Ironstack: Performance, Stability and Security for Power Grid Data Networks (English)
- New search for: Teo, Zhiyuan
- New search for: Kutsenko, Vera
- New search for: Birman, Ken
- New search for: Renesse, Robbert Van
- New search for: Teo, Zhiyuan
- New search for: Kutsenko, Vera
- New search for: Birman, Ken
- New search for: Renesse, Robbert Van
In:
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
;
792-797
;
2014
-
ISBN:
- Conference paper / Electronic Resource
-
Title:Ironstack: Performance, Stability and Security for Power Grid Data Networks
-
Contributors:Teo, Zhiyuan ( author ) / Kutsenko, Vera ( author ) / Birman, Ken ( author ) / Renesse, Robbert Van ( author )
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2014-06-01
-
Size:147747 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Failure Analysis of Virtual and Physical Machines: Patterns, Causes and CharacteristicsBirke, Robert / Giurgiu, Ioana / Chen, Lydia Y. / Wiesmann, Dorothea / Engbersen, Ton et al. | 2014
- 13
-
Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural InvariantsPham, Cuong / Estrada, Zachary / Cao, Phuong / Kalbarczyk, Zbigniew / Iyer, Ravishankar K. et al. | 2014
- 25
-
Lazy Checkpointing: Exploiting Temporal Locality in Failures to Mitigate Checkpointing Overheads on Extreme-Scale SystemsTiwari, Devesh / Gupta, Saurabh / Vazhkudai, Sudharshan S. et al. | 2014
- 37
-
Titan: Enabling Low Overhead and Multi-faceted Network Fingerprinting of a BotHaq, Osama / Ahmed, Waqar / Syed, Affan A. et al. | 2014
- 45
-
pSigene: Webcrawling to Generalize SQL Injection SignaturesHoward, Gaspar Modelo / Gutierrez, Christopher N. / Arshad, Fahad A. / Bagchi, Saurabh / Qi, Yuan et al. | 2014
- 57
-
Probabilistic Inference for Obfuscated Network Attack SequencesDu, Haitao / Yang, Shanchieh Jay et al. | 2014
- 68
-
Anomaly Characterization in Large Scale NetworksAnceaume, Emmanuelle / Busnel, Yann / Merrer, Erwan Le / Ludinard, Romaric / Marchand, Jean Louis / Sericola, Bruno et al. | 2014
- 80
-
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic AnalyticsLiu, Qin / Lui, John C.S. / He, Cheng / Pan, Lujia / Fan, Wei / Shi, Yunlong et al. | 2014
- 88
-
An Adaptable Rule Placement for Software-Defined NetworksZhang, Shuyuan / Ivancic, Franjo / Lumezanu, Cristian / Yuan, Yifei / Gupta, Aarti / Malik, Sharad et al. | 2014
- 100
-
Detecting Malicious Javascript in PDF through Document InstrumentationLiu, Daiping / Wang, Haining / Stavrou, Angelos et al. | 2014
- 112
-
Scriptless Timing Attacks on Web Browser PrivacyLiang, Bin / You, Wei / Liu, Liangkun / Shi, Wenchang / Heiderich, Mario et al. | 2014
- 124
-
Automatically Fixing C Buffer Overflows Using Program TransformationsShaw, Alex / Doggett, Dusten / Hafiz, Munawar et al. | 2014
- 136
-
Application-Level Autonomic Hardware to Predict and Preempt Software Attacks on Industrial Control SystemsLerner, Lee W. / Franklin, Zane R. / Baumann, William T. / Patterson, Cameron D. et al. | 2014
- 148
-
Monitor Based Oracles for Cyber-Physical System Testing: Practical Experience ReportKane, Aaron / Fuhrman, Thomas / Koopman, Philip et al. | 2014
- 156
-
Security Threat Analytics and Countermeasure Synthesis for Power System State EstimationRahman, Mohammad Ashiqur / Shaer, Ehab Al / Kavasseri, Rajesh G. et al. | 2014
- 168
-
You Can Call but You Can't Hide: Detecting Caller ID Spoofing AttacksMustafa, Hossen / Xu, Wenyuan / Sadeghi, Ahmad Reza / Schulz, Steffen et al. | 2014
- 180
-
On Tracking Information Flows through JNI in Android ApplicationsQian, Chenxiong / Luo, Xiapu / Shao, Yuru / Chan, Alvin T.S. et al. | 2014
- 192
-
Optical Delusions: A Study of Malicious QR Codes in the WildKharraz, Amin / Kirda, Engin / Robertson, William / Balzarotti, Davide / Francillon, Aurelien et al. | 2014
