| 2017 | 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017, Denver, CO, USA, June 26-29, 2017 |
| 2017 | ATTAIN: An Attack Injection Framework for Software-Defined Networking. Benjamin E. Ujcich, Uttam Thakore, William H. Sanders |
| 2017 | Agora: A Dependable High-Performance Coordination Service for Multi-cores. Rainer Schiekofer, Johannes Behl, Tobias Distler |
| 2017 | Analysing Selfishness Flooding with SEINE. Guido Lena Cota, Sonia Ben Mokhtar, Gabriele Gianini, Ernesto Damiani, Julia Lawall, Gilles Muller, Lionel Brunie |
| 2017 | Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs. Md. Endadul Hoque, Omar Chowdhury, Sze Yiu Chau, Cristina Nita-Rotaru, Ninghui Li |
| 2017 | Athena: A Framework for Scalable Anomaly Detection in Software-Defined Networks. Seunghyeon Lee, Jinwoo Kim, Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran |
| 2017 | Compromising Security of Economic Dispatch in Power System Operations. Devendra Shelar, Pengfei Sun, Saurabh Amin, Saman A. Zonouz |
| 2017 | Concolic Execution on Small-Size Binaries: Challenges and Empirical Study. Hui Xu, Yangfan Zhou, Yu Kang, Michael R. Lyu |
| 2017 | ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds. Xing Gao, Zhongshu Gu, Mehmet Kayaalp, Dimitrios Pendarakis, Haining Wang |
| 2017 | Counting in the Dark: DNS Caches Discovery and Enumeration in the Internet. Amit Klein, Haya Schulmann, Michael Waidner |
| 2017 | Deadline-Aware Multipath Communication: An Optimization Problem. Laurent Chuat, Adrian Perrig, Yih-Chun Hu |
| 2017 | Demonstrating a Tool for Injection Attack Prevention in MySQL. Iberia Medeiros, Miguel Beatriz, Nuno Ferreira Neves, Miguel Correia |
| 2017 | Dependability-Aware Design Space Exploration for Optimal Synthesis Parameters Tuning. Ilya Tuzov, David de Andrés, Juan Carlos Ruiz |
| 2017 | Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency. Daiping Liu, Xing Gao, Mingwei Zhang, Haining Wang, Angelos Stavrou |
| 2017 | DyDroid: Measuring Dynamic Code Loading and Its Security Implications in Android Applications. Zhengyang Qu, Shahid Alam, Yan Chen, Xiaoyong Zhou, Wangjun Hong, Ryan D. Riley |
| 2017 | DynaMiner: Leveraging Offline Infection Analytics for On-the-Wire Malware Detection. Birhanu Eshete, V. N. Venkatakrishnan |
| 2017 | Entropy-Based Security Analytics: Measurements from a Critical Information System. Marcello Cinque, Raffaele Della Corte, Antonio Pecchia |
| 2017 | Exploring the Long Tail of (Malicious) Software Downloads. Babak Rahbarinia, Marco Balduzzi, Roberto Perdisci |
| 2017 | Exploring the Potential for Collaborative Data Compression and Hard-Error Tolerance in PCM Memories. Amin Jadidi, Mohammad Arjomand, Mohammad Khavari Tavana, David R. Kaeli, Mahmut T. Kandemir, Chita R. Das |
| 2017 | Fast Atomic Multicast. Paulo R. Coelho, Nicolas Schiper, Fernando Pedone |
| 2017 | Fex: A Software Systems Evaluator. Oleksii Oleksenko, Dmitrii Kuvaiskii, Pramod Bhatotia, Christof Fetzer |
| 2017 | Function Interface Analysis: A Principled Approach for Function Recognition in COTS Binaries. Rui Qiao, R. Sekar |
| 2017 | Ghost Installer in the Shadow: Security Analysis of App Installation on Android. Yeonjoon Lee, Tongxin Li, Nan Zhang, Soteris Demetriou, Mingming Zha, Xiaofeng Wang, Kai Chen, Xiao-yong Zhou, Xinhui Han, Michael Grace |
| 2017 | I Know Nothing about You But Here is What You Might Like. Rachid Guerraoui, Anne-Marie Kermarrec, Rhicheek Patra, Mahammad Valiyev, Jingjing Wang |
| 2017 | IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZone. Chen Tian, Yazhe Wang, Peng Liu, Qihui Zhou, Chengyi Zhang, Zhen Xu |
| 2017 | Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning. Wei-Han Lee, Ruby B. Lee |
| 2017 | Information Leakage in Encrypted Deduplication via Frequency Analysis. Jingwei Li, Chuan Qin, Patrick P. C. Lee, Xiaosong Zhang |
| 2017 | JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android. Yacong Gu, Kun Sun, Purui Su, Qi Li, Yemian Lu, Lingyun Ying, Dengguo Feng |
