    Publication Year: 2014, Page(s):xiv - xv
    Request permission for reuse | PDF file iconPDF (141 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chairs

    Publication Year: 2014, Page(s): xvi
    Request permission for reuse | PDF file iconPDF (137 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2014, Page(s): xvii
    Request permission for reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2014, Page(s):xviii - xix
    Request permission for reuse | PDF file iconPDF (132 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2014, Page(s): xx
    Request permission for reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • DCDV 2014 Workshop Committee

    Publication Year: 2014, Page(s): xxi
    Request permission for reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • DSSO 2014 Workshop Committee

    Publication Year: 2014, Page(s): xxii
    Request permission for reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • FTXS 2014 Workshop Committee

    Publication Year: 2014, Page(s): xxiii
    Request permission for reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • ToSG 2014 Workshop Committee

    Publication Year: 2014, Page(s): xxiv
    Request permission for reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Sponsors/Conference Support

    Publication Year: 2014, Page(s): xxv
    Request permission for reuse | PDF file iconPDF (155 KB)
    Freely Available from IEEE
  • Keynote

    Publication Year: 2014, Page(s): xxvi
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (159 KB)

    Provides an abstract for each of the keynote presentations and may include a brief professional biography of each View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Jean-Claude Laprie Award on Dependable Computing

    Publication Year: 2014, Page(s): xxvii
    Request permission for reuse | PDF file iconPDF (217 KB)
    Freely Available from IEEE
  • William C. Carter Award

    Publication Year: 2014, Page(s): xxviii
    Request permission for reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • Failure Analysis of Virtual and Physical Machines: Patterns, Causes and Characteristics

    Publication Year: 2014, Page(s):1 - 12
    Cited by:  Papers (16)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    In today's commercial data centers, the computation density grows continuously as the number of hardware components and workloads in units of virtual machines increase. The service availability guaranteed by data centers heavily depends on the reliability of the physical and virtual servers. In this study, we conduct an analysis on 10K virtual and physical machines hosted on five commercial data c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural Invariants

    Publication Year: 2014, Page(s):13 - 24
    Cited by:  Papers (15)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (643 KB) | HTML iconHTML

    This paper presents a solution that simultaneously addresses both reliability and security (RnS) in a monitoring framework. We identify the commonalities between reliability and security to guide the design of Hyper Tap, a hyper visor-level framework that efficiently supports both types of monitoring in virtualization environments. In Hyper Tap, the logging of system events and states is common ac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lazy Checkpointing: Exploiting Temporal Locality in Failures to Mitigate Checkpointing Overheads on Extreme-Scale Systems

    Publication Year: 2014, Page(s):25 - 36
    Cited by:  Papers (25)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (894 KB) | HTML iconHTML

    Continuing increase in the computational power of supercomputers has enabled large-scale scientific applications in the areas of astrophysics, fusion, climate and combustion to run larger and longer-running simulations, facilitating deeper scientific insights. However, these long-running simulations are often interrupted by multiple system failures. Therefore, these applications rely on "check poi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Titan: Enabling Low Overhead and Multi-faceted Network Fingerprinting of a Bot

    Publication Year: 2014, Page(s):37 - 44
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (924 KB) | HTML iconHTML

    Botnets are an evolutionary form of malware, unique in requiring network connectivity for herding by a botmaster that allows coordinated attacks as well as dynamic evasion from detection. Thus, the most interesting features of a bot relate to its rapidly evolving network behavior. The few academic and commercial malware observation systems that exist, however, are either proprietary or have large ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • pSigene: Webcrawling to Generalize SQL Injection Signatures

    Publication Year: 2014, Page(s):45 - 56
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (670 KB) | HTML iconHTML

    Intrusion detection systems (IDS) are an important component to effectively protect computer systems. Misuse detection is the most popular approach to detect intrusions, using a library of signatures to find attacks. The accuracy of the signatures is paramount for an effective IDS, still today's practitioners rely on manual techniques to improve and update those signatures. We present a system, ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Probabilistic Inference for Obfuscated Network Attack Sequences

    Publication Year: 2014, Page(s):57 - 67
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (562 KB) | HTML iconHTML

    Facing diverse network attack strategies and overwhelming alters, much work has been devoted to correlate observed malicious events to pre-defined scenarios, attempting to deduce the attack plans based on expert models of how network attacks may transpire. Sophisticated attackers can, however, employ a number of obfuscation techniques to confuse the alert correlation engine or classifier. Recogniz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anomaly Characterization in Large Scale Networks

    Publication Year: 2014, Page(s):68 - 79
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (552 KB) | HTML iconHTML

    The context of this work is the online characterization of errors in large scale systems. In particular, we address the following question: Given two successive configurations of the system, can we distinguish massive errors from isolated ones, the former ones impacting a large number of nodes while the second ones affect solely a small number of them, or even a single one? The rationale of this q... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics

    Publication Year: 2014, Page(s):80 - 87
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (481 KB) | HTML iconHTML

    Many long-running network analytics applications impose a high-throughput and high reliability requirements on stream processing systems. However, previous stream processing systems cannot sustain high-speed traffic at the core router level. Furthermore, their fault-tolerant schemes cannot provide strong consistency which is essential for network analytics. In this paper, we present the design and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.