Sciweavers

DSN
2009
IEEE
13 years 11 months ago
Exploiting refactoring in formal verification
Xiang Yin, John C. Knight, Westley Weimer
DSN
2009
IEEE
13 years 11 months ago
Low overhead Soft Error Mitigation techniques for high-performance and aggressive systems
The threat of soft error induced system failure in high performance computing systems has become more prominent, as we adopt ultra-deep submicron process technologies. In this pap...
Naga Durga Prasad Avirneni, Viswanathan Subramania...
DSN
2009
IEEE
13 years 11 months ago
Spam detection in voice-over-IP calls through semi-supervised clustering
In this paper, we present an approach for detection of spam calls over IP telephony called SPIT in VoIP systems. SPIT detection is different from spam detection in email in that t...
Yu-Sung Wu, Saurabh Bagchi, Navjot Singh, Ratsamee...
DSN
2009
IEEE
13 years 11 months ago
Report generation for simulation traces with Traviando
Any model-based evaluation of the dependability of a system requires validation and verification to justify that its results are meaningful. Modern modeling frameworks enable us ...
Peter Kemper
DSN
2009
IEEE
13 years 11 months ago
VNsnap: Taking snapshots of virtual networked environments with minimal downtime
A virtual networked environment (VNE) consists of virtual machines (VMs) connected by a virtual network. It has been adopted to create “virtual infrastructures” for individual...
Ardalan Kangarlou, Patrick Eugster, Dongyan Xu
DSN
2009
IEEE
13 years 11 months ago
Xprobe2++: Low volume remote network information gathering tool
Active operating system fingerprinting is the process of actively determining a target network system’s underlying operating system type and characteristics by probing the targ...
Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, ...
DSN
2009
IEEE
13 years 11 months ago
Comparing anomaly-detection algorithms for keystroke dynamics
Keystroke dynamics—the analysis of typing rhythms to discriminate among users—has been proposed for detecting impostors (i.e., both insiders and external attackers). Since man...
Kevin S. Killourhy, Roy A. Maxion
DSN
2009
IEEE
13 years 11 months ago
Using web security scanners to detect vulnerabilities in web services
Marco Vieira, Nuno Antunes, Henrique Madeira
DSN
2009
IEEE
13 years 11 months ago
Stretching gossip with live streaming
Gossip-based information dissemination protocols are considered easy to deploy, scalable and resilient to network dynamics. They are also considered highly flexible, namely tunab...
Davide Frey, Rachid Guerraoui, Anne-Marie Kermarre...
DSN
2009
IEEE
13 years 11 months ago
Decoupling Dynamic Information Flow Tracking with a dedicated coprocessor
Dynamic Information Flow Tracking (DIFT) is a promising security technique. With hardware support, DIFT prevents a wide range of attacks on vulnerable software with minimal perfor...
Hari Kannan, Michael Dalton, Christos Kozyrakis