- 204
-
A Reliable 3D MLC PCM Architecture with Resistance Drift PredictorJalili, Majid / Arjomand, Mohammad / Azad, Hamid Sarbazi et al. | 2014
- 216
-
Mitigating Write Disturbance in Super-Dense Phase Change MemoriesJiang, Lei / Zhang, Youtao / Yang, Jun et al. | 2014
- 228
-
WL-Reviver: A Framework for Reviving any Wear-Leveling Techniques in the Face of Failures on Phase Change MemoryFan, Jie / Jiang, Song / Shu, Jiwu / Sun, Long / Hu, Qingda et al. | 2014
- 240
-
Performance Sensitive Replication in Geo-distributed Cloud DatastoresShankaranarayanan, P.N. / Sivakumar, Ashiwan / Rao, Sanjay / Tawarmalani, Mohit et al. | 2014
- 252
-
POD-Diagnosis: Error Diagnosis of Sporadic Operations on Cloud ApplicationsXu, Xiwei / Zhu, Liming / Weber, Ingo / Bass, Len / Sun, Daniel et al. | 2014
- 264
-
Catch Me If You Can: A Cloud-Enabled DDoS DefenseJia, Quan / Wang, Huangxin / Fleck, Dan / Li, Fei / Stavrou, Angelos / Powell, Walter et al. | 2014
- 276
-
Secure Ranked Multi-keyword Search for Multiple Data Owners in Cloud ComputingZhang, Wei / Xiao, Sheng / Lin, Yaping / Zhou, Ting / Zhou, Siwang et al. | 2014
- 287
-
S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social ServicesLiao, Xiaojing / Uluagac, Selcuk / Beyah, Raheem A. et al. | 2014
- 299
-
Social Puzzles: Context-Based Access Control in Online Social NetworksJadliwala, Murtuza / Maiti, Anindya / Namboodiri, Vinod et al. | 2014
- 311
-
Mining Historical Issue Repositories to Heal Large-Scale Online Service SystemsDing, Rui / Fu, Qiang / Lou, Jian Guang / Lin, Qingwei / Zhang, Dongmei / Xie, Tao et al. | 2014
- 323
-
Understanding Interoperability Issues of Web Service FrameworksElia, Ivano Alessandro / Laranjeiro, Nuno / Vieira, Marco et al. | 2014
- 331
-
Scalable State-Machine ReplicationBezerra, Carlos Eduardo / Pedone, Fernando / Renesse, Robbert Van et al. | 2014
- 343
-
Clock-RSM: Low-Latency Inter-datacenter State Machine Replication Using Loosely Synchronized Physical ClocksDu, Jiaqing / Sciascia, Daniele / Elnikety, Sameh / Zwaenepoel, Willy / Pedone, Fernando et al. | 2014
- 355
-
State Machine Replication for the Masses with BFT-SMARTBessani, Alysson / Sousa, Joao / Alchieri, Eduardo E.P. et al. | 2014
- 363
-
Hardware-Software Integrated Diagnosis for Intermittent Hardware FaultsDadashi, Majid / Rashid, Layali / Pattabiraman, Karthik / Gopalakrishnan, Sathish et al. | 2014
- 375
-
Quantifying the Accuracy of High-Level Fault Injection Techniques for Hardware FaultsWei, Jiesheng / Thomas, Anna / Li, Guanpeng / Pattabiraman, Karthik et al. | 2014
- 383
-
Hard Drive Failure Prediction Using Classification and Regression TreesLi, Jing / Ji, Xinpu / Jia, Yuhan / Zhu, Bingpeng / Wang, Gang / Li, Zhongwei / Liu, Xiaoguang et al. | 2014
- 395
-
Developing Correctly Replicated Databases Using Formal ToolsSchiper, Nicolas / Rahli, Vincent / Renesse, Robbert Van / Bickford, Marck / Constable, Robert L. et al. | 2014
- 407
-
The Energy Efficiency of Database Replication ProtocolsSchiper, Nicolas / Pedone, Fernando / Renesse, Robbert Van et al. | 2014
- 419
-
Degraded-First Scheduling for MapReduce in Erasure-Coded Storage ClustersLi, Runhui / Lee, Patrick P.C. / Hu, Yuchong et al. | 2014
- 431
-
Warped-Shield: Tolerating Hard Faults in GPGPUsDweik, Waleed / Majeed, Mohammad Abdel / Annavaram, Murali et al. | 2014
- 443
-
A-ABFT: Autonomous Algorithm-Based Fault Tolerance for Matrix Multiplications on Graphics Processing UnitsBraun, Claus / Halder, Sebastian / Wunderlich, Hans Joachim et al. | 2014
- 455
-
Impact of GPUs Parallelism Management on Safety-Critical and HPC Applications ReliabilityRech, P. / Pilla, L.L. / Navaux, P.O.A. / Carro, L. et al. | 2014
