Sciweavers

DSN
2009
IEEE
14 years 6 months ago
LFI: A practical and general library-level fault injector
Fault injection, a critical aspect of testing robust systems, is often overlooked in the development of generalpurpose software. We believe this is due to the absence of easy-to-u...
Paul Dan Marinescu, George Candea
DSN
2009
IEEE
14 years 6 months ago
Dynamic content web applications: Crash, failover, and recovery analysis
This work assesses how crashes and recoveries affect the performance of a replicated dynamic content web application. RobustStore is the result of retrofitting TPC-W’s on-line ...
Luiz Eduardo Buzato, Gustavo M. D. Vieira, Willy Z...
DSN
2009
IEEE
14 years 6 months ago
Exception triggered DoS attacks on wireless networks
Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through exp...
Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, Ha...
DSN
2009
IEEE
14 years 6 months ago
Parametric NdRFT for the derivation of optimal repair strategies
Marco Beccuti, Giuliana Franceschinis, Daniele Cod...
DSN
2009
IEEE
14 years 6 months ago
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
Remote attestation of system integrity is an essential part of trusted computing. However, current remote attestation techniques only provide integrity proofs of static properties...
Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Pen...
DSN
2009
IEEE
14 years 6 months ago
Fault isolation for device drivers
This work explores the principles and practice of isolating low-level device drivers in order to improve OS dependability. In particular, we explore the operations drivers can per...
Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Ho...
DSN
2009
IEEE
14 years 6 months ago
Fail-Aware Untrusted Storage
We consider a set of clients collaborating through an online service provider that is subject to attacks, and hence y trusted by the clients. We introduce the abstraction of a fai...
Christian Cachin, Idit Keidar, Alexander Shraer
DSN
2009
IEEE
14 years 6 months ago
On the effectiveness of low latency anonymous network in the presence of timing attack
In this paper, we introduce a novel metric that can quantitatively measure the practical effectiveness (i.e. anonymity) of all anonymous networks in the presence of timing attack....
Jing Jin, Xinyuan Wang
DSN
2009
IEEE
14 years 6 months ago
WYSIWIB: A declarative approach to finding API protocols and bugs in Linux code
Julia L. Lawall, Julien Brunel, Nicolas Palix, Ren...
DSN
2009
IEEE
14 years 6 months ago
Exploiting refactoring in formal verification
Xiang Yin, John C. Knight, Westley Weimer