default search action
52nd DSN 2022: Baltimore, MD, USA
- 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022, Baltimore, MD, USA, June 27-30, 2022. IEEE 2022, ISBN 978-1-6654-1693-1
- Kaiwen Shen, Jianyu Lu, Yaru Yang, Jianjun Chen, Mingming Zhang, Haixin Duan, Jia Zhang, Xiaofeng Zheng:
HDiff: A Semi-automatic Framework for Discovering Semantic Gap Attack in HTTP Implementations. 1-13 - Dimitra Giantsidi, Maurice Bailleu, Natacha Crooks, Pramod Bhatotia:
Treaty: Secure Distributed Transactions. 14-27 - Shreshth Tuli, Giuliano Casale, Nicholas R. Jennings:
CAROL: Confidence-Aware Resilience Model for Edge Federations. 28-40 - Zicong Hong, Song Guo, Rui Zhang, Peng Li, Yufeng Zhan, Wuhui Chen:
Cycle: Sustainable Off-Chain Payment Channel Network with Asynchronous Rebalancing. 41-53 - Xiao Sui, Sisi Duan, Haibin Zhang:
Marlin: Two-Phase BFT with Linearity. 54-66 - Signe Rüsch, Kai Bleeke, Ines Messadi, Stefan Schmidt, Andreas Krampf, Katharina Olze, Susanne Stahnke, Robert Schmid, Lukas Pirl, Roland Kittel, Andreas Polze, Marquart Franz, Matthias Müller, Leander Jehl, Rüdiger Kapitza:
ZugChain: Blockchain-Based Juridical Data Recording in Railway Systems. 67-78 - Xugui Zhou, Anna Schmedding, Haotian Ren, Lishan Yang, Philip Schowitz, Evgenia Smirni, Homa Alemzadeh:
Strategic Safety-Critical Attacks Against an Advanced Driver Assistance System. 79-87 - Saurabh Jha, Shengkun Cui, Timothy Tsai, Siva Kumar Sastry Hari, Michael B. Sullivan, Zbigniew T. Kalbarczyk, Stephen W. Keckler, Ravishankar K. Iyer:
Exploiting Temporal Data Diversity for Detecting Safety-critical Faults in AV Compute Systems. 88-100 - Arpan Gujarati, Zainab Saeed Wattoo, Maryam Raiyat Aliabadi, Sean Clark, Xiaoman Liu, Parisa Shiri, Amee Trivedi, Ruizhe Zhu, Jason Hein, Margo I. Seltzer:
Arming IDS Researchers with a Robotic Arm Dataset. 101-108 - Tao Zhang, Timothy Lesch, Kenneth Koltermann, Dmitry Evtyushkin:
STBPU: A Reasonably Secure Branch Prediction Unit. 109-123 - Irina Alam, Puneet Gupta:
COMET: On-die and In-controller Collaborative Memory ECC Technique for Safer and Stronger Correction of DRAM Errors. 124-136 - Daniel Oliveira, Edoardo Giusto, Emanuele Dri, Nadir Casciola, Betis Baheri, Qiang Guan, Bartolomeo Montrucchio, Paolo Rech:
QuFI: a Quantum Fault Injector to Measure the Reliability of Qubits and Quantum Circuits. 137-149 - Zhiquan Tang, Qiao Hu, Yupeng Hu, Wenxin Kuang, Jiongyi Chen:
SEVulDet: A Semantics-Enhanced Learnable Vulnerability Detector. 150-162 - Abraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan:
The Fault in Our Data Stars: Studying Mitigation Techniques against Faulty Training Data in Machine Learning Applications. 163-171 - Jerome Dinal Herath, Priti Prabhakar Wakodikar, Ping Yang, Guanhua Yan:
CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs. 172-184 - Mateen Malik, Mehdi Maleki, Peter Folkesson, Behrooz Sangchoolie, Johan Karlsson:
ComFASE: A Tool for Evaluating the Effects of V2V Communication Faults and Attacks on Automated Vehicles. 185-192 - Rebekah Houser, Shuai Hao, Chase Cotton, Haining Wang:
A Comprehensive, Longitudinal Study of Government DNS Deployment at Global Scale. 193-204 - Abdulrahman Mahmoud, Thierry Tambe, Tarek Aloui, David Brooks, Gu-Yeon Wei:
GoldenEye: A Platform for Evaluating Emerging Numerical Data Formats in DNN Accelerators. 206-214 - Klaus-Tycho Foerster, Juho Hirvonen, Yvonne-Anne Pignolet, Stefan Schmid, Gilles Trédan:
On the Price of Locality in Static Fast Rerouting. 215-226 - Changseok Koh, Jonghoon Kwon, Junbeom Hur:
BLAP: Bluetooth Link Key Extraction and Page Blocking Attacks. 227-238 - Pieter Cuijpers, Stefan Schmid, Nicolas Schnepf, Jirí Srba:
The Hazard Value: A Quantitative Network Connectivity Measure Accounting for Failures. 239-250 - Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi V. Mancini:
PassFlow: Guessing Passwords with Generative Flows. 251-262 - Wenlu Wang, Pengfei Chen, Yibin Xu, Zilong He:
Active-MTSAD: Multivariate Time Series Anomaly Detection With Active Learning. 263-274 - Pengcheng Zhang, Yunong Wang, Xuhua Ma, Yaoheng Xu, Bin Yao, Xudong Zheng, Linquan Jiang:
