PRDC C

24 papers

YearTitle / Authors
202530th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2025, Seoul, Republic of Korea, November 3-5, 2025
2025A Self-Synchronizing Cyber Deception Framework via Infrastructure as Code Reflection.
Junyeong Park, Sayeon Kim, Woohyun Jang, Yeon-Jae Kim, Shinwoo Shim, Olmi Lee, Ki-Woong Park
2025A Study on User Approval Criteria and User Interfaces for Dependability of AI-based Code Generation Tools.
Minseo Ju, Hyung Kook Jun, Taeho Kim, Hyung-Jong Kim
2025An Analysis of Sui's Transactions and Conflicts.
Dvir Biton, Roy Friedman
2025An Approach to Creating the Optimal Attack Path Based on Reinforcement Learning.
Hyo Sun Lee, Min Geun Song, Huy Kang Kim
2025Automated Timeline-Based Forensic Report Generation with Anomaly Detection and LLM-Based CTI Mapping.
Yongsik Kim, Saehee Jun, Junho Jang, Huy Kang Kim
2025Automated Vulnerability Repair of Obfuscated and Non-Obfuscated Smart Contracts Using Large Language Models.
Chihiro Kado, Tatsuhiro Tsuchiya
2025CLGuard: A Context-Aware Suppression Framework for Resilient Driving Control.
Yeongju Seong, Hyuk Lim, Seunghyun Yoon
2025Dependable Code Repair with LLMs: AI-Driven Vulnerability Detection and Automated Patching.
Sungmin Han, Hyoungshick Kim, Hojoon Lee, Hyungon Moon, Yuseok Jeon, Ho Bae, Donghyun Yeo, Gail-Joon Ahn, Sangkyun Lee
2025Efficient Scheduling of Smart Contract Transactions via Conflict Graph Coloring.
Ankit Ravish, Yaron Hay, Manaswini Piduguralla, Rishabh Jain, Roy Friedman, Sathya Peri
2025GALAXY: Generalized Attention-Based LSTM Architecture with External Query for Intrusion Detection in UAV Communication.
Jae Yeon Lee, Huy Kang Kim
2025Guided Importance Sampling for Safety and Reliability: A Pragmatic Comparison of Symbolic and Simulation-Based Approaches.
Tim Gonschorek, Frank Ortmeier
2025Integrating Threat Analysis and Formal Verification for Secure OTA Updates.
Sheraz Mazhar, Abdur Rakib, Robin Doss, Adnan Anwar, Frank Jiang
2025Keyspector: Secure Monitoring of IoT Devices Using RISC-V Keystone.
Takahito Iwano, Kenichi Kourai
2025Orchestrating Fail-Safe, Black-Box Models Within Federated Learning Scenarios.
Fahad Ahmed KhoKhar, Tommaso Zoppi, Jamal Hussain Shah
2025Physics-Guided and Explainable Anomaly Detection for IEC 61850 Sampled Values.
Sunoh Ryu, Ryangsoo Kim, Hark Yoo, Hyuk Lim, Seunghyun Yoon
2025Robustness Evaluation Under RGB-Camera Attacks in CARLA: A Systematic Evaluation of Color Modes and Attack Types.
Yufeng Lin, Sangmin Park, Hyunjae Kang, Huy Kang Kim, Dan Dongseong Kim
2025SIROCCO: A Dry Wind to Warn you from Bluetooth Attacks.
Paul L. R. Olivier, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Romain Cayre
2025Speeding Up the Development for the Computing Continuum with WebAssembly.
Mehmet Cihan Sakman, Josef Spillner, Valerio Schiavoni
2025Support System for Creating Medical Incident and Accident Reports Utilizing Two Types of Medical Accident Databases.
Koichi Bando, Kenjiro Inaba, Sachiko Honda, Tetsuro Yumoto, Atsunobu Sagara, Kenji Tanaka
2025TZmediator: Secure Cooperative Execution of Cloud Applications Using POSIX APIs on Arm TrustZone.
Taiyo Sato, Kenichi Kourai
2025Toward Dependability Simulation for Intelligent Transportation Systems in Connected Vehicle Environments.
Saehoon Oh, Sangbeom Park, Gang Min Kim, Huy Kang Kim
2025Toward an Autonomous Purple Teaming Framework for Security and Safety in Large Language Models.
Leo Hyun Park, Yoonsik Kim, Eunbi Hwang, Sangsoo Han, Hyoungshick Kim, Taekyoung Kwon
2025Towards Secure Containerized Applications with Seccomp Profile Refinement.
Linh Nguyen-Thuy, Long Nguyen-Vu, Thien-Phuc Doan, Jungsoo Park, Souhwan Jung