- 467
-
Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous-Reliability MemoryLuo, Yixin / Govindan, Sriram / Sharma, Bikash / Santaniello, Mark / Meza, Justin / Kansal, Aman / Liu, Jie / Khessib, Badriddine / Vaid, Kushagra / Mutlu, Onur et al. | 2014
- 479
-
Ocasta: Clustering Configuration Settings for Error RecoveryHuang, Zhen / Lie, David et al. | 2014
- 491
-
FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual MachineGu, Zhongshu / Saltaformaggio, Brendan / Zhang, Xiangyu / Xu, Dongyan et al. | 2014
- 503
-
Model Checking Stochastic Automata for Dependability and Performance MeasuresBuchholz, Peter / Krige, Jan / Scheftelowitsch, Dimitri et al. | 2014
- 515
-
Scalable Security Models for Assessing Effectiveness of Moving Target DefensesHong, Jin B. / Kim, Dong Seong et al. | 2014
- 527
-
A Novel Variable Ordering Heuristic for BDD-based K-Terminal ReliabilityLe, Minh / Weidendorfer, Josef / Walter, Max et al. | 2014
- 538
-
Adaptive Low-Power Architecture for High-Performance and Reliable Embedded ComputingFerreira, Ronaldo R. / Rolt, Jean da / Nazar, Gabriel L. / Moreira, Alvaro F. / Carro, Luigi et al. | 2014
- 550
-
HV Code: An All-Around MDS Code to Improve Efficiency and Reliability of RAID-6 SystemsShen, Zhirong / Shu, Jiwu et al. | 2014
- 562
-
Replication-Based Fault-Tolerance for Large-Scale Graph ProcessingWang, Peng / Zhang, Kaiyuan / Chen, Rong / Chen, Haibo / Guan, Haibing et al. | 2014
- 574
-
System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection NeedsWu, Rui / Chen, Ping / Liu, Peng / Mao, Bing et al. | 2014
- 586
-
Interoperability between Fingerprint Biometric Systems: An Empirical StudyMason, Stephen / Gashi, Ilir / Lugini, Luca / Marasco, Emanuela / Cukic, Bojan et al. | 2014
- 598
-
DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS TrafficChen, Yizheng / Antonakakis, Manos / Perdisci, Roberto / Nadji, Yacin / Dagon, David / Lee, Wenke et al. | 2014
- 610
-
Lessons Learned from the Analysis of System Failures at Petascale: The Case of Blue WatersMartino, Catello Di / Kalbarczyk, Zbigniew / Iyer, Ravishankar K. / Baccanico, Fabio / Fullop, Joseph / Kramer, William et al. | 2014
- 622
-
GemFI: A Fault Injection Tool for Studying the Behavior of Applications on Unreliable SubstratesParasyris, Konstantinos / Tziantzoulis, Georgios / Antonopoulos, Christos D. / Bellas, Nikolaos et al. | 2014
- 630
-
A Design and Implementation of an Assurance Case LanguageMatsuno, Yutaka et al. | 2014
- 642
-
Recovery for Failures in Rolling Upgrade on CloudsFu, Min / Zhu, Liming / Bass, Len / Liu, Anna et al. | 2014
- 648
-
Crosscheck: Hardening Replicated Multithreaded ServicesMartens, Arthur / Borchert, Christoph / Geissler, Tobias Oliver / Lohmann, Daniel / Spinczyk, Olaf / Kapitza, Rudiger et al. | 2014
- 654
-
NV-Hypervisor: Hypervisor-Based Persistence for Virtual MachinesSartakov, Vasily A. / Kapitza, Rudiger et al. | 2014
- 660
-
A Markov Decision Process Approach for Optimal Data Backup SchedulingXia, Ruofan / Machida, Fumio / Trivedi, Kishor et al. | 2014
- 666
-
Availability Evaluation of Digital Library Cloud ServicesAraujo, Julian / Maciel, Paulo / Torquato, Matheus / Callou, Gustavo / Andrade, Ermeson et al. | 2014
- 672
-
Defects per Million (DPM) Evaluation for a Cloud Dealing with VM Failures Using CheckpointingMondal, Subrota K. / Muppala, Jogesh K. et al. | 2014
- 678
-
Predicting Incident Reports for IT Help DeskAndrews, Anneliese / Lucente, Joseph et al. | 2014
- 684
-
What Vulnerability Do We Need to Patch First?Hong, Jin B. / Kim, Dong Seong / Haqiq, Abdelkrim et al. | 2014
- 690
-
