2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

26-29 June 2017

Filter Results

Displaying Results 1 - 25 of 72
  • [Front cover]

    Publication Year: 2017, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2448 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2017, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2017, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2017, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2017, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (173 KB)
    Freely Available from IEEE
  • In memory of John Knight (1947-2017)

    Publication Year: 2017, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2017, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2017, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (166 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2017, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2017, Page(s):xvi - xvii
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2017, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2017, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Jean-Claude Laprie Award

    Publication Year: 2017, Page(s):xx - xxi
    Request permission for commercial reuse | PDF file iconPDF (215 KB)
    Freely Available from IEEE
  • The William C. Carter PhD Dissertation Award in Dependability

    Publication Year: 2017, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (253 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2017, Page(s):xxiii - xxv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB)

    Provides an abstract for each of the keynote presentations and may include a brief professional biography of each View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information Leakage in Encrypted Deduplication via Frequency Analysis

    Publication Year: 2017, Page(s):1 - 12
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (355 KB) | HTML iconHTML

    Encrypted deduplication seamlessly combines encryption and deduplication to simultaneously achieve both data security and storage efficiency. State-of-the-art encrypted deduplication systems mostly adopt a deterministic encryption approach that encrypts each plaintext chunk with a key derived from the content of the chunk itself, so that identical plaintext chunks are always encrypted into identic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy Disclosure through Smart Meters: Reactive Power Based Attack and Defense

    Publication Year: 2017, Page(s):13 - 24
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB) | HTML iconHTML

    Smart meters can record fine-grained power consumption data and provide such data to the power supplier through realtime communications. Although smart meters can make power management more efficient and fault-tolerant, they also pose bigger threats to user privacy. Data from smart meters contain fine-grained power consumption information of home appliances and thus can be used to infer the ON/OFF... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What Can We Learn from Four Years of Data Center Hardware Failures?

    Publication Year: 2017, Page(s):25 - 36
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1011 KB) | HTML iconHTML

    Hardware failures have a big impact on the dependability of large-scale data centers. We present studies on over 290,000 hardware failure reports collected over the past four years from dozens of data centers with hundreds of thousands of servers. We examine the dataset statistically to discover failure characteristics along the temporal, spatial, product line and component dimensions. We specific... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast Atomic Multicast

    Publication Year: 2017, Page(s):37 - 48
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (703 KB) | HTML iconHTML

    Atomic multicast is a communication building block of scalable and highly available applications. With atomic multicast, messages can be ordered and reliably propagated to one or more groups of server processes. Because each message can be multicast to a different set of destinations, distributed message ordering is challenging. Some atomic multicast protocols address this challenge by ordering al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speeding up Consensus by Chasing Fast Decisions

    Publication Year: 2017, Page(s):49 - 60
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1524 KB) | HTML iconHTML

    This paper proposes CAESAR, a novel multi-leader Generalized Consensus protocol for geographically replicated sites. The main goal of CAESAR is to overcome one of the major limitations of existing approaches, which is the significant performance degradation when application workload produces conflicting requests. CAESAR does that by changing the way a fast decision is taken: its ordering protocol ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Causal Atomic Broadcast, Revisited

    Publication Year: 2017, Page(s):61 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    We revisit the problem of preserving causality in Byzantine fault-tolerant (BFT) atomic broadcast protocols, a requirement first proposed by Reiter and Birman (TOPLAS 1994). While over the past three decades, this requirement has been met through the deployment of expensive public-key threshold cryptosystems, we propose three novel, secure causal BFT protocols without using public-key cryptography... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing the “Tax” of Reliability: A Hardware-Aware Method for Agile Data Persistence in Mobile Devices

    Publication Year: 2017, Page(s):73 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB) | HTML iconHTML

    Nowadays, mobile devices are pervasively used by almost everyone. The majority of mobile devices use embedded-Multi Media Cards (eMMC) as storage. However, the crash-proof mechanism of existing I/O stack has not fully exploited the features of eMMC. In some real usage scenarios, the legacy data persistence procedure may dramatically degrade performance of the system. In response to this, this pape... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring the Potential for Collaborative Data Compression and Hard-Error Tolerance in PCM Memories

    Publication Year: 2017, Page(s):85 - 96
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (659 KB) | HTML iconHTML

    Limited write endurance is the main obstacle standing in the way of using phase change memory (PCM) in future computing systems. While several wear-leveling and hard-error tolerant techniques have been proposed for improving PCM lifetime, most of these approaches assume that the underlying memory uses a very simple write traffic reduction scheme (e.g., buffering, differential writes). In particula... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • One Bit is (Not) Enough: An Empirical Study of the Impact of Single and Multiple Bit-Flip Errors

    Publication Year: 2017, Page(s):97 - 108
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1215 KB) | HTML iconHTML

    Recent studies have shown that technology and voltage scaling are expected to increase the likelihood that particle-induced soft errors manifest as multiple-bit errors. This raises concerns about the validity of using single bit-flips for assessing the impact of soft errors in fault injection experiments. The goal of this paper is to investigate whether multiple-bit errors could cause a higher per... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • StatSym: Vulnerable Path Discovery through Statistics-Guided Symbolic Execution

    Publication Year: 2017, Page(s):109 - 120
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1620 KB) | HTML iconHTML

    Identifying vulnerabilities in software systems is crucial to minimizing the damages that result from malicious exploits and software failures. This often requires proper identification of vulnerable execution paths that contain program vulnerabilities or bugs. However, with rapid rise in software complexity, it has become notoriously difficult to identify such vulnerable paths through exhaustivel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.