


default search action
49th DSN 2019: Portland, OR, USA
- 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019, Portland, OR, USA, June 24-27, 2019. IEEE 2019, ISBN 978-1-7281-0057-9

Best Paper Award Candidates
- Georgios Mappouras, Alireza Vahid, A. Robert Calderbank, Daniel J. Sorin:

GreenFlag: Protecting 3D-Racetrack Memory from Shift Errors. 1-12 - Minesh Patel, Jeremie S. Kim, Hasan Hassan, Onur Mutlu

:
Understanding and Modeling On-Die Error Correction in Modern DRAM: An Experimental Study Using Real Devices. 13-25 - Athanasios Chatzidimitriou, Pablo Bodmann, George Papadimitriou

, Dimitris Gizopoulos, Paolo Rech:
Demystifying Soft Error Assessment Strategies on ARM CPUs: Microarchitectural Fault Injection vs. Neutron Beam Experiments. 26-38
Session 1 - Machine Learning Security
- Qiang Zeng, Jianhai Su

, Chenglong Fu, Golam Kayas, Lannan Luo, Xiaojiang Du, Chiu C. Tan, Jie Wu:
A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples. 39-51 - Jiaqi Yan, Guanhua Yan, Dong Jin:

Classifying Malware Represented as Control Flow Graphs using Deep Graph Convolutional Neural Network. 52-63 - Guanxiong Liu, Issa Khalil

, Abdallah Khreishah
:
ZK-GanDef: A GAN Based Zero Knowledge Adversarial Training Defense for Neural Networks. 64-75
Session 2 - Modeling
- Hananeh Aliee, Faramarz Khosravi, Jürgen Teich:

Efficient Treatment of Uncertainty in System Reliability Analysis using Importance Measures. 76-87 - Hoang Hai Nguyen, Kartik Palani, David M. Nicol:

Extensions of Network Reliability Analysis. 88-99 - Peter Buchholz

, Iryna Dohndorf, Jan Kriege
:
An Online Approach to Estimate Parameters of Phase-Type Distributions. 100-111
Session 3 - Machine Learning Reliability
- Saurabh Jha

, Subho S. Banerjee
, Timothy Tsai, Siva Kumar Sastry Hari, Michael B. Sullivan, Zbigniew T. Kalbarczyk, Stephen W. Keckler, Ravishankar K. Iyer:
ML-Based Fault Injection for Autonomous Vehicles: A Case for Bayesian Fault Injection. 112-124 - Weibin Wu

, Hui Xu, Sanqiang Zhong, Michael R. Lyu, Irwin King
:
Deep Validation: Toward Detecting Real-World Corner Cases for Deep Neural Networks. 125-137 - Ankush Desai, Shromona Ghosh, Sanjit A. Seshia, Natarajan Shankar, Ashish Tiwari:

SOTER: A Runtime Assurance Framework for Programming Safe Robotics Systems. 138-150
Session 4 - Transactions and Concurrency
- Pedro Ramalhete, Andreia Correia, Pascal Felber

, Nachshon Cohen:
OneFile: A Wait-Free Persistent Transactional Memory. 151-163 - Zhongmiao Li, Paolo Romano

, Peter Van Roy:
Sparkle: Speculative Deterministic Concurrency Control for Partially Replicated Transactional Stores. 164-175 - Alexey Gotsman, Anatole Lefort

, Gregory V. Chockler
:
White-Box Atomic Multicast. 176-187
Session 5 - Hardware Reliability
- Yanyan Shen, Gernot Heiser, Kevin Elphinstone:

Fault Tolerance Through Redundant Execution on COTS Multicores: Exploring Trade-Offs. 188-200 - Sam Ainsworth

, Timothy M. Jones
:
ParaMedic: Heterogeneous Parallel Error Correction. 201-213 - Radha Venkatagiri, Khalique Ahmed, Abdulrahman Mahmoud, Sasa Misailovic, Darko Marinov, Christopher W. Fletcher, Sarita V. Adve:

gem5-Approxilyzer: An Open-Source Tool for Application-Level Soft Error Analysis. 214-221
Session 6 - IoT Security
- Jiongyi Chen, Chaoshun Zuo, Wenrui Diao

, Shuaike Dong, Qingchuan Zhao
, Menghan Sun, Zhiqiang Lin, Yinqian Zhang, Kehuan Zhang:
Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users. 222-233 - Naif Saleh Almakhdhub, Abraham A. Clements, Mathias Payer, Saurabh Bagchi:

BenchIoT: A Security Benchmark for the Internet of Things. 234-246 - K. Virgil English, Islam Obaidat

