DSN A

58 papers

YearTitle / Authors
2025"I will always be by your side": A Side-Channel Aided PWM-based Holistic Attack Recovery for Unmanned Aerial Vehicles.
Muneeba Asif, Jean Carlos Tonday Rodriguez, Mohammad Kumail Kazmi, Mohammad Ashiqur Rahman, Kemal Akkaya
20252025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2025 - Supplemental Volume, Naples, Italy, June 23-26, 2025
202555th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2025, Naples, Italy, June 23-26, 2025
20255G-STREAM: Service Mesh Tailored for Reliable, Efficient and Authorized Microservices in the Cloud.
Tolga O. Atalay, Alireza Famili, Sudip Maitra, Dragoslav Stojadinovic, Angelos Stavrou, Haining Wang
2025A Closer Look At Modern Evasive Phishing Emails.
Elyssa Boulila, Marc Dacier, Siva Prem Vengadessa Peroumal, Nicolas Veys, Simone Aonzo
2025A Human Study of Automatically Generated Decompiler Annotations.
Yuwei Yang, Skyler Grandel, Jeremy Lacomis, Edward J. Schwartz, Bogdan Vasilescu, Claire Le Goues, Kevin Leach
2025An Analysis of Malicious Packages in Open-Source Software in the Wild.
Xiaoyan Zhou, Ying Zhang, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li
2025Attack-Defense Trees with Offensive and Defensive Attributes.
Danut-Valentin Copae, Reza Soltani, Milan Lopuhaä-Zwakenberg
2025Automatically Generating Rules of Malicious Software Packages via Large Language Model.
XiangRui Zhang, Xuejie Du, Haoyu Chen, YongZhong He, Wenjia Niu, Qiang Li
2025BASSET: Enhancing Binary Code Clone Searching through Multi-Level Hybrid Semantic Indexing.
Yong Zhao, Ang Xia, Jie Yin, Zhi Wang, Yaqin Cao, Xiangyi Zeng, Yuling Liu
2025ConfBench: A Tool for Easy Evaluation of Confidential Virtual Machines.
Andrea De Murtas, Daniele Cono D'Elia, Giuseppe Antonio Di Luna, Pascal Felber, Leonardo Querzoni, Valerio Schiavoni
2025Decoding DNS Centralization: Measuring and Identifying NS Domains Across Hosting Providers.
Qihang Peng, Mingming Zhang, Deliang Chang, Jia Zhang, Baojun Liu, Haixin Duan
2025Detecting Code Vulnerabilities using LLMs.
Larry Huynh, Yinghao Zhang, Djimon Jayasundera, Woojin Jeon, Hyoungshick Kim, Tingting Bi, Jin B. Hong
2025EasyDRAM: An FPGA-based Infrastructure for Fast and Accurate End-to-End Evaluation of Emerging DRAM Techniques.
Oguzhan Canpolat, Ataberk Olgun, David Novo, Oguz Ergin, Onur Mutlu
2025Faster Hash-based Multi-valued Validated Asynchronous Byzantine Agreement.
Hanwen Feng, Zhenliang Lu, Tiancheng Mai, Qiang Tang
2025GREAT: Global Representation and Edge-Attention for Hardware Trojan Detection.
Zhengyi Li, Wei Cheng, Huanrong Tang, Yaohua Wang
2025GTV: Generating Tabular Data via Vertical Federated Learning.
Zilong Zhao, Han Wu, Aad van Moorsel, Lydia Y. Chen
2025GnuZero: A Compiler-Based Zeroization Static Detection Tool for the Masses.
Pierrick Philippe, Mohamed Sabt, Pierre-Alain Fouque
2025Hierarchical Model-Based Approach for Concurrent Testing of Neuromorphic Architecture.
Suman Kumar, Abhishek Kumar Mishra, Anup Das, Nagarajan Kandasamy
2025ICSTracker: Backtracking Intrusions in Modern Industrial Control Systems.
