| 2025 | "I will always be by your side": A Side-Channel Aided PWM-based Holistic Attack Recovery for Unmanned Aerial Vehicles. Muneeba Asif, Jean Carlos Tonday Rodriguez, Mohammad Kumail Kazmi, Mohammad Ashiqur Rahman, Kemal Akkaya |
| 2025 | 2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2025 - Supplemental Volume, Naples, Italy, June 23-26, 2025 |
| 2025 | 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2025, Naples, Italy, June 23-26, 2025 |
| 2025 | 5G-STREAM: Service Mesh Tailored for Reliable, Efficient and Authorized Microservices in the Cloud. Tolga O. Atalay, Alireza Famili, Sudip Maitra, Dragoslav Stojadinovic, Angelos Stavrou, Haining Wang |
| 2025 | A Closer Look At Modern Evasive Phishing Emails. Elyssa Boulila, Marc Dacier, Siva Prem Vengadessa Peroumal, Nicolas Veys, Simone Aonzo |
| 2025 | A Human Study of Automatically Generated Decompiler Annotations. Yuwei Yang, Skyler Grandel, Jeremy Lacomis, Edward J. Schwartz, Bogdan Vasilescu, Claire Le Goues, Kevin Leach |
| 2025 | An Analysis of Malicious Packages in Open-Source Software in the Wild. Xiaoyan Zhou, Ying Zhang, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li |
| 2025 | Attack-Defense Trees with Offensive and Defensive Attributes. Danut-Valentin Copae, Reza Soltani, Milan Lopuhaä-Zwakenberg |
| 2025 | Automatically Generating Rules of Malicious Software Packages via Large Language Model. XiangRui Zhang, Xuejie Du, Haoyu Chen, YongZhong He, Wenjia Niu, Qiang Li |
| 2025 | BASSET: Enhancing Binary Code Clone Searching through Multi-Level Hybrid Semantic Indexing. Yong Zhao, Ang Xia, Jie Yin, Zhi Wang, Yaqin Cao, Xiangyi Zeng, Yuling Liu |
| 2025 | ConfBench: A Tool for Easy Evaluation of Confidential Virtual Machines. Andrea De Murtas, Daniele Cono D'Elia, Giuseppe Antonio Di Luna, Pascal Felber, Leonardo Querzoni, Valerio Schiavoni |
| 2025 | Decoding DNS Centralization: Measuring and Identifying NS Domains Across Hosting Providers. Qihang Peng, Mingming Zhang, Deliang Chang, Jia Zhang, Baojun Liu, Haixin Duan |
| 2025 | Detecting Code Vulnerabilities using LLMs. Larry Huynh, Yinghao Zhang, Djimon Jayasundera, Woojin Jeon, Hyoungshick Kim, Tingting Bi, Jin B. Hong |
| 2025 | EasyDRAM: An FPGA-based Infrastructure for Fast and Accurate End-to-End Evaluation of Emerging DRAM Techniques. Oguzhan Canpolat, Ataberk Olgun, David Novo, Oguz Ergin, Onur Mutlu |
| 2025 | Faster Hash-based Multi-valued Validated Asynchronous Byzantine Agreement. Hanwen Feng, Zhenliang Lu, Tiancheng Mai, Qiang Tang |
| 2025 | GREAT: Global Representation and Edge-Attention for Hardware Trojan Detection. Zhengyi Li, Wei Cheng, Huanrong Tang, Yaohua Wang |
| 2025 | GTV: Generating Tabular Data via Vertical Federated Learning. Zilong Zhao, Han Wu, Aad van Moorsel, Lydia Y. Chen |
| 2025 | GnuZero: A Compiler-Based Zeroization Static Detection Tool for the Masses. Pierrick Philippe, Mohamed Sabt, Pierre-Alain Fouque |
| 2025 | Hierarchical Model-Based Approach for Concurrent Testing of Neuromorphic Architecture. Suman Kumar, Abhishek Kumar Mishra, Anup Das, Nagarajan Kandasamy |
| 2025 | ICSTracker: Backtracking Intrusions in Modern Industrial Control Systems. Md. Raihan Ahmed, Jainta Paul, Levi Taiji Li, Luis Garcia, Mu Zhang |
