| 2018 | 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018, Luxembourg City, Luxembourg, June 25-28, 2018 |
| 2018 | A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform. João Sousa, Alysson Bessani, Marko Vukolic |
| 2018 | A Framework for Evaluating Software on Reduced Margins Hardware. Konstantinos Parasyris, Panos K. Koutsovasilis, Vassilis Vassiliadis, Christos D. Antonopoulos, Nikolaos Bellas, Spyros Lalis |
| 2018 | A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly. Baojun Liu, Chaoyi Lu, Zhou Li, Ying Liu, Hai-Xin Duan, Shuang Hao, Zaifeng Zhang |
| 2018 | Algorithmic Attack Synthesis Using Hybrid Dynamics of Power Grid Critical Infrastructures. Zhenqi Huang, Sriharsha Etigowni, Luis Garcia, Sayan Mitra, Saman A. Zonouz |
| 2018 | Alpha Entanglement Codes: Practical Erasure Codes to Archive Data in Unreliable Environments. Vero Estrada-Galiñanes, Ethan L. Miller, Pascal Felber, Jehan-François Pâris |
| 2018 | Branching Bisimulation and Concurrent Object Verification. Xiaoxiao Yang, Joost-Pieter Katoen, Huimin Lin, Gaoang Liu, Hao Wu |
| 2018 | Byzantine Fault-Tolerant Atomic Multicast. Paulo R. Coelho, Tarcisio Ceolin Junior, Alysson Bessani, Fernando Luís Dotti, Fernando Pedone |
| 2018 | Code-Dependent and Architecture-Dependent Reliability Behaviors. Vinicius Fratin, Daniel Oliveira, Caio B. Lunardi, Fernando Santos, Gennaro Severino Rodrigues, Paolo Rech |
| 2018 | Collaborative Filtering Under a Sybil Attack: Similarity Metrics do Matter! Antoine Boutet, Florestan De Moor, Davide Frey, Rachid Guerraoui, Anne-Marie Kermarrec, Antoine Rault |
| 2018 | Cost-Benefit Analysis of Moving-Target Defense in Power Grids. Subhash Lakshminarayana, David K. Y. Yau |
| 2018 | DAVOS: EDA Toolkit for Dependability Assessment, Verification, Optimisation and Selection of Hardware Models. Ilya Tuzov, David de Andrés, Juan Carlos Ruiz |
| 2018 | DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware. Kai Cheng, Qiang Li, Lei Wang, Qian Chen, Yaowen Zheng, Limin Sun, Zhenkai Liang |
| 2018 | Deceptive Secret Sharing. Lei Zhang, Douglas M. Blough |
| 2018 | Detecting and Identifying Faulty IoT Devices in Smart Home with Context Extraction. Jiwon Choi, Hayoung Jeoung, Jihun Kim, Youngjoo Ko, Wonup Jung, Hanjun Kim, Jong Kim |
| 2018 | DexLego: Reassembleable Bytecode Extraction for Aiding Static Analysis. Zhenyu Ning, Fengwei Zhang |
| 2018 | Divide and Conquer for Fast SRLG Disjoint Routing. Kun Xie, Heng Tao, Xin Wang, Gaogang Xie, Jigang Wen, Jiannong Cao, Zheng Qin |
| 2018 | Effective Topology Tampering Attacks and Defenses in Software-Defined Networks. Richard Skowyra, Lei Xu, Guofei Gu, Veer Dedhia, Thomas Hobson, Hamed Okhravi, James Landry |
| 2018 | Efficient Transient Analysis of a Class of Compositional Fluid Stochastic Petri Nets. Peter Buchholz, Tugrul Dayar |
| 2018 | EndBox: Scalable Middlebox Functions Using Client-Side Trusted Execution. David Goltzsche, Signe Rüsch, Manuel Nieke, Sébastien Vaucher, Nico Weichbrodt, Valerio Schiavoni, Pierre-Louis Aublin, Paolo Costa, Christof Fetzer, Pascal Felber, Peter R. Pietzuch, Rüdiger Kapitza |