| 2017 | JMake: Dependable Compilation for Kernel Janitors. Julia Lawall, Gilles Muller |
| 2017 | Load-Optimal Local Fast Rerouting for Resilient Networks. Yvonne-Anne Pignolet, Stefan Schmid, Gilles Trédan |
| 2017 | Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks. Cheng Feng, Tingting Li, Deeph Chana |
| 2017 | Multimodal Indexable Encryption for Mobile Cloud-Based Applications. Bernardo Ferreira, João Leitão, Henrique João L. Domingos |
| 2017 | One Bit is (Not) Enough: An Empirical Study of the Impact of Single and Multiple Bit-Flip Errors. Behrooz Sangchoolie, Karthik Pattabiraman, Johan Karlsson |
| 2017 | Privacy Disclosure through Smart Meters: Reactive Power Based Attack and Defense. Jingyao Fan, Qinghua Li, Guohong Cao |
| 2017 | REMAX: Reachability-Maximizing P2P Detection of Erroneous Readings in Wireless Sensor Networks. Varun Badrinath Krishna, Michael J. Rausch, Benjamin E. Ujcich, Indranil Gupta, William H. Sanders |
| 2017 | RL-BLH: Learning-Based Battery Control for Cost Savings and Privacy Preservation for Smart Meters. Jinkyu Koo, Xiaojun Lin, Saurabh Bagchi |
| 2017 | Random Walk Based Fake Account Detection in Online Social Networks. Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong |
| 2017 | Reducing the "Tax" of Reliability: A Hardware-Aware Method for Agile Data Persistence in Mobile Devices. Meng Wang, Huixiang Chen, Tao Li |
| 2017 | Regular: Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles. Daniel D. Dunn, Samuel A. Mitchell, Imran Sajjad, Ryan M. Gerdes, Rajnikant Sharma, Ming Li |
| 2017 | Rollback and Forking Detection for Trusted Execution Environments Using Lightweight Collective Memory. Marcus Brandenburger, Christian Cachin, Matthias Lorenz, Rüdiger Kapitza |
| 2017 | Secure Causal Atomic Broadcast, Revisited. Sisi Duan, Michael K. Reiter, Haibin Zhang |
| 2017 | Secure Live Migration of SGX Enclaves on Untrusted Cloud. Jinyu Gu, Zhichao Hua, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan, Jinming Li |
| 2017 | Secure Tera-scale Data Crunching with a Small TCB. Bruno Vavala, Nuno Ferreira Neves, Peter Steenkiste |
| 2017 | Sensor-Based Implicit Authentication of Smartphone Users. Wei-Han Lee, Ruby B. Lee |
| 2017 | Smart Maintenance via Dynamic Fault Tree Analysis: A Case Study on Singapore MRT System. Yan Liu, Yue Wu, Zbigniew Kalbarczyk |
| 2017 | Speeding up Consensus by Chasing Fast Decisions. Balaji Arun, Sebastiano Peluso, Roberto Palmieri, Giuliano Losa, Binoy Ravindran |
| 2017 | StatSym: Vulnerable Path Discovery through Statistics-Guided Symbolic Execution. Fan Yao, Yongbo Li, Yurong Chen, Hongfa Xue, Tian Lan, Guru Venkataramani |
| 2017 | Statistical Model Checking for Hybrid Petri Nets with Multiple General Transitions. Carina Pilch, Anne Remke |
| 2017 | The Balance Attack or Why Forkable Blockchains are Ill-Suited for Consortium. Christopher Natoli, Vincent Gramoli |
| 2017 | Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables. Benjamin Kollenda, Enes Göktas, Tim Blazytko, Philipp Koppe, Robert Gawlik, Radhesh Krishnan Konoth, Cristiano Giuffrida, Herbert Bos, Thorsten Holz |
| 2017 | Towards Secure and Verifiable Database-Driven Spectrum Sharing. Zhili Chen, Lin Chen, Hong Zhong |
| 2017 | Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs. Yuan Yao, Bin Xiao, Gaofei Wu, Xue Liu, Zhiwen Yu, Kailong Zhang, Xingshe Zhou |
| 2017 | What Can We Learn from Four Years of Data Center Hardware Failures? Guosai Wang, Lifei Zhang, Wei Xu |
| 2017 | What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon. Ping Chen, Jun Xu, Zhisheng Hu, Xinyu Xing, Minghui Zhu, Bing Mao, Peng Liu |
| 2017 | Zipr: Efficient Static Binary Rewriting for Security. William H. Hawkins, Jason D. Hiser, Michele Co, Anh Nguyen-Tuong, Jack W. Davidson |
| 2017 | pbSE: Phase-Based Symbolic Execution. Qixue Xiao, Yu Chen, Chengang Wu, Kang Li, Junjie Mao, Shize Guo, Yuanchun Shi |