What Logs Should You Look at When an Application Fails? Insights from an Industrial Case StudyCinque, Marcello / Cotroneo, Domenico / Corte, Raffaele Della / Pecchia, Antonio et al. | 2014
- 696
-
Towards a Taxonomy of Cloud Recovery StrategiesFu, Min / Bass, Len / Liu, Anna et al. | 2014
- 702
-
Toward Design Decisions to Enable Deployability: Empirical Study of Three Projects Reaching for the Continuous Delivery Holy GrailBellomo, Stephany / Ernst, Neil / Nord, Robert / Kazman, Rick et al. | 2014
- 708
-
Coarse-Grained Energy Modeling of Rollback/Recovery MechanismsIbtesham, Dewan / DeBonis, David / Arnold, Dorian / Ferreira, Kurt B. et al. | 2014
- 714
-
Grid-Oriented Process Clustering System for Partial Message LoggingJitsumoto, Hideyuki / Todoroki, Yuki / Ishikawa, Yutaka / Sato, Mitsuhisa et al. | 2014
- 720
-
Evaluating the Error Resilience of Parallel ProgramsFang, Bo / Pattabiraman, Karthik / Ripeanu, Matei / Gurumurthi, Sudhanva et al. | 2014
- 726
-
Comparison Criticality in Sorting AlgorithmsJones, Thomas B. / Ackley, David H. et al. | 2014
- 732
-
Radiation Sensitivity of High Performance Computing Applications on Kepler-Based GPGPUsOliveira, Daniel A.G. / Lunardi, Caio B. / Pilla, Laercio L. / Rech, Paolo / Navaux, Philippe O.A. / Carro, Luigi et al. | 2014
- 738
-
HeteroCheckpoint: Efficient Checkpointing for Accelerator-Based SystemsKannan, Sudarsun / Farooqui, Naila / Gavrilovska, Ada / Schwan, Karsten et al. | 2014
- 744
-
Harnessing Unreliable Cores in Heterogeneous Architecture: The PyDac Programming Model and RuntimeHuang, Bin / Sass, Ron / Debardeleben, Nathan / Blanchard, Sean et al. | 2014
- 750
-
Design and Evaluation of FA-MPI, a Transactional Resilience Scheme for Non-blocking MPIHassani, Amin / Skjellum, Anthony / Brightwell, Ron et al. | 2014
- 756
-
Extreme-Scale Viability of Collective Communication for Resilient Task Scheduling and Work StealingWilke, Jeremiah / Bennett, Janine / Kolla, Hemanth / Teranishi, Keita / Slattengren, Nicole / Floren, John et al. | 2014
- 762
-
Distributed Implementation of Wide-Area Monitoring Algorithms for Power Systems Using a US-Wide ExoGENI-WAMS TestbedZhang, Jianhua / Chakrabortty, Aranya / Xin, Yufeng et al. | 2014
- 768
-
Stateful Data Delivery Service for Wide Area Monitoring and Control ApplicationsWu, Yiming / Babazadeh, Davood / Nordstrom, Lars et al. | 2014
- 774
-
Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution SystemsParvania, Masood / Koutsandria, Georgia / Muthukumary, Vishak / Peisert, Sean / McParland, Chuck / Scaglione, Anna et al. | 2014
- 780
-
Towards Secure Metering Data Analysis via Distributed Differential PrivacyLiao, Xiaojing / Formby, David / Day, Carson / Beyah, Raheem A. et al. | 2014
- 786
-
An Integrated Security Framework for GOSS Power Grid Analytics PlatformGibson, Tara / Ciraci, Selim / Sharma, Poorva / Allwardt, Craig / Rice, Mark / Akyol, Bora et al. | 2014
- 792
-
Ironstack: Performance, Stability and Security for Power Grid Data NetworksTeo, Zhiyuan / Kutsenko, Vera / Birman, Ken / Renesse, Robbert Van et al. | 2014
- 798
-
Author index| 2014
- 802
-
[Publisher's information]| 2014
- i
-
[Title page i]| 2014
- iii
-
[Title page iii]| 2014
- iv
-
[Copyright notice]| 2014
- v
-
Table of contents| 2014
- xiv
-
Message from General Chair| 2014
- xvi
-
Message from Program Chairs| 2014
- xvii
-
Organizing Committee| 2014
- xviii
-
Program Committee| 2014
- xx
-
Reviewers| 2014
- xxi
-
DCDV 2014 Workshop Committee| 2014
- xxii
-
DSSO 2014 Workshop Committee| 2014
- xxiii
-
FTXS 2014 Workshop Committee| 2014
- xxiv
-
ToSG 2014 Workshop Committee| 2014
- xxv
-
Sponsors/Conference Support| 2014
- xxvi
-
Keynote| 2014
- xxvii
-
Jean-Claude Laprie Award on Dependable Computing| 2014
- xxviii
-
William C. Carter Award| 2014