| 2018 | Evaluating Self-Adaptive Authorisation Infrastructures Through Gamification. Christopher Michael Bailey, Rogério de Lemos |
| 2018 | FAROS: Illuminating In-memory Injection Attacks via Provenance-Based Whole-System Dynamic Information Flow Tracking. Meisam Navaki Arefi, Geoffrey Alexander, Hooman Rokham, Aokun Chen, Michalis Faloutsos, Xuetao Wei, Daniela Seabra Oliveira, Jedidiah R. Crandall |
| 2018 | Falcon: A Practical Log-Based Analysis Tool for Distributed Systems. Francisco Neves, Nuno Machado, José Pereira |
| 2018 | Fast Hypervisor Recovery Without Reboot. Diyu Zhou, Yuval Tamir |
| 2018 | FragDroid: Automated User Interface Interaction with Activity and Fragment Analysis in Android Applications. Jia Chen, Ge Han, Shanqing Guo, Wenrui Diao |
| 2018 | Generating Cloud Monitors from Models to Secure Clouds. Elena Troubitsyna, Irum Rauf |
| 2018 | Hands Off the Wheel in Autonomous Vehicles?: A Systems Perspective on over a Million Miles of Field Data. Subho S. Banerjee, Saurabh Jha, James Cyriac, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer |
| 2018 | How Reliable is My Wearable: A Fuzz Testing-Based Study. Edgardo Barsallo Yi, Amiya Maji, Saurabh Bagchi |
| 2018 | IBBE-SGX: Cryptographic Group Access Control Using Trusted Execution Environments. Stefan Contiu, Rafael Pires, Sébastien Vaucher, Marcelo Pasin, Pascal Felber, Laurent Réveillère |
| 2018 | Impact of Software Approximations on the Resiliency of a Video Summarization System. Radha Venkatagiri, Karthik Swaminathan, Chung-Ching Lin, Liang Wang, Alper Buyuktosunoglu, Pradip Bose, Sarita V. Adve |
| 2018 | Importance Sampling of Interval Markov Chains. Cyrille Jégourel, Jingyi Wang, Jun Sun |
| 2018 | In Production Performance Testing of SDN Control Plane for Telecom Operators. Catello Di Martino, Ugo Giordano, Nishok Mohanasamy, Stefano Russo, Marina Thottan |
| 2018 | Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective. Sadegh Torabi, Elias Bou-Harb, Chadi Assi, Mario Galluscio, Amine Boukhtouta, Mourad Debbabi |
| 2018 | Localizing Function Errors in Mobile Apps with User Reviews. Le Yu, Jiachi Chen, Hao Zhou, Xiapu Luo, Kang Liu |
| 2018 | Low Overhead Tag Error Mitigation for GPU Architectures. Atieh Lotfi, Nirmal R. Saxena, Richard Bramley, Paul Racunas, Philip P. Shirvani |
| 2018 | Machine Learning Models for GPU Error Prediction in a Large Scale HPC System. Bin Nie, Ji Xue, Saurabh Gupta, Tirthak Patel, Christian Engelmann, Evgenia Smirni, Devesh Tiwari |
| 2018 | Manufacturing Resilient Bi-Opaque Predicates Against Symbolic Execution. Hui Xu, Yangfan Zhou, Yu Kang, Fengzhi Tu, Michael R. Lyu |
| 2018 | Measuring IPv6 DNS Reconnaissance Attacks and Preventing Them Using DNS Guard. Qinwen Hu, Muhammad Rizwan Asghar, Nevil Brownlee |
| 2018 | Migrating SGX Enclaves with Persistent State. Fritz Alder, Arseny Kurnikov, Andrew Paverd, N. Asokan |
| 2018 | MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices. Bing Chang, Fengwei Zhang, Bo Chen, Yingjiu Li, Wen Tao Zhu, Yangguang Tian, Zhan Wang, Albert Ching |
| 2018 | Modeling Input-Dependent Error Propagation in Programs. Guanpeng Li, Karthik Pattabiraman |