Predicting DRAM-Caused Node Unavailability in Hyper-Scale Clouds. 275-286 - Ping-Lun Wang, Tzu-Wei Chao, Chia-Chien Wu, Hsu-Chun Hsiao:
Tool: An Efficient and Flexible Simulator for Byzantine Fault-Tolerant Protocols. 287-294 - Huajun Chai, Lingyun Ying, Haixin Duan, Daren Zha:
Invoke-Deobfuscation: AST-Based and Semantics-Preserving Deobfuscation for PowerShell Scripts. 295-306 - Hoang Hai Nguyen, Kartik Palani, David M. Nicol:
Exploiting monotonicity and symmetry for efficient simulation of highly dependable systems. 307-318 - Chang Liu, Yanwei Liu, Zhen Xu, Liang Dai:
RAPMiner: A Generic Anomaly Localization Mechanism for CDN System with Multi-dimensional KPIs. 319-330 - Dinhnguyen Dao, Rhongho Jang, Changhun Jung, David Mohaisen, DaeHun Nyang:
Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows. 331-342 - Haram Park, Carlos Nkuba Kayembe, Seunghoon Woo, Heejo Lee:
L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing. 343-354 - Hanqing Guo, Chenning Li, Lingkun Li, Zhichao Cao, Qiben Yan, Li Xiao:
NEC: Speaker Selective Cancellation via Neural Enhanced Ultrasound Shadowing. 355-366 - Thusitha Dayaratne, Mahsa Salehi, Carsten Rudolph, Ariel Liebman:
False Data Injection Attack Detection for Secure Distributed Demand Response in Smart Grids. 367-380 - Giulio Masetti, Leonardo Robol, Silvano Chiaradonna, Felicita Di Giandomenico:
Solution Bundles of Markov Performability Models through Adaptive Cross Approximation. 381-392 - Tianyi Yang, Jiacheng Shen, Yuxin Su, Xiaoxue Ren, Yongqiang Yang, Michael R. Lyu:
Characterizing and Mitigating Anti-patterns of Alerts in Industrial Cloud Systems. 393-401 - Kenton McDonough, Xing Gao, Shuai Wang, Haining Wang:
Torpedo: A Fuzzing Framework for Discovering Adversarial Container Workloads. 402-414 - Antonio M. Espinoza, Riley Wood, Stephanie Forrest, Mohit Tiwari:
Back to the future: N-Versioning of Microservices. 415-427 - Chenglong Fu, Qiang Zeng, Haotian Chi, Xiaojiang Du, Siva Likitha Valluru:
IoT Phantom-Delay Attacks: Demystifying and Exploiting IoT Timeout Behaviors. 428-440 - Stefano M. Nicoletti, Ernst Moritz Hahn, Mariëlle Stoelinga:
BFL: a Logic to Reason about Fault Trees. 441-452 - Man-Ki Yoon, Jung-Eun Kim, Richard M. Bradford, Zhong Shao:
TimeDice: Schedulability-Preserving Priority Inversion for Mitigating Covert Timing Channels Between Real-time Partitions. 453-465 - Alperen Bolat, Seyyid Hikmet Çelik, Ataberk Olgun, Oguz Ergin, Marco Ottavi:
ERIC: An Efficient and Practical Software Obfuscation Framework. 466-474 - Abdullah Giray Yaglikçi, Haocong Luo, Geraldo F. de Oliviera, Ataberk Olgun, Minesh Patel, Jisung Park, Hasan Hassan, Jeremie S. Kim, Lois Orosa, Onur Mutlu:
Understanding RowHammer Under Reduced Wordline Voltage: An Experimental Study Using Real DRAM Devices. 475-487 - Yiwei Zhang, Siqi Ma, Juanru Li, Dawu Gu, Elisa Bertino:
KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications. 488-500 - Gwendal Patat, Mohamed Sabt, Pierre-Alain Fouque:
WideLeak: How Over-the-Top Platforms Fail in Android. 501-508 - Tsuyoshi Shimomura, Hiroshi Yamada:
Hardening In-memory Key-value Stores against ECC-uncorrectable Memory Errors. 509-521 - Mohd Sabra, Anindya Maiti, Murtuza Jadliwala:
Background Buster: Peeking through Virtual Backgrounds in Online Video Calls. 522-533 - Ziyi Zhou, Xing Han, Zeyuan Chen, Yuhong Nan, Juanru Li, Dawu Gu:
SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services. 534-546 - Dong Wang, Yu Gao, Wensheng Dou, Jun Wei:
DisTA: Generic Dynamic Taint Tracking for Java-Based Distributed Systems. 547-558 - Hyungseok Kim, Junoh Lee, Soomin Kim, Seungil Jung, Sang Kil Cha:
How'd Security Benefit Reverse Engineers? : The Implication of Intel CET on Function Identification. 559-566 - Bruno Vieira Resende e Silva, Clay Stevens, Niloofar Mansoor, Witawas Srisa-an, Tingting Yu, Hamid Bagheri:
SAINTDroid: Scalable, Automated Incompatibility Detection for Android. 567-579
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.