DSN A

49 papers

YearTitle / Authors
202353rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, DSN 2023, Porto, Portugal, June 27-30, 2023
2023Adaptive Webpage Fingerprinting from TLS Traces.
Vasilios Mavroudis, Jamie Hayes
2023Analyzing the Performance of the Inter-Blockchain Communication Protocol.
João Otávio Massari Chervinski, Diego Kreutz, Xiwei Xu, Jiangshan Yu
2023Breaking Geographic Routing Among Connected Vehicles.
Zizheng Liu, Shaan Shekhar, Chunyi Peng
2023Compiler-Implemented Differential Checksums: Effective Detection and Correction of Transient and Permanent Memory Errors.
Christoph Borchert, Horst Schirmeier, Olaf Spinczyk
2023Cost-Damage Analysis of Attack Trees.
Milan Lopuhaä-Zwakenberg, Mariëlle Stoelinga
2023Creating a Large-scale Memory Error IoT Botnet Using NS3DockerEmulator.
Islam Obaidat, Bennett Kahn, Fatemeh Tavakoli, Meera Sridhar
2023DARPA: Combating Asymmetric Dark UI Patterns on Android with Run-time View Decorator.
Zhaoxin Cai, Yuhong Nan, Xueqiang Wang, Mengyi Long, Qihua Ou, Min Yang, Zibin Zheng
2023DNAttest: Digital-twin-based Non-intrusive Attestation under Transient Uncertainty.
Wei Lin, Heng Chuan Tan, Binbin Chen, Fan Zhang
2023Detection of e-Mobility-Based Attacks on the Power Grid.
Dustin Kern, Christoph Krauß
2023Devils in Your Apps: Vulnerabilities and User Privacy Exposure in Mobile Notification Systems.
Jiadong Lou, Xiaohan Zhang, Yihe Zhang, Xinghua Li, Xu Yuan, Ning Zhang
2023Don't Knock! Rowhammer at the Backdoor of DNN Models.
M. Caner Tol, Saad Islam, Andrew J. Adiletta, Berk Sunar, Ziming Zhang
2023Fabricated Flips: Poisoning Federated Learning without Data.
Jiyue Huang, Zilong Zhao, Lydia Y. Chen, Stefanie Roos
2023Fortifying Federated Learning against Membership Inference Attacks via Client-level Input Perturbation.
Yuchen Yang, Haolin Yuan, Bo Hui, Neil Zhenqiang Gong, Neil Fendley, Philippe Burlina, Yinzhi Cao
2023Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Aerial Vehicles.
Aolin Ding, Matthew Chan, Amin Hass, Nils Ole Tippenhauer, Shiqing Ma, Saman A. Zonouz
2023Heron: Scalable State Machine Replication on Shared Memory.
Mojtaba Eslahi-Kelorazi, Long Hoang Le, Fernando Pedone
2023HiMFP: Hierarchical Intelligent Memory Failure Prediction for Cloud Service Reliability.
Qiao Yu, Wengui Zhang, Paolo Notaro, Soroush Haeri, Jorge Cardoso, Odej Kao
2023How Different are the Cloud Workloads? Characterizing Large-Scale Private and Public Cloud Workloads.
Xiaoting Qin, Minghua Ma, Yuheng Zhao, Jue Zhang, Chao Du, Yudong Liu, Anjaly Parayil, Chetan Bansal, Saravan Rajmohan, Íñigo Goiri, Eli Cortez, Si Qin, Qingwei Lin, Dongmei Zhang
2023IDTracker: Discovering Illicit Website Communities via Third-party Service IDs.
Chenxu Wang, Zhao Li, Jiangyi Yin, Zhenni Liu, Zhongyi Zhang, Qingyun Liu
2023IRIS: a Record and Replay Framework to Enable Hardware-assisted Virtualization Fuzzing.
Carmine Cesarano, Marcello Cinque, Domenico Cotroneo, Luigi De Simone, Giorgio Farina
2023Intrusion Injection for Virtualized Systems: Concepts and Approach.
Charles F. Gonçalves, Nuno Antunes, Marco Vieira
2023IoT Anomaly Detection Via Device Interaction Graph.
Jincheng Wang, Zhuohua Li, Mingshen Sun, Bin Yuan, John C. S. Lui
2023JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation.
Kunlun Ren, Weizhong Qiang, Yueming Wu, Yi Zhou, Deqing Zou, Hai Jin
2023MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors.
Xiaohui Chen, Lei Cui, Hui Wen, Zhi Li, Hongsong Zhu, Zhiyu Hao, Limin Sun
2023Message from the DSN 2023 Program Chairs.
Onur Mutlu, Xavier Défago
2023Micro Replication.
Tobias Distler, Michael Eischer, Laura Lawniczak
2023NPTSN: RL-Based Network Planning with Guaranteed Reliability for In-Vehicle TSSDN.
Weijiang Kong, Majid Nabi, Kees Goossens
2023No Free Lunch: On the Increased Code Reuse Attack Surface of Obfuscated Programs.
Naiqian Zhang, Daroc Alden, Dongpeng Xu, Shuai Wang, Trent Jaeger, Wheeler Ruml
2023On Adversarial Robustness of Point Cloud Semantic Segmentation.
Jiacen Xu, Zhe Zhou, Boyuan Feng, Yufei Ding, Zhou Li
2023PASTA: Pragmatic Automated System-Theoretic Process Analysis.
Jette Petzold, Jana Kreiß, Reinhard von Hanxleden
2023PT-Guard: Integrity-Protected Page Tables to Defend Against Breakthrough Rowhammer Attacks.
Anish Saxena, Gururaj Saileshwar, Jonas Juffinger, Andreas Kogler, Daniel Gruss, Moinuddin K. Qureshi
2023Poisoning Online Learning Filters by Shifting on the Move.
Wesley Joon-Wie Tann, Ee-Chien Chang
2023Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model.
Haibin Zhang, Sisi Duan, Chao Liu, Boxin Zhao, Xuanji Meng, Shengli Liu, Yong Yu, Fangguo Zhang, Liehuang Zhu
2023ReFace: Adversarial Transformation Networks for Real-time Attacks on Face Recognition Systems.
Shehzeen Hussain, Todd Huster, Chris Mesterharm, Paarth Neekhara, Farinaz Koushanfar
2023Rewind & Discard: Improving Software Resilience using Isolated Domains.
Merve Gülmez, Thomas Nyman, Christoph Baumann, Jan Tobias Mühlberg
2023SGX Switchless Calls Made Configless.
Peterson Yuhala, Michael Paper, Timothée Zerbib, Pascal Felber, Valerio Schiavoni, Alain Tchana
2023SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems.
Nur Imtiazul Haque, Maurice Ngouen, Mohammad Ashiqur Rahman, A. Selcuk Uluagac, Laurent Njilla
2023SecDDR: Enabling Low-Cost Secure Memories by Protecting the DDR Interface.
Ali Fakhrzadehgan, Prakash Ramrakhyani, Moinuddin K. Qureshi, Mattan Erez
2023Speaker Orientation-Aware Privacy Control to Thwart Misactivation of Voice Assistants.
Shaohu Zhang, Aafaq Sabir, Anupam Das
2023SwarmFuzz: Discovering GPS Spoofing Attacks in Drone Swarms.
Yingao Elaine Yao, Pritam Dash, Karthik Pattabiraman
2023Tabby: Automated Gadget Chain Detection for Java Deserialization Vulnerabilities.
Xingchen Chen, Baizhu Wang, Ze Jin, Yun Feng, Xianglong Li, Xincheng Feng, Qixu Liu
2023TagClass: A Tool for Extracting Class-Determined Tags from Massive Malware Labels via Incremental Parsing.
Yongkang Jiang, Gaolei Li, Shenghong Li
2023Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer.
Jaejong Baek, Pradeep Kumar Duraisamy Soundrapandian, Sukwha Kyung, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn
2023Time Machine: Generative Real-Time Model for Failure (and Lead Time) Prediction in HPC Systems.
Khalid Ayedh Alharthi, Arshad Jhumka, Sheng Di, Lin Gui, Franck Cappello, Simon McIntosh-Smith
2023TransAST: A Machine Translation-Based Approach for Obfuscated Malicious JavaScript Detection.
Yan Qin, Weiping Wang, Zixian Chen, Hong Song, Shigeng Zhang
2023VoiceGuard: An Effective and Practical Approach for Detecting and Blocking Unauthorized Voice Commands to Smart Speakers.
Xuening Xu, Chenglong Fu, Xiaojiang Du, E. Paul Ratazzi
2023YODA: Covert Communication Channel over Public DNS Resolvers.
Sandip Saha, Sareena Karapoola, Chester Rebeiro, V. Kamakoti
2023vWitness: Certifying Web Page Interactions with Computer Vision.
He Shuang, Lianying Zhao, David Lie
2023Āpta: Fault-tolerant object-granular CXL disaggregated memory for accelerating FaaS.
Adarsh Patil, Vijay Nagarajan, Nikos Nikoleris, Nicolai Oswald