default search action
53rd DSN 2023: Porto, Portugal
- 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, DSN 2023, Porto, Portugal, June 27-30, 2023. IEEE 2023, ISBN 979-8-3503-4793-7
- Onur Mutlu, Xavier Défago:
Message from the DSN 2023 Program Chairs. xv-xvi - Nur Imtiazul Haque, Maurice Ngouen, Mohammad Ashiqur Rahman, A. Selcuk Uluagac, Laurent Njilla:
SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems. 1-13 - Ali Fakhrzadehgan, Prakash Ramrakhyani, Moinuddin K. Qureshi, Mattan Erez:
SecDDR: Enabling Low-Cost Secure Memories by Protecting the DDR Interface. 14-27 - Jiadong Lou, Xiaohan Zhang, Yihe Zhang, Xinghua Li, Xu Yuan, Ning Zhang:
Devils in Your Apps: Vulnerabilities and User Privacy Exposure in Mobile Notification Systems. 28-41 - Zizheng Liu, Shaan Shekhar, Chunyi Peng:
Breaking Geographic Routing Among Connected Vehicles. 42-54 - Weijiang Kong, Majid Nabi, Kees Goossens:
NPTSN: RL-Based Network Planning with Guaranteed Reliability for In-Vehicle TSSDN. 55-66 - Aolin Ding, Matthew Chan, Amin Hass, Nils Ole Tippenhauer, Shiqing Ma, Saman A. Zonouz:
Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Aerial Vehicles. 67-80 - Christoph Borchert, Horst Schirmeier, Olaf Spinczyk:
Compiler-Implemented Differential Checksums: Effective Detection and Correction of Transient and Permanent Memory Errors. 81-94 - Anish Saxena, Gururaj Saileshwar, Jonas Juffinger, Andreas Kogler, Daniel Gruss, Moinuddin K. Qureshi:
PT-Guard: Integrity-Protected Page Tables to Defend Against Breakthrough Rowhammer Attacks. 95-108 - M. Caner Tol, Saad Islam, Andrew J. Adiletta, Berk Sunar, Ziming Zhang:
Don't Knock! Rowhammer at the Backdoor of DNN Models. 109-122 - Tobias Distler, Michael Eischer, Laura Lawniczak:
Micro Replication. 123-137 - Mojtaba Eslahi-Kelorazi, Long Hoang Le, Fernando Pedone:
Heron: Scalable State Machine Replication on Shared Memory. 138-150 - João Otávio Massari Chervinski, Diego Kreutz, Xiwei Xu, Jiangshan Yu:
Analyzing the Performance of the Inter-Blockchain Communication Protocol. 151-164 - Xiaohui Chen, Lei Cui, Hui Wen, Zhi Li, Hongsong Zhu, Zhiyu Hao, Limin Sun:
MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors. 165-178 - Xingchen Chen, Baizhu Wang, Ze Jin, Yun Feng, Xianglong Li, Xincheng Feng, Qixu Liu:
Tabby: Automated Gadget Chain Detection for Java Deserialization Vulnerabilities. 179-192 - Yongkang Jiang, Gaolei Li, Shenghong Li:
TagClass: A Tool for Extracting Class-Determined Tags from Massive Malware Labels via Incremental Parsing. 193-200 - Adarsh Patil, Vijay Nagarajan, Nikos Nikoleris, Nicolai Oswald:
Āpta: Fault-tolerant object-granular CXL disaggregated memory for accelerating FaaS. 201-215 - Qiao Yu, Wengui Zhang, Paolo Notaro, Soroush Haeri, Jorge Cardoso, Odej Kao:
HiMFP: Hierarchical Intelligent Memory Failure Prediction for Cloud Service Reliability. 216-228 - Peterson Yuhala, Michael Paper, Timothée Zerbib, Pascal Felber, Valerio Schiavoni, Alain Tchana:
SGX Switchless Calls Made Configless. 229-238 - Wesley Joon-Wie Tann, Ee-Chien Chang:
Poisoning Online Learning Filters by Shifting on the Move. 239-251 - Sandip Saha, Sareena Karapoola, Chester Rebeiro, V. Kamakoti:
YODA: Covert Communication Channel over Public DNS Resolvers. 252-260 - Jaejong Baek, Pradeep Kumar Duraisamy Soundrapandian, Sukwha Kyung, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer. 261-273 - Jiyue Huang, Zilong Zhao, Lydia Y. Chen, Stefanie Roos:
Fabricated Flips: Poisoning Federated Learning without Data. 274-287 - Yuchen Yang, Haolin Yuan, Bo Hui, Neil Zhenqiang Gong, Neil Fendley, Philippe Burlina, Yinzhi Cao:
Fortifying Federated Learning against Membership Inference Attacks via Client-level Input Perturbation. 288-301 - Shehzeen Hussain, Todd Huster, Chris Mesterharm, Paarth Neekhara, Farinaz Koushanfar:
ReFace: Adversarial Transformation Networks for Real-time Attacks on Face Recognition Systems. 302-312 - Naiqian Zhang, Daroc Alden, Dongpeng Xu, Shuai Wang, Trent Jaeger, Wheeler Ruml:
No Free Lunch: On the Increased Code Reuse Attack Surface of Obfuscated Programs. 313-326 - Yan Qin, Weiping Wang, Zixian Chen, Hong Song, Shigeng Zhang:
TransAST: A Machine Translation-Based Approach for Obfuscated Malicious JavaScript Detection. 327-338 - Kunlun Ren, Weizhong Qiang, Yueming Wu, Yi Zhou, Deqing Zou, Hai Jin:
JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation. 339-351 - Dustin Kern, Christoph Krauß:
Detection of e-Mobility-Based Attacks on the Power Grid. 352-365 - Yingao Elaine Yao, Pritam Dash, Karthik Pattabiraman:
SwarmFuzz: Discovering GPS Spoofing Attacks in Drone Swarms. 366-375 - Wei Lin, Heng Chuan Tan, Binbin Chen, Fan Zhang:
DNAttest: Digital-twin-based Non-intrusive Attestation under Transient Uncertainty. 376-388 - Carmine Cesarano, Marcello Cinque, Domenico Cotroneo, Luigi De Simone, Giorgio Farina:
IRIS: a Record and Replay Framework to Enable Hardware-assisted Virtualization Fuzzing. 389-401 - Merve Gülmez, Thomas Nyman, Christoph Baumann, Jan Tobias Mühlberg:
Rewind & Discard: Improving Software Resilience using Isolated Domains. 402-416 - Charles F. Gonçalves, Nuno Antunes, Marco Vieira:
Intrusion Injection for Virtualized Systems: Concepts and Approach. 417-430 - He Shuang, Lianying Zhao, David Lie:
vWitness: Certifying Web Page Interactions with Computer Vision. 431-444 - Vasilios Mavroudis, Jamie Hayes:
Adaptive Webpage Fingerprinting from TLS Traces. 445-458 - Chenxu Wang, Zhao Li, Jiangyi Yin, Zhenni Liu, Zhongyi Zhang, Qingyun Liu:
IDTracker: Discovering Illicit Website Communities via Third-party Service IDs. 459-469 - Islam Obaidat, Bennett Kahn, Fatemeh Tavakoli, Meera Sridhar:
Creating a Large-scale Memory Error IoT Botnet Using NS3DockerEmulator. 470-479 - Zhaoxin Cai, Yuhong Nan, Xueqiang Wang, Mengyi Long, Qihua Ou, Min Yang, Zibin Zheng:
DARPA: Combating Asymmetric Dark UI Patterns on Android with Run-time View Decorator. 480-493 - Jincheng Wang, Zhuohua Li, Mingshen Sun, Bin Yuan, John C. S. Lui:
IoT Anomaly Detection Via Device Interaction Graph. 494-507 - Khalid Ayedh Alharthi, Arshad Jhumka, Sheng Di, Lin Gui, Franck Cappello, Simon McIntosh-Smith:
Time Machine: Generative Real-Time Model for Failure (and Lead Time) Prediction in HPC Systems. 508-521 - Xiaoting Qin, Minghua Ma, Yuheng Zhao, Jue Zhang, Chao Du, Yudong Liu, Anjaly Parayil, Chetan Bansal, Saravan Rajmohan, Íñigo Goiri, Eli Cortez, Si Qin, Qingwei Lin, Dongmei Zhang:
How Different are the Cloud Workloads? Characterizing Large-Scale Private and Public Cloud Workloads. 522-530 - Jiacen Xu, Zhe Zhou, Boyuan Feng, Yufei Ding, Zhou Li:
On Adversarial Robustness of Point Cloud Semantic Segmentation. 531-544 - Milan Lopuhaä-Zwakenberg, Mariëlle Stoelinga:
Cost-Damage Analysis of Attack Trees. 545-558 - Jette Petzold, Jana Kreiß, Reinhard von Hanxleden:
PASTA: Pragmatic Automated System-Theoretic Process Analysis. 559-567 - Haibin Zhang, Sisi Duan, Chao Liu, Boxin Zhao, Xuanji Meng, Shengli Liu, Yong Yu, Fangguo Zhang, Liehuang Zhu:
Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model. 568-581 - Xuening Xu, Chenglong Fu, Xiaojiang Du, E. Paul Ratazzi:
VoiceGuard: An Effective and Practical Approach for Detecting and Blocking Unauthorized Voice Commands to Smart Speakers. 582-596 - Shaohu Zhang, Aafaq Sabir, Anupam Das:
Speaker Orientation-Aware Privacy Control to Thwart Misactivation of Voice Assistants. 597-610
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.