| 2025 | IPMES+: Enhancing Incremental TTP Detection with Frequency and Flow Semantics. Hong-Wei Li, Ping-Ting Liu, Bo-Wei Lin, Yennun Huang |
| 2025 | KubeFence: Security Hardening of the Kubernetes Attack Surface. Carmine Cesarano, Roberto Natella |
| 2025 | LAGER: Layer-wise Graph Feature Extractor for Network Intrusion Detection. Ke He, Dan Dongseong Kim, Muhammad Rizwan Asghar |
| 2025 | Less is More: Boosting Coverage of Web Crawling through Adversarial Multi-Armed Bandit. Lorenzo Cazzaro, Stefano Calzavara, Maksim Kovalkov, Aleksei Stafeev, Giancarlo Pellegrino |
| 2025 | LiveGuard: Voice Liveness Detection via Wavelet Scattering Transform and Mel Spectrogram Scaling. Liqun Shan, Xingli Zhang, Md. Imran Hossen, Xiali Hei |
| 2025 | MalTAG: Encrypted Malware Traffic Detection Framework via Graph Based Flow Interaction Mining. Renjie Li, Zhou Zhou, Hao Miao, Fengyuan Shi, Qingyun Liu |
| 2025 | MichiCAN: Spoofing and Denial-of-Service Protection using Integrated CAN Controllers. Mert D. Pesé, Bulut Gözübüyük, Eric Andrechek, Habeeb Olufowobi, Mohammad Hamad, Kang G. Shin |
| 2025 | MicroSampler: A Framework for Microarchitecture-Level Leakage Detection in Constant Time Execution. Moein Ghaniyoun, Kristin Barber, Yinqian Zhang, Radu Teodorescu |
| 2025 | Mitigating Front-Running Attacks through Fair and Resilient Transaction Dissemination. Wassim Yahyaoui, Joachim Bruneau-Queyreix, Jérémie Decouchant, Marcus Völp |
| 2025 | Multi-version Machine Learning and Rejuvenation for Resilient Perception in Safety-critical Systems. Qiang Wen, Júlio Mendonça, Fumio Machida, Marcus Völp |
| 2025 | On Security Vulnerabilities in Transportation IoT Devices. Jason Yih, Katerina Goseva-Popstojanova, Michel Cukier |
| 2025 | PTC: Prefix Tuning CodeT5 for High-Quality Secure Network Measurement Script Generation. Yuanda Wang, Xinhui Han |
| 2025 | ParaVerser: Harnessing Heterogeneous Parallelism for Affordable Fault Detection in Data Centers. Minli Julie Liao, Sam Ainsworth, Lev Mukhanov, Adrián Barredo, Markos Kynigos, Timothy M. Jones |
| 2025 | PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM Opcodes. Pasquale De Rosa, Simon Queyrut, Yérom-David Bromberg, Pascal Felber, Valerio Schiavoni |
| 2025 | Privacy Analysis of Oblivious DNS over HTTPS: a Website Fingerprinting Study. Mohammad Amir Salari, Abhinav Kumar, Federico Rinaudi, Reza Tourani, Alessio Sacco, Flavio Esposito |
| 2025 | Privacy from 5 PM to 6 AM: Tracking and Transparency Mechanisms in the HbbTV Ecosystem. Christian Böttger, Henry Hosseini, Christine Utz, Nurullah Demir, Jan Hörnemann, Christian Wressnegger, Thomas Hupperich, Norbert Pohlmann, Matteo Große-Kampmann, Tobias Urban |
| 2025 | Prompting the Unseen: Detecting Hidden Backdoors in Black-Box Models. Zi-Xuan Huang, Jia-Wei Chen, Zhi-Peng Zhang, Chia-Mu Yu |
| 2025 | QUIC-Aware Load Balancing: Attacks and Mitigations. Liliana Kistenmacher, Anum Talpur, Mathias Fischer |
| 2025 | RAVAGE: Robotic Autonomous Vehicles' Attack Generation Engine. Pritam Dash, Karthik Pattabiraman |
| 2025 | ReCraft: Self-Contained Split, Merge, and Membership Change of Raft Protocol. Kezhi Xiong, Soonwon Moon, Joshua H. Kang, Bryant Curto, Jieung Kim, Ji-Yong Shin |
| 2025 | ReMlX: Resilience for ML Ensembles using XAI at Inference against Faulty Training Data. Abraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan |
| 2025 | Reentrancy Redux: The Evolution of Real-World Reentrancy Attacks on Blockchains. Yuqi Liu, Rui Xi, Karthik Pattabiraman |
| 2025 | Revisiting Main Memory-Based Covert and Side Channel Attacks in the Context of Processing-in-Memory. F. Nisa Bostanci, Konstantinos Kanellopoulos, Ataberk Olgun, A. Giray Yaglikçi, Ismail Emir Yüksel, Nika Mansouri-Ghiasi, Zülal Bingöl, Mohammad Sadrosadati, Onur Mutlu |
| 2025 | Safety Interventions against Adversarial Patches in an Open-Source Driver Assistance System. Cheng Chen, Grant Xiao, Daehyun Lee, Lishan Yang, Evgenia Smirni, Homa Alemzadeh, Xugui Zhou |
| 2025 | Secure access to network data for mobile network traffic analysis applications. Djob Mvondo, Yérom-David Bromberg |
| 2025 | Securing In-Network Traffic Control Systems with P4Auth. Ranjitha K., Medha Rachel Panna, Stavan Nilesh Christian, Karuturi Havya Sree, Sri Hari Malla, Dheekshitha Bheemanath, Rinku Shah, Praveen Tammana |
| 2025 | Semantically Improved Adversarial Attack Based on Masked Language Model via Context Preservation. Hao Tian, Hao-Tian Wu, Yiu-ming Cheung, Junhui He, Zhihong Tian |
| 2025 | SemiAF: Semi-Supervised App Fingerprinting on Unknown Traffic via Graph Neural Network. Xiaodong Lei, Yongjun Wang, Lin Liu, Jun-Jie Huang, Jiangyong Shi, Luming Yang |
| 2025 | SoundBoost: Effective RCA and Attack Detection for UAV via Acoustic Side-Channel. Haoran Wang, Zheng Yang, Sangdon Park, Yibin Yang, Seulbae Kim, Willian T. Lunardi, Martin Andreoni, Taesoo Kim, Wenke Lee |
| 2025 | Towards Automated and Explainable Threat Hunting with Generative AI. Moumita Das Purba, Bill Chu, Will French |
| 2025 | Towards Continuous Integrity Attestation and Its Challenges in Practice: A Case Study of Keylime. Margie Ruffin, Chenkai Wang, Gheorghe Almási, Abdulhamid Adebayo, Hubertus Franke, Gang Wang |
| 2025 | Towards More Dependable Specifications: An Empirical Study Exploring the Synergy of Traditional and LLM-Based Repair Approaches. Md Rashedul Hasan, Mohannad Alhanahnah, Clay Stevens, Hamid Bagheri |
| 2025 | Valkyrie: A Response Framework to Augment Runtime Detection of Time-Progressive Attacks. Nikhilesh Singh, Chester Rebeiro |
| 2025 | VerifyVFL: Practical Verifiable Vertical Federated Learning. Junchen Hou, Lan Zhang |
| 2025 | What Lies Beneath: An Empirical Study of Silent Vulnerability Fixes in Open-Source Software. Jialiang Dong, Xinzhang Chen, Willy Susilo, Nan Sun, Arash Shaghaghi, Siqi Ma |
| 2025 | ZCover: Uncovering Z-Wave Controller Vulnerabilities Through Systematic Security Analysis of Application Layer Implementation. Carlos Nkuba Kayembe, Jimin Kang, Seunghoon Woo, Heejo Lee |
| 2025 | Zero-Interference Containers: A Framework to Orchestrate Mixed-Criticality Applications. Daniele Ottaviano, Marco Barletta, Francesco Boccola |
| 2025 | ammBoost: State Growth Control for AMMs. Nicolas Michel, Mohamed E. Najd, Ghada Almashaqbeh |