DSN A

50 papers

YearTitle / Authors
202252nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022, Baltimore, MD, USA, June 27-30, 2022
2022A Comprehensive, Longitudinal Study of Government DNS Deployment at Global Scale.
Rebekah Houser, Shuai Hao, Chase Cotton, Haining Wang
2022Active-MTSAD: Multivariate Time Series Anomaly Detection With Active Learning.
Wenlu Wang, Pengfei Chen, Yibin Xu, Zilong He
2022Arming IDS Researchers with a Robotic Arm Dataset.
Arpan Gujarati, Zainab Saeed Wattoo, Maryam Raiyat Aliabadi, Sean Clark, Xiaoman Liu, Parisa Shiri, Amee Trivedi, Ruizhe Zhu, Jason Hein, Margo I. Seltzer
2022BFL: a Logic to Reason about Fault Trees.
Stefano M. Nicoletti, Ernst Moritz Hahn, Mariëlle Stoelinga
2022BLAP: Bluetooth Link Key Extraction and Page Blocking Attacks.
Changseok Koh, Jonghoon Kwon, Junbeom Hur
2022Back to the future: N-Versioning of Microservices.
Antonio M. Espinoza, Riley Wood, Stephanie Forrest, Mohit Tiwari
2022Background Buster: Peeking through Virtual Backgrounds in Online Video Calls.
Mohd Sabra, Anindya Maiti, Murtuza Jadliwala
2022CAROL: Confidence-Aware Resilience Model for Edge Federations.
Shreshth Tuli, Giuliano Casale, Nicholas R. Jennings
2022CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs.
Jerome Dinal Herath, Priti Prabhakar Wakodikar, Ping Yang, Guanhua Yan
2022COMET: On-die and In-controller Collaborative Memory ECC Technique for Safer and Stronger Correction of DRAM Errors.
Irina Alam, Puneet Gupta
2022Characterizing and Mitigating Anti-patterns of Alerts in Industrial Cloud Systems.
Tianyi Yang, Jiacheng Shen, Yuxin Su, Xiaoxue Ren, Yongqiang Yang, Michael R. Lyu
2022ComFASE: A Tool for Evaluating the Effects of V2V Communication Faults and Attacks on Automated Vehicles.
Mateen Malik, Mehdi Maleki, Peter Folkesson, Behrooz Sangchoolie, Johan Karlsson
2022Cycle: Sustainable Off-Chain Payment Channel Network with Asynchronous Rebalancing.
Zicong Hong, Song Guo, Rui Zhang, Peng Li, Yufeng Zhan, Wuhui Chen
2022DisTA: Generic Dynamic Taint Tracking for Java-Based Distributed Systems.
Dong Wang, Yu Gao, Wensheng Dou, Jun Wei
2022ERIC: An Efficient and Practical Software Obfuscation Framework.
Alperen Bolat, Seyyid Hikmet Çelik, Ataberk Olgun, Oguz Ergin, Marco Ottavi
2022Exploiting Temporal Data Diversity for Detecting Safety-critical Faults in AV Compute Systems.
Saurabh Jha, Shengkun Cui, Timothy Tsai, Siva Kumar Sastry Hari, Michael B. Sullivan, Zbigniew T. Kalbarczyk, Stephen W. Keckler, Ravishankar K. Iyer
2022Exploiting monotonicity and symmetry for efficient simulation of highly dependable systems.
Hoang Hai Nguyen, Kartik Palani, David M. Nicol
2022False Data Injection Attack Detection for Secure Distributed Demand Response in Smart Grids.
Thusitha Dayaratne, Mahsa Salehi, Carsten Rudolph, Ariel Liebman
2022GoldenEye: A Platform for Evaluating Emerging Numerical Data Formats in DNN Accelerators.
Abdulrahman Mahmoud, Thierry Tambe, Tarek Aloui, David Brooks, Gu-Yeon Wei
2022HDiff: A Semi-automatic Framework for Discovering Semantic Gap Attack in HTTP Implementations.
Kaiwen Shen, Jianyu Lu, Yaru Yang, Jianjun Chen, Mingming Zhang, Haixin Duan, Jia Zhang, Xiaofeng Zheng
2022Hardening In-memory Key-value Stores against ECC-uncorrectable Memory Errors.
Tsuyoshi Shimomura, Hiroshi Yamada
2022How'd Security Benefit Reverse Engineers? : The Implication of Intel CET on Function Identification.
Hyungseok Kim, Junoh Lee, Soomin Kim, Seungil Jung, Sang Kil Cha
2022Invoke-Deobfuscation: AST-Based and Semantics-Preserving Deobfuscation for PowerShell Scripts.
Huajun Chai, Lingyun Ying, Haixin Duan, Daren Zha
2022IoT Phantom-Delay Attacks: Demystifying and Exploiting IoT Timeout Behaviors.
Chenglong Fu, Qiang Zeng, Haotian Chi, Xiaojiang Du, Siva Likitha Valluru
2022KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications.
Yiwei Zhang, Siqi Ma, Juanru Li, Dawu Gu, Elisa Bertino
2022L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing.
Haram Park, Carlos Nkuba Kayembe, Seunghoon Woo, Heejo Lee
2022Marlin: Two-Phase BFT with Linearity.
Xiao Sui, Sisi Duan, Haibin Zhang
2022Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows.
Dinhnguyen Dao, Rhongho Jang, Changhun Jung, David Mohaisen, DaeHun Nyang
2022NEC: Speaker Selective Cancellation via Neural Enhanced Ultrasound Shadowing.
Hanqing Guo, Chenning Li, Lingkun Li, Zhichao Cao, Qiben Yan, Li Xiao
2022On the Price of Locality in Static Fast Rerouting.
Klaus-Tycho Foerster, Juho Hirvonen, Yvonne-Anne Pignolet, Stefan Schmid, Gilles Trédan
2022PassFlow: Guessing Passwords with Generative Flows.
Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi V. Mancini
2022Predicting DRAM-Caused Node Unavailability in Hyper-Scale Clouds.
Pengcheng Zhang, Yunong Wang, Xuhua Ma, Yaoheng Xu, Bin Yao, Xudong Zheng, Linquan Jiang
2022QuFI: a Quantum Fault Injector to Measure the Reliability of Qubits and Quantum Circuits.
Daniel Oliveira, Edoardo Giusto, Emanuele Dri, Nadir Casciola, Betis Baheri, Qiang Guan, Bartolomeo Montrucchio, Paolo Rech
2022RAPMiner: A Generic Anomaly Localization Mechanism for CDN System with Multi-dimensional KPIs.
Chang Liu, Yanwei Liu, Zhen Xu, Liang Dai
2022SAINTDroid: Scalable, Automated Incompatibility Detection for Android.
Bruno Vieira Resende e Silva, Clay Stevens, Niloofar Mansoor, Witawas Srisa-an, Tingting Yu, Hamid Bagheri
2022SEVulDet: A Semantics-Enhanced Learnable Vulnerability Detector.
Zhiquan Tang, Qiao Hu, Yupeng Hu, Wenxin Kuang, Jiongyi Chen
2022SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services.
Ziyi Zhou, Xing Han, Zeyuan Chen, Yuhong Nan, Juanru Li, Dawu Gu
2022STBPU: A Reasonably Secure Branch Prediction Unit.
Tao Zhang, Timothy Lesch, Kenneth Koltermann, Dmitry Evtyushkin
2022Solution Bundles of Markov Performability Models through Adaptive Cross Approximation.
Giulio Masetti, Leonardo Robol, Silvano Chiaradonna, Felicita Di Giandomenico
2022Strategic Safety-Critical Attacks Against an Advanced Driver Assistance System.
Xugui Zhou, Anna Schmedding, Haotian Ren, Lishan Yang, Philip Schowitz, Evgenia Smirni, Homa Alemzadeh
2022The Fault in Our Data Stars: Studying Mitigation Techniques against Faulty Training Data in Machine Learning Applications.
Abraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan
2022The Hazard Value: A Quantitative Network Connectivity Measure Accounting for Failures.
Pieter J. L. Cuijpers, Stefan Schmid, Nicolas Schnepf, Jirí Srba
2022TimeDice: Schedulability-Preserving Priority Inversion for Mitigating Covert Timing Channels Between Real-time Partitions.
Man-Ki Yoon, Jung-Eun Kim, Richard M. Bradford, Zhong Shao
2022Tool: An Efficient and Flexible Simulator for Byzantine Fault-Tolerant Protocols.
Ping-Lun Wang, Tzu-Wei Chao, Chia-Chien Wu, Hsu-Chun Hsiao
2022Torpedo: A Fuzzing Framework for Discovering Adversarial Container Workloads.
Kenton McDonough, Xing Gao, Shuai Wang, Haining Wang
2022Treaty: Secure Distributed Transactions.
Dimitra Giantsidi, Maurice Bailleu, Natacha Crooks, Pramod Bhatotia
2022Understanding RowHammer Under Reduced Wordline Voltage: An Experimental Study Using Real DRAM Devices.
Abdullah Giray Yaglikçi, Haocong Luo, Geraldo F. Oliviera, Ataberk Olgun, Minesh Patel, Jisung Park, Hasan Hassan, Jeremie S. Kim, Lois Orosa, Onur Mutlu
2022WideLeak: How Over-the-Top Platforms Fail in Android.
Gwendal Patat, Mohamed Sabt, Pierre-Alain Fouque
2022ZugChain: Blockchain-Based Juridical Data Recording in Railway Systems.
Signe Rüsch, Kai Bleeke, Ines Messadi, Stefan Schmidt, Andreas Krampf, Katharina Olze, Susanne Stahnke, Robert Schmid, Lukas Pirl, Roland Kittel, Andreas Polze, Marquart Franz, Matthias Müller, Leander Jehl, Rüdiger Kapitza