| 2018 | Modeling Soft-Error Propagation in Programs. Guanpeng Li, Karthik Pattabiraman, Siva Kumar Sastry Hari, Michael B. Sullivan, Timothy Tsai |
| 2018 | Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid. Amy Babay, Thomas Tantillo, Trevor Aron, Marco Platania, Yair Amir |
| 2018 | OWL: Understanding and Detecting Concurrency Attacks. Shixiong Zhao, Rui Gu, Haoran Qiu, Tsz On Li, Yuexuan Wang, Heming Cui, Junfeng Yang |
| 2018 | Obfuscated VBA Macro Detection Using Machine Learning. Sangwoo Kim, Seokmyung Hong, Jaesang Oh, Heejo Lee |
| 2018 | On the Challenges of Building a BFT SCADA. André Nogueira, Miguel Garcia, Alysson Bessani, Nuno Neves |
| 2018 | POWERALERT: Integrity Checking Using Power Measurement and a Game-Theoretic Strategy. Ahmed M. Fawaz, Mohammad A. Noureddine, William H. Sanders |
| 2018 | Parallel Error Detection Using Heterogeneous Cores. Sam Ainsworth, Timothy M. Jones |
| 2018 | Pleiades: Distributed Structural Invariants at Scale. Simon Bouget, Yérom-David Bromberg, Adrien Luxey, François Taïani |
| 2018 | Practical Experience: Methodologies for Measuring Route Origin Validation. Tomas Hlavacek, Amir Herzberg, Haya Schulmann, Michael Waidner |
| 2018 | PreInfer: Automatic Inference of Preconditions via Symbolic Analysis. Angello Astorga, Siwakorn Srisakaokul, Xusheng Xiao, Tao Xie |
| 2018 | RDMC: A Reliable RDMA Multicast for Large Objects. Jonathan Behrens, Sagar Jha, Ken Birman, Edward Tremel |
| 2018 | RECAST: Random Entanglement for Censorship-Resistant Archival STorage. Roberta Barbi, Dorian Burihabwa, Pascal Felber, Hugues Mercier, Valerio Schiavoni |
| 2018 | RoboADS: Anomaly Detection Against Sensor and Actuator Misbehaviors in Mobile Robots. Pinyao Guo, Hunmin Kim, Nurali Virani, Jun Xu, Minghui Zhu, Peng Liu |
| 2018 | Shiraz: Exploiting System Reliability and Application Resilience Characteristics to Improve Large Scale System Throughput. Rohan Garg, Tirthak Patel, Gene Cooperman, Devesh Tiwari |
| 2018 | Specification-Based Protocol Obfuscation. Julien Duchêne, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Colas Le Guernic |
| 2018 | The Tortoise and the Hare: Characterizing Synchrony in Distributed Environments (Practical Experience Report). Daniel Porto, João Leitão, Flavio Junqueira, Rodrigo Rodrigues |
| 2018 | To Detect Stack Buffer Overflow with Polymorphic Canaries. Zhilong Wang, Xuhua Ding, Chengbin Pang, Jian Guo, Jun Zhu, Bing Mao |
| 2018 | Troxy: Transparent Access to Byzantine Fault-Tolerant Systems. Bijun Li, Nico Weichbrodt, Johannes Behl, Pierre-Louis Aublin, Tobias Distler, Rüdiger Kapitza |
| 2018 | Understanding and Analyzing Interconnect Errors and Network Congestion on a Large Scale HPC System. Mohit Kumar, Saurabh Gupta, Tirthak Patel, Michael Wilder, Weisong Shi, Song Fu, Christian Engelmann, Devesh Tiwari |
| 2018 | Wren: Nonblocking Reads in a Partitioned Transactional Causally Consistent Data Store. Kristina Spirovska, Diego Didona, Willy Zwaenepoel |
| 2018 | Your Remnant Tells Secret: Residual Resolution in DDoS Protection Services. Lin Jin, Shuai Hao, Haining Wang, Chase Cotton |
| 2018 | ZOE: Content-Based Anomaly Detection for Industrial Control Systems. Christian Wressnegger, Ansgar Kellner, Konrad Rieck |