, Meera Sridhar:
Exploiting Memory Corruption Vulnerabilities in Connman for IoT Devices. 247-255
Session 7 - Network Reliability
- Ajay Mahimkar, Zihui Ge, Sanjeev Ahuja, Shomik Pathak, Nauman Shafi:

Rigorous, Effortless and Timely Assessment of Cellular Network Changes. 256-263 - Karla Vargas, Sergio Rajsbaum:

An Eventually Perfect Failure Detector for Networks of Arbitrary Topology Connected with ADD Channels Using Time-To-Live Values. 264-275 - Klaus-Tycho Foerster

, Andrzej Kamisinski, Yvonne-Anne Pignolet, Stefan Schmid
, Gilles Trédan:
Bonsai: Efficient Fast Failover Routing Using Small Arborescences. 276-288
Session 8 - Hardware Security
- Shengye Wan, Jianhua Sun, Kun Sun, Ning Zhang, Qi Li:

SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors. 289-301 - Kuniyasu Suzaki

, Yohei Hori
, Kazukuni Kobara, Mohammad Mannan:
DeviceVeil: Robust Authentication for Individual USB Devices Using Physical Unclonable Functions. 302-314 - Mateus Tymburibá, Hugo Sousa, Fernando Magno Quintão Pereira:

Multilayer ROP Protection Via Microarchitectural Units Available in Commodity Hardware. 315-327
Session 9 - IoT and SCADA Reliability
- Amy Babay

, John L. Schultz, Thomas Tantillo, Samuel Beckley, Eamon Jordan, Kevin Ruddell, Kevin Jordan, Yair Amir:
Deploying Intrusion-Tolerant SCADA for the Power Grid. 328-335 - Zhongshu Gu, Hani Jamjoom, Dong Su, Heqing Huang, Jialong Zhang, Tengfei Ma

, Dimitrios Pendarakis, Ian M. Molloy:
Reaching Data Confidentiality and Model Accountability on the CalTrain. 336-348 - Pengfei Sun, Luis Garcia

, Saman A. Zonouz:
Tell Me More Than Just Assembly! Reversing Cyber-Physical Execution Semantics of Embedded IoT Controller Software Binaries. 349-361
Session 10 - Memory Systems Reliability
- Haonan Wang, Adwait Jog:

Exploiting Latency and Error Tolerance of GPGPU Applications for an Energy-Efficient DRAM. 362-374 - Sébastien Ollivier, Donald Kline Jr.

, Kawsher A. Roxy, Rami G. Melhem, Sanjukta Bhanja, Alex K. Jones
:
Leveraging Transverse Reads to Correct Alignment Faults in Domain Wall Memories. 375-387 - Prashant J. Nair, Bahar Asgari

, Moinuddin K. Qureshi:
SuDoku: Tolerating High-Rate of Transient Failures for Enabling Scalable STTRAM. 388-400
Session 11 - Trusted Computing
- Judicael Briand Djoko, Jack Lange, Adam J. Lee

:
NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGX. 401-413 - Maurice Bailleu, Donald Dragoti, Pramod Bhatotia, Christof Fetzer:

TEE-Perf: A Profiler for Trusted Execution Environments. 414-421 - Brian Delgado, Tejaswini Vibhute, John Fastabend, Karen L. Karavanic:

EPA-RIMM : An Efficient, Performance-Aware Runtime Integrity Measurement Mechanism for Modern Server Platforms. 422-434
Session 12 - Network Security
- Yihe Zhang

, Hao Zhang, Xu Yuan, Nian-Feng Tzeng:
Pseudo-Honeypot: Toward Efficient and Scalable Spam Sniffer. 435-446 - Steven R. Gomez, Samuel Jero, Richard Skowyra, Jason Martin, Patrick Sullivan, David Bigelow, Zachary Ellenbogen, Bryan C. Ward, Hamed Okhravi

, James W. Landry:
Controller-Oblivious Dynamic Access Control in Software-Defined Networks. 447-459 - Onur Zungur, Guillermo Suarez-Tangil, Gianluca Stringhini, Manuel Egele:

BorderPatrol: Securing BYOD using Fine-Grained Contextual Information. 460-472
Session 13 - Empirical Studies
- Sheng Di, Hanqi Guo

, Eric Pershey, Marc Snir, Franck Cappello:
Characterizing and Understanding HPC Job Failures Over The 2K-Day Life of IBM BlueGene/Q System. 473-484 - Xinda Wang, Kun Sun, Archer L. Batcheller, Sushil Jajodia:

Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS. 485-492 - Jeman Park

, Aminollah Khormali, Manar Mohaisen
, Aziz Mohaisen
:
Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers. 493