Md. Raihan Ahmed, Jainta Paul, Levi Taiji Li, Luis Garcia, Mu Zhang
2025IPMES+: Enhancing Incremental TTP Detection with Frequency and Flow Semantics.
Hong-Wei Li, Ping-Ting Liu, Bo-Wei Lin, Yennun Huang
2025KubeFence: Security Hardening of the Kubernetes Attack Surface.
Carmine Cesarano, Roberto Natella
2025LAGER: Layer-wise Graph Feature Extractor for Network Intrusion Detection.
Ke He, Dan Dongseong Kim, Muhammad Rizwan Asghar
2025Less is More: Boosting Coverage of Web Crawling through Adversarial Multi-Armed Bandit.
Lorenzo Cazzaro, Stefano Calzavara, Maksim Kovalkov, Aleksei Stafeev, Giancarlo Pellegrino
2025LiveGuard: Voice Liveness Detection via Wavelet Scattering Transform and Mel Spectrogram Scaling.
Liqun Shan, Xingli Zhang, Md. Imran Hossen, Xiali Hei
2025MalTAG: Encrypted Malware Traffic Detection Framework via Graph Based Flow Interaction Mining.
Renjie Li, Zhou Zhou, Hao Miao, Fengyuan Shi, Qingyun Liu
2025MichiCAN: Spoofing and Denial-of-Service Protection using Integrated CAN Controllers.
Mert D. Pesé, Bulut Gözübüyük, Eric Andrechek, Habeeb Olufowobi, Mohammad Hamad, Kang G. Shin
2025MicroSampler: A Framework for Microarchitecture-Level Leakage Detection in Constant Time Execution.
Moein Ghaniyoun, Kristin Barber, Yinqian Zhang, Radu Teodorescu
2025Mitigating Front-Running Attacks through Fair and Resilient Transaction Dissemination.
Wassim Yahyaoui, Joachim Bruneau-Queyreix, Jérémie Decouchant, Marcus Völp
2025Multi-version Machine Learning and Rejuvenation for Resilient Perception in Safety-critical Systems.
Qiang Wen, Júlio Mendonça, Fumio Machida, Marcus Völp
2025On Security Vulnerabilities in Transportation IoT Devices.
Jason Yih, Katerina Goseva-Popstojanova, Michel Cukier
2025PTC: Prefix Tuning CodeT5 for High-Quality Secure Network Measurement Script Generation.
Yuanda Wang, Xinhui Han
2025ParaVerser: Harnessing Heterogeneous Parallelism for Affordable Fault Detection in Data Centers.
Minli Julie Liao, Sam Ainsworth, Lev Mukhanov, Adrián Barredo, Markos Kynigos, Timothy M. Jones
2025PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM Opcodes.
Pasquale De Rosa, Simon Queyrut, Yérom-David Bromberg, Pascal Felber, Valerio Schiavoni
2025Privacy Analysis of Oblivious DNS over HTTPS: a Website Fingerprinting Study.
Mohammad Amir Salari, Abhinav Kumar, Federico Rinaudi, Reza Tourani, Alessio Sacco, Flavio Esposito
2025Privacy from 5 PM to 6 AM: Tracking and Transparency Mechanisms in the HbbTV Ecosystem.
Christian Böttger, Henry Hosseini, Christine Utz, Nurullah Demir, Jan Hörnemann, Christian Wressnegger, Thomas Hupperich, Norbert Pohlmann, Matteo Große-Kampmann, Tobias Urban
2025Prompting the Unseen: Detecting Hidden Backdoors in Black-Box Models.
Zi-Xuan Huang, Jia-Wei Chen, Zhi-Peng Zhang, Chia-Mu Yu
2025QUIC-Aware Load Balancing: Attacks and Mitigations.
Liliana Kistenmacher, Anum Talpur, Mathias Fischer
2025RAVAGE: Robotic Autonomous Vehicles' Attack Generation Engine.
