News Archiv

News Archiv

15.08.2017
Oliver Schwahn et al., IEEE Trans on Dependable and Secure Computing, 2017
How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code
 
18.07.2017
Nicolas Coppik et al., ASE 2017
TrERer: Tracing Error Propagation in Operating System Kernels
 
18.07.2017
Patrick Metzler et al., ASE 2017
Quick Verification of Concurrent Programs by Iteratively Relaxed Scheduling
 
12.12.2016
Hatem Ismail et al., Journal of Computers & Security, 2016
P2P Routing Table Poisoning: A Quorum-based Sanitizing Approach
 
17.06.2016
Patrick Metzler et al., Proc of ATVA, 2016
Efficient Verification of Program Fragments: Eager POR
 
20.04.2016
Rubén Trapero et al., IEEE Security & Privacy Magazine, 2016
Quantifiably Trusting the Cloud: Putting Metrics to Work!
 
02.02.2016 11:13
Ahmed Taha et al., Asia CCS, 2016
Identifying and Utilizing Dependencies Across Cloud Security Services
 
19.01.2016
M. Platania et al., ACM Computing Surveys, 2016
On Choosing Server- or Client-Side Solutions for BFT
 
19.01.2016
D. Saxena et al., Elsevier Computer Science Review Journal, 2016
Named Data Networking: A Survey
 
06.08.2015
Jesus Luna et al., IEEE Trans on Cloud Computing, 2015
Quantitative Reasoning about Cloud Security Using Service Level Agreements
 
23.06.2015
Daniel Germanus et al., Proc of SRDS, 2015
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation
 
17.06.2015
Habib Saissi et al., Symposium on Automated Technology for Verification and Analysis, ATVA 2015
PBMC: Symbolic Slicing for the Verification of Concurrent Programs
 
26.05.2015
Thorsten Piper et al., Proc. of EDCC
On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms
 
12.05.2015
Giancarlo Pellegrino et al., Proc. of USENIX Security Symposium
In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services
 
04.04.2015
Jesus Luna et al., IEEE Cloud Computing
Leveraging the Potential of Cloud Security Service Level Agreements through Standards
 
31.03.2015
A. Ali et al., ACM TOSN
Adaptive Hybrid Compression for Wireless Sensor Networks
 
22.03.2015
Suri gives Distinguished Seminar at Duke/UNC/NSCU for “Triangle Computer Science Distinguished Lecturer Series”
 
25.02.2015
Stefan Winter et al., ICSE/AST 2015
GRINDER: On Reusability of Fault Injection Tools
 
04.02.2015
Thorsten Piper et al., ISORC 2015
Mitigating Timing Error Propagation in Mixed-Criticality Automotive Systems
 
05.01.2015
Stefan Winter et al., ICSE 2015
No PAIN, No Gain? The utility of PArallel fault INjections
 
26.09.2014
Suri PC Chair for 2015 Intl. Conf on Distributed Computing Systems – Fault-Tolerance & Dependability Track
 
26.08.2014
Suri gives distinguished lecture at Washington State Univ
 
26.08.2014
Suri gives Keynote at IEEE DFTS Conference
 
23.08.2014
Suri et al, IEEE Trans. Cloud Computing, 2014 …
Run Time Application Repartitioning in Dynamic Mobile Cloud Environments
 
22.08.2014
Suri et al., IEEE Trans on PDS, 2014
A Lease based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking
 
19.08.2014
Rubén Trapero et al., IEEE Security & Privacy Magazine, 2014
Blended Identity: Pervasive IdM for Continuous Authentication
 
16.06.2014
Daniel Germanus et al., Proc. of CNS, 2014
Mitigating Eclipse Attacks in Peer-to-Peer Networks
 
16.06.2014
Anna Lanzaro et al., Proc. of ISSTA, 2014
An Empirical Study of Injected versus Actual Interface Errors
 
29.07.2013
Dan Dobre et al., Proc. of ACM CCS, 2013
PoWerStore: Proofs of Writing for Efficient and Robust Storage
 
20.07.2013
Mohammadreza Mahmudimanesh et al., Proc. of DCOSS, 2014
Efficient Agile Sink Selection in Wireless Sensor Networks based on Compressed Sensing
 
18.07.2013
Daniel Germanus et al., Proc. of SmartGridComm, 2013
Coral: Reliable and Low-latency P2P Convergecast for Critical Sensor Data Collection
 
21.06.2013
Habib Saissi et al., Proc. of SRDS, 2013
Efficient Verification of Distributed Protocols Using Stateful Model Checking
 
27.02.2013
Stefan Winter et al., Proc. of DSN-DCCS, 2013
simFI: From single to simultaneous software fault injections