| 2022 | 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022, Baltimore, MD, USA, June 27-30, 2022 |
| 2022 | A Comprehensive, Longitudinal Study of Government DNS Deployment at Global Scale. Rebekah Houser, Shuai Hao, Chase Cotton, Haining Wang |
| 2022 | Active-MTSAD: Multivariate Time Series Anomaly Detection With Active Learning. Wenlu Wang, Pengfei Chen, Yibin Xu, Zilong He |
| 2022 | Arming IDS Researchers with a Robotic Arm Dataset. Arpan Gujarati, Zainab Saeed Wattoo, Maryam Raiyat Aliabadi, Sean Clark, Xiaoman Liu, Parisa Shiri, Amee Trivedi, Ruizhe Zhu, Jason Hein, Margo I. Seltzer |
| 2022 | BFL: a Logic to Reason about Fault Trees. Stefano M. Nicoletti, Ernst Moritz Hahn, Mariëlle Stoelinga |
| 2022 | BLAP: Bluetooth Link Key Extraction and Page Blocking Attacks. Changseok Koh, Jonghoon Kwon, Junbeom Hur |
| 2022 | Back to the future: N-Versioning of Microservices. Antonio M. Espinoza, Riley Wood, Stephanie Forrest, Mohit Tiwari |
| 2022 | Background Buster: Peeking through Virtual Backgrounds in Online Video Calls. Mohd Sabra, Anindya Maiti, Murtuza Jadliwala |
| 2022 | CAROL: Confidence-Aware Resilience Model for Edge Federations. Shreshth Tuli, Giuliano Casale, Nicholas R. Jennings |
| 2022 | CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs. Jerome Dinal Herath, Priti Prabhakar Wakodikar, Ping Yang, Guanhua Yan |
| 2022 | COMET: On-die and In-controller Collaborative Memory ECC Technique for Safer and Stronger Correction of DRAM Errors. Irina Alam, Puneet Gupta |
| 2022 | Characterizing and Mitigating Anti-patterns of Alerts in Industrial Cloud Systems. Tianyi Yang, Jiacheng Shen, Yuxin Su, Xiaoxue Ren, Yongqiang Yang, Michael R. Lyu |
| 2022 | ComFASE: A Tool for Evaluating the Effects of V2V Communication Faults and Attacks on Automated Vehicles. Mateen Malik, Mehdi Maleki, Peter Folkesson, Behrooz Sangchoolie, Johan Karlsson |
| 2022 | Cycle: Sustainable Off-Chain Payment Channel Network with Asynchronous Rebalancing. Zicong Hong, Song Guo, Rui Zhang, Peng Li, Yufeng Zhan, Wuhui Chen |
| 2022 | DisTA: Generic Dynamic Taint Tracking for Java-Based Distributed Systems. Dong Wang, Yu Gao, Wensheng Dou, Jun Wei |
| 2022 | ERIC: An Efficient and Practical Software Obfuscation Framework. Alperen Bolat, Seyyid Hikmet Çelik, Ataberk Olgun, Oguz Ergin, Marco Ottavi |
| 2022 | Exploiting Temporal Data Diversity for Detecting Safety-critical Faults in AV Compute Systems. Saurabh Jha, Shengkun Cui, Timothy Tsai, Siva Kumar Sastry Hari, Michael B. Sullivan, Zbigniew T. Kalbarczyk, Stephen W. Keckler, Ravishankar K. Iyer |
| 2022 | Exploiting monotonicity and symmetry for efficient simulation of highly dependable systems. Hoang Hai Nguyen, Kartik Palani, David M. Nicol |
| 2022 | False Data Injection Attack Detection for Secure Distributed Demand Response in Smart Grids. Thusitha Dayaratne, Mahsa Salehi, Carsten Rudolph, Ariel Liebman |
| 2022 | GoldenEye: A Platform for Evaluating Emerging Numerical Data Formats in DNN Accelerators. Abdulrahman Mahmoud, Thierry Tambe, Tarek Aloui, David Brooks, Gu-Yeon Wei |
| 2022 | HDiff: A Semi-automatic Framework for Discovering Semantic Gap Attack in HTTP Implementations. Kaiwen Shen, Jianyu Lu, Yaru Yang, Jianjun Chen, Mingming Zhang, Haixin Duan, Jia Zhang, Xiaofeng Zheng |
| 2022 | Hardening In-memory Key-value Stores against ECC-uncorrectable Memory Errors. Tsuyoshi Shimomura, Hiroshi Yamada |
| 2022 | How'd Security Benefit Reverse Engineers? : The Implication of Intel CET on Function Identification. Hyungseok Kim, Junoh Lee, Soomin Kim, Seungil Jung, Sang Kil Cha |
| 2022 | Invoke-Deobfuscation: AST-Based and Semantics-Preserving Deobfuscation for PowerShell Scripts. Huajun Chai, Lingyun Ying, Haixin Duan, Daren Zha |
| 2022 | IoT Phantom-Delay Attacks: Demystifying and Exploiting IoT Timeout Behaviors. Chenglong Fu, Qiang Zeng, Haotian Chi, Xiaojiang Du, Siva Likitha Valluru |
| 2022 | KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications. Yiwei Zhang, Siqi Ma, Juanru Li, Dawu Gu, Elisa Bertino |
| 2022 | L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing. Haram Park, Carlos Nkuba Kayembe, Seunghoon Woo, Heejo Lee |
| 2022 | Marlin: Two-Phase BFT with Linearity. Xiao Sui, Sisi Duan, Haibin Zhang |
| 2022 | Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows. Dinhnguyen Dao, Rhongho Jang, Changhun Jung, David Mohaisen, DaeHun Nyang |
| 2022 | NEC: Speaker Selective Cancellation via Neural Enhanced Ultrasound Shadowing. Hanqing Guo, Chenning Li, Lingkun Li, Zhichao Cao, Qiben Yan, Li Xiao |
| 2022 | On the Price of Locality in Static Fast Rerouting. Klaus-Tycho Foerster, Juho Hirvonen, Yvonne-Anne Pignolet, Stefan Schmid, Gilles Trédan |
| 2022 | PassFlow: Guessing Passwords with Generative Flows. Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi V. Mancini |
| 2022 | Predicting DRAM-Caused Node Unavailability in Hyper-Scale Clouds. Pengcheng Zhang, Yunong Wang, Xuhua Ma, Yaoheng Xu, Bin Yao, Xudong Zheng, Linquan Jiang |
| 2022 | QuFI: a Quantum Fault Injector to Measure the Reliability of Qubits and Quantum Circuits. Daniel Oliveira, Edoardo Giusto, Emanuele Dri, Nadir Casciola, Betis Baheri, Qiang Guan, Bartolomeo Montrucchio, Paolo Rech |
| 2022 | RAPMiner: A Generic Anomaly Localization Mechanism for CDN System with Multi-dimensional KPIs. Chang Liu, Yanwei Liu, Zhen Xu, Liang Dai |
| 2022 | SAINTDroid: Scalable, Automated Incompatibility Detection for Android. Bruno Vieira Resende e Silva, Clay Stevens, Niloofar Mansoor, Witawas Srisa-an, Tingting Yu, Hamid Bagheri |
| 2022 | SEVulDet: A Semantics-Enhanced Learnable Vulnerability Detector. Zhiquan Tang, Qiao Hu, Yupeng Hu, Wenxin Kuang, Jiongyi Chen |
| 2022 | SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services. Ziyi Zhou, Xing Han, Zeyuan Chen, Yuhong Nan, Juanru Li, Dawu Gu |
| 2022 | STBPU: A Reasonably Secure Branch Prediction Unit. Tao Zhang, Timothy Lesch, Kenneth Koltermann, Dmitry Evtyushkin |
| 2022 | Solution Bundles of Markov Performability Models through Adaptive Cross Approximation. Giulio Masetti, Leonardo Robol, Silvano Chiaradonna, Felicita Di Giandomenico |
| 2022 | Strategic Safety-Critical Attacks Against an Advanced Driver Assistance System. Xugui Zhou, Anna Schmedding, Haotian Ren, Lishan Yang, Philip Schowitz, Evgenia Smirni, Homa Alemzadeh |
| 2022 | The Fault in Our Data Stars: Studying Mitigation Techniques against Faulty Training Data in Machine Learning Applications. Abraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan |
| 2022 | The Hazard Value: A Quantitative Network Connectivity Measure Accounting for Failures. Pieter J. L. Cuijpers, Stefan Schmid, Nicolas Schnepf, Jirí Srba |
| 2022 | TimeDice: Schedulability-Preserving Priority Inversion for Mitigating Covert Timing Channels Between Real-time Partitions. Man-Ki Yoon, Jung-Eun Kim, Richard M. Bradford, Zhong Shao |
| 2022 | Tool: An Efficient and Flexible Simulator for Byzantine Fault-Tolerant Protocols. Ping-Lun Wang, Tzu-Wei Chao, Chia-Chien Wu, Hsu-Chun Hsiao |
| 2022 | Torpedo: A Fuzzing Framework for Discovering Adversarial Container Workloads. Kenton McDonough, Xing Gao, Shuai Wang, Haining Wang |
| 2022 | Treaty: Secure Distributed Transactions. Dimitra Giantsidi, Maurice Bailleu, Natacha Crooks, Pramod Bhatotia |
| 2022 | Understanding RowHammer Under Reduced Wordline Voltage: An Experimental Study Using Real DRAM Devices. Abdullah Giray Yaglikçi, Haocong Luo, Geraldo F. Oliviera, Ataberk Olgun, Minesh Patel, Jisung Park, Hasan Hassan, Jeremie S. Kim, Lois Orosa, Onur Mutlu |
| 2022 | WideLeak: How Over-the-Top Platforms Fail in Android. Gwendal Patat, Mohamed Sabt, Pierre-Alain Fouque |
| 2022 | ZugChain: Blockchain-Based Juridical Data Recording in Railway Systems. Signe Rüsch, Kai Bleeke, Ines Messadi, Stefan Schmidt, Andreas Krampf, Katharina Olze, Susanne Stahnke, Robert Schmid, Lukas Pirl, Roland Kittel, Andreas Polze, Marquart Franz, Matthias Müller, Leander Jehl, Rüdiger Kapitza |