Pritam Dash, Karthik Pattabiraman
2025ReCraft: Self-Contained Split, Merge, and Membership Change of Raft Protocol.
Kezhi Xiong, Soonwon Moon, Joshua H. Kang, Bryant Curto, Jieung Kim, Ji-Yong Shin
2025ReMlX: Resilience for ML Ensembles using XAI at Inference against Faulty Training Data.
Abraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan
2025Reentrancy Redux: The Evolution of Real-World Reentrancy Attacks on Blockchains.
Yuqi Liu, Rui Xi, Karthik Pattabiraman
2025Revisiting Main Memory-Based Covert and Side Channel Attacks in the Context of Processing-in-Memory.
F. Nisa Bostanci, Konstantinos Kanellopoulos, Ataberk Olgun, A. Giray Yaglikçi, Ismail Emir Yüksel, Nika Mansouri-Ghiasi, Zülal Bingöl, Mohammad Sadrosadati, Onur Mutlu
2025Safety Interventions against Adversarial Patches in an Open-Source Driver Assistance System.
Cheng Chen, Grant Xiao, Daehyun Lee, Lishan Yang, Evgenia Smirni, Homa Alemzadeh, Xugui Zhou
2025Secure access to network data for mobile network traffic analysis applications.
Djob Mvondo, Yérom-David Bromberg
2025Securing In-Network Traffic Control Systems with P4Auth.
Ranjitha K., Medha Rachel Panna, Stavan Nilesh Christian, Karuturi Havya Sree, Sri Hari Malla, Dheekshitha Bheemanath, Rinku Shah, Praveen Tammana
2025Semantically Improved Adversarial Attack Based on Masked Language Model via Context Preservation.
Hao Tian, Hao-Tian Wu, Yiu-ming Cheung, Junhui He, Zhihong Tian
2025SemiAF: Semi-Supervised App Fingerprinting on Unknown Traffic via Graph Neural Network.
Xiaodong Lei, Yongjun Wang, Lin Liu, Jun-Jie Huang, Jiangyong Shi, Luming Yang
2025SoundBoost: Effective RCA and Attack Detection for UAV via Acoustic Side-Channel.
Haoran Wang, Zheng Yang, Sangdon Park, Yibin Yang, Seulbae Kim, Willian T. Lunardi, Martin Andreoni, Taesoo Kim, Wenke Lee
2025Towards Automated and Explainable Threat Hunting with Generative AI.
Moumita Das Purba, Bill Chu, Will French
2025Towards Continuous Integrity Attestation and Its Challenges in Practice: A Case Study of Keylime.
Margie Ruffin, Chenkai Wang, Gheorghe Almási, Abdulhamid Adebayo, Hubertus Franke, Gang Wang
2025Towards More Dependable Specifications: An Empirical Study Exploring the Synergy of Traditional and LLM-Based Repair Approaches.
Md Rashedul Hasan, Mohannad Alhanahnah, Clay Stevens, Hamid Bagheri
2025Valkyrie: A Response Framework to Augment Runtime Detection of Time-Progressive Attacks.
Nikhilesh Singh, Chester Rebeiro
2025VerifyVFL: Practical Verifiable Vertical Federated Learning.
Junchen Hou, Lan Zhang
2025What Lies Beneath: An Empirical Study of Silent Vulnerability Fixes in Open-Source Software.
Jialiang Dong, Xinzhang Chen, Willy Susilo, Nan Sun, Arash Shaghaghi, Siqi Ma
2025ZCover: Uncovering Z-Wave Controller Vulnerabilities Through Systematic Security Analysis of Application Layer Implementation.
Carlos Nkuba Kayembe, Jimin Kang, Seunghoon Woo, Heejo Lee
2025Zero-Interference Containers: A Framework to Orchestrate Mixed-Criticality Applications.
Daniele Ottaviano, Marco Barletta, Francesco Boccola
2025ammBoost: State Growth Control for AMMs.
Nicolas Michel, Mohamed E. Najd, Ghada Almashaqbeh