DSN A

56 papers

YearTitle / Authors
201747th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017, Denver, CO, USA, June 26-29, 2017
2017ATTAIN: An Attack Injection Framework for Software-Defined Networking.
Benjamin E. Ujcich, Uttam Thakore, William H. Sanders
2017Agora: A Dependable High-Performance Coordination Service for Multi-cores.
Rainer Schiekofer, Johannes Behl, Tobias Distler
2017Analysing Selfishness Flooding with SEINE.
Guido Lena Cota, Sonia Ben Mokhtar, Gabriele Gianini, Ernesto Damiani, Julia Lawall, Gilles Muller, Lionel Brunie
2017Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs.
Md. Endadul Hoque, Omar Chowdhury, Sze Yiu Chau, Cristina Nita-Rotaru, Ninghui Li
2017Athena: A Framework for Scalable Anomaly Detection in Software-Defined Networks.
Seunghyeon Lee, Jinwoo Kim, Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran
2017Compromising Security of Economic Dispatch in Power System Operations.
Devendra Shelar, Pengfei Sun, Saurabh Amin, Saman A. Zonouz
2017Concolic Execution on Small-Size Binaries: Challenges and Empirical Study.
Hui Xu, Yangfan Zhou, Yu Kang, Michael R. Lyu
2017ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds.
Xing Gao, Zhongshu Gu, Mehmet Kayaalp, Dimitrios Pendarakis, Haining Wang
2017Counting in the Dark: DNS Caches Discovery and Enumeration in the Internet.
Amit Klein, Haya Schulmann, Michael Waidner
2017Deadline-Aware Multipath Communication: An Optimization Problem.
Laurent Chuat, Adrian Perrig, Yih-Chun Hu
2017Demonstrating a Tool for Injection Attack Prevention in MySQL.
Iberia Medeiros, Miguel Beatriz, Nuno Ferreira Neves, Miguel Correia
2017Dependability-Aware Design Space Exploration for Optimal Synthesis Parameters Tuning.
Ilya Tuzov, David de Andrés, Juan Carlos Ruiz
2017Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency.
Daiping Liu, Xing Gao, Mingwei Zhang, Haining Wang, Angelos Stavrou
2017DyDroid: Measuring Dynamic Code Loading and Its Security Implications in Android Applications.
Zhengyang Qu, Shahid Alam, Yan Chen, Xiaoyong Zhou, Wangjun Hong, Ryan D. Riley
2017DynaMiner: Leveraging Offline Infection Analytics for On-the-Wire Malware Detection.
Birhanu Eshete, V. N. Venkatakrishnan
2017Entropy-Based Security Analytics: Measurements from a Critical Information System.
Marcello Cinque, Raffaele Della Corte, Antonio Pecchia
2017Exploring the Long Tail of (Malicious) Software Downloads.
Babak Rahbarinia, Marco Balduzzi, Roberto Perdisci
2017Exploring the Potential for Collaborative Data Compression and Hard-Error Tolerance in PCM Memories.
Amin Jadidi, Mohammad Arjomand, Mohammad Khavari Tavana, David R. Kaeli, Mahmut T. Kandemir, Chita R. Das
2017Fast Atomic Multicast.
Paulo R. Coelho, Nicolas Schiper, Fernando Pedone
2017Fex: A Software Systems Evaluator.
Oleksii Oleksenko, Dmitrii Kuvaiskii, Pramod Bhatotia, Christof Fetzer
2017Function Interface Analysis: A Principled Approach for Function Recognition in COTS Binaries.
Rui Qiao, R. Sekar
2017Ghost Installer in the Shadow: Security Analysis of App Installation on Android.
Yeonjoon Lee, Tongxin Li, Nan Zhang, Soteris Demetriou, Mingming Zha, Xiaofeng Wang, Kai Chen, Xiao-yong Zhou, Xinhui Han, Michael Grace
2017I Know Nothing about You But Here is What You Might Like.
Rachid Guerraoui, Anne-Marie Kermarrec, Rhicheek Patra, Mahammad Valiyev, Jingjing Wang
2017IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZone.
Chen Tian, Yazhe Wang, Peng Liu, Qihui Zhou, Chengyi Zhang, Zhen Xu
2017Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning.
Wei-Han Lee, Ruby B. Lee
2017Information Leakage in Encrypted Deduplication via Frequency Analysis.
Jingwei Li, Chuan Qin, Patrick P. C. Lee, Xiaosong Zhang
2017JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android.
Yacong Gu, Kun Sun, Purui Su, Qi Li, Yemian Lu, Lingyun Ying, Dengguo Feng
2017JMake: Dependable Compilation for Kernel Janitors.
Julia Lawall, Gilles Muller
2017Load-Optimal Local Fast Rerouting for Resilient Networks.
Yvonne-Anne Pignolet, Stefan Schmid, Gilles Trédan
2017Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks.
Cheng Feng, Tingting Li, Deeph Chana
2017Multimodal Indexable Encryption for Mobile Cloud-Based Applications.
Bernardo Ferreira, João Leitão, Henrique João L. Domingos
2017One Bit is (Not) Enough: An Empirical Study of the Impact of Single and Multiple Bit-Flip Errors.
Behrooz Sangchoolie, Karthik Pattabiraman, Johan Karlsson
2017Privacy Disclosure through Smart Meters: Reactive Power Based Attack and Defense.
Jingyao Fan, Qinghua Li, Guohong Cao
2017REMAX: Reachability-Maximizing P2P Detection of Erroneous Readings in Wireless Sensor Networks.
Varun Badrinath Krishna, Michael J. Rausch, Benjamin E. Ujcich, Indranil Gupta, William H. Sanders
2017RL-BLH: Learning-Based Battery Control for Cost Savings and Privacy Preservation for Smart Meters.
Jinkyu Koo, Xiaojun Lin, Saurabh Bagchi
2017Random Walk Based Fake Account Detection in Online Social Networks.
Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong
2017Reducing the "Tax" of Reliability: A Hardware-Aware Method for Agile Data Persistence in Mobile Devices.
Meng Wang, Huixiang Chen, Tao Li
2017Regular: Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles.
Daniel D. Dunn, Samuel A. Mitchell, Imran Sajjad, Ryan M. Gerdes, Rajnikant Sharma, Ming Li
2017Rollback and Forking Detection for Trusted Execution Environments Using Lightweight Collective Memory.
Marcus Brandenburger, Christian Cachin, Matthias Lorenz, Rüdiger Kapitza
2017Secure Causal Atomic Broadcast, Revisited.
Sisi Duan, Michael K. Reiter, Haibin Zhang
2017Secure Live Migration of SGX Enclaves on Untrusted Cloud.
Jinyu Gu, Zhichao Hua, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan, Jinming Li
2017Secure Tera-scale Data Crunching with a Small TCB.
Bruno Vavala, Nuno Ferreira Neves, Peter Steenkiste
2017Sensor-Based Implicit Authentication of Smartphone Users.
Wei-Han Lee, Ruby B. Lee
2017Smart Maintenance via Dynamic Fault Tree Analysis: A Case Study on Singapore MRT System.
Yan Liu, Yue Wu, Zbigniew Kalbarczyk
2017Speeding up Consensus by Chasing Fast Decisions.
Balaji Arun, Sebastiano Peluso, Roberto Palmieri, Giuliano Losa, Binoy Ravindran
2017StatSym: Vulnerable Path Discovery through Statistics-Guided Symbolic Execution.
Fan Yao, Yongbo Li, Yurong Chen, Hongfa Xue, Tian Lan, Guru Venkataramani
2017Statistical Model Checking for Hybrid Petri Nets with Multiple General Transitions.
Carina Pilch, Anne Remke
2017The Balance Attack or Why Forkable Blockchains are Ill-Suited for Consortium.
Christopher Natoli, Vincent Gramoli
2017Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables.
Benjamin Kollenda, Enes Göktas, Tim Blazytko, Philipp Koppe, Robert Gawlik, Radhesh Krishnan Konoth, Cristiano Giuffrida, Herbert Bos, Thorsten Holz
2017Towards Secure and Verifiable Database-Driven Spectrum Sharing.
Zhili Chen, Lin Chen, Hong Zhong
2017Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs.
Yuan Yao, Bin Xiao, Gaofei Wu, Xue Liu, Zhiwen Yu, Kailong Zhang, Xingshe Zhou
2017What Can We Learn from Four Years of Data Center Hardware Failures?
Guosai Wang, Lifei Zhang, Wei Xu
2017What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon.
Ping Chen, Jun Xu, Zhisheng Hu, Xinyu Xing, Minghui Zhu, Bing Mao, Peng Liu
2017Zipr: Efficient Static Binary Rewriting for Security.
William H. Hawkins, Jason D. Hiser, Michele Co, Anh Nguyen-Tuong, Jack W. Davidson
2017pbSE: Phase-Based Symbolic Execution.
Qixue Xiao, Yu Chen, Chengang Wu, Kang Li, Junjie Mao, Shize Guo, Yuanchun Shi