2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks

22-25 June 2015

Filter Results

Displaying Results 1 - 25 of 70
  • [Front cover]

    Publication Year: 2015, Page(s): C4
    Request permission for reuse | PDF file iconPDF (1141 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2015, Page(s): i
    Request permission for reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2015, Page(s): iii
    Request permission for reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): iv
    Request permission for reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):v - x
    Request permission for reuse | PDF file iconPDF (163 KB)
    Freely Available from IEEE
  • Message from General Chairs

    Publication Year: 2015, Page(s): xi
    Request permission for reuse | PDF file iconPDF (199 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chairs

    Publication Year: 2015, Page(s):xii - xiii
    Request permission for reuse | PDF file iconPDF (136 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2015, Page(s):xiv - xv
    Request permission for reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2015, Page(s):xvi - xvii
    Request permission for reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2015, Page(s):xviii - xix
    Request permission for reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2015, Page(s): xx
    Request permission for reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2015, Page(s):xxi - xxiii
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    Provides an abstract for each of the keynote presentations and may include a brief professional biography of each View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Jean-Claude Award in Dependable Computing

    Publication Year: 2015, Page(s): xxiv
    Request permission for reuse | PDF file iconPDF (337 KB)
    Freely Available from IEEE
  • William C. Carter Award

    Publication Year: 2015, Page(s): xxv
    Request permission for reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations

    Publication Year: 2015, Page(s):1 - 12
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    We present a new method for finding attacks in unmodified transport protocol implementations using the specification of the protocol state machine to reduce the search space of possible attacks. Such reduction is obtained by appling malicious actions to all packets of the same type observed in the same state instead of applying them to individual packets. Our method requires knowledge of the packe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Δ-Encoding: Practical Encoded Processing

    Publication Year: 2015, Page(s):13 - 24
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    Transient and permanent errors in memory and CPUs occur with alarming frequency. Although most of these errors are masked at the hardware level or result in crashes, a non-negligible number of them leads to Silent Data Corruptions (SDCs), i.e., incorrect results of computations. Safety-critical programs require a very high level of confidence that such faults are detected and not propagated to the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring and Understanding Extreme-Scale Application Resilience: A Field Study of 5,000,000 HPC Application Runs

    Publication Year: 2015, Page(s):25 - 36
    Cited by:  Papers (16)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1736 KB) | HTML iconHTML

    This paper presents an in-depth characterization of the resiliency of more than 5 million HPC application runs completed during the first 518 production days of Blue Waters, a 13.1 petaflop Cray hybrid supercomputer. Unlike past work, we measure the impact of system errors and failures on user applications, i.e., the compiled programs launched by user jobs that can execute across one or more XE (C... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding and Exploiting Spatial Properties of System Failures on Extreme-Scale HPC Systems

    Publication Year: 2015, Page(s):37 - 44
    Cited by:  Papers (19)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (3653 KB) | HTML iconHTML

    As we approach exascale, the scientific simulations are expected to experience more interruptions due to increased system failures. Designing better HPC resilience techniques requires understanding the key characteristics of system failures on these systems. While temporal properties of system failures on HPC systems have been well-investigated, there is limited understanding about the spatial cha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data

    Publication Year: 2015, Page(s):45 - 56
    Cited by:  Papers (17)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (374 KB) | HTML iconHTML

    Recent years have seen the rise of sophisticated attacks including advanced persistent threats (APT) which pose severe risks to organizations and governments. Additionally, new malware strains appear at a higher rate than ever before. Since many of these malware evade existing security products, traditional defenses deployed by enterprises today often fail at detecting infections at an early stage... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis

    Publication Year: 2015, Page(s):57 - 68
    Cited by:  Papers (6)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1064 KB) | HTML iconHTML

    Currently cyber infrastructures are facing increasingly stealthy attacks that implant malicious payloads under the cover of benign programs. Existing attack detection approaches based on statistical learning methods may generate misleading decision boundaries when processing noisy data with such a mixture of benign and malicious behaviors. On the other hand, attack detection based on formal progra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OnionBots: Subverting Privacy Infrastructure for Cyber Attacks

    Publication Year: 2015, Page(s):69 - 80
    Cited by:  Papers (6)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (523 KB) | HTML iconHTML

    Over the last decade botnets survived by adopting a sequence of increasingly sophisticated strategies to evade detection and take overs, and to monetize their infrastructure. At the same time, the success of privacy infrastructures such as Tor opened the door to illegal activities, including botnets, ransomware, and a marketplace for drugs and contraband. We contend that the next waves of botnets ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Statistical Approach for Timed Reachability in AADL Models

    Publication Year: 2015, Page(s):81 - 88
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    We introduce a simulator (slimsim) for a subset of AADL extended with formalized behavioral semantics for nominal and error models. The simulator allows to perform probabilistic analysis using the Monte Carlo method, on linear-hybrid, stochastic models, which describe a combination of nominal and error behaviors of hard- and software components. The tool supports the use of different strategies, w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable Analysis of Fault Trees with Dynamic Features

    Publication Year: 2015, Page(s):89 - 100
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    Fault trees constitute one of the essential formalisms for static safety analysis of various industrial systems. Dynamic fault trees (DFT) enrich the formalism by time-dependent behavior, e.g., repairs or functional dependencies. Analysis of DFT is so far limited to substantially smaller models than those required for, e.g., nuclear power plants. We propose a fault tree formalism that combines bot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Power of Evil Choices in Bloom Filters

    Publication Year: 2015, Page(s):101 - 112
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (309 KB) | HTML iconHTML

    A Bloom filter is a probabilistic hash-based data structure extensively used in software including online security applications. This paper raises the following important question: Are Bloom filters correctly designed in a security context? The answer is no and the reasons are multiple: bad choices of parameters, lack of adversary models and misused hash functions. Indeed, developers truncate cryp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Dynamic Software Loading and Execution Using Cross Component Verification

    Publication Year: 2015, Page(s):113 - 124
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (470 KB) | HTML iconHTML

    In this paper, we propose a cross verification mechanism for secure execution and dynamic component loading. Our mechanism is based on a combination of code signing and same-origin policy, and it blocks several types of attacks from drive-by download attacks to malicious component loadings such as DLL hijacking, DLL side-loading, binary hijacking, typical DLL injection and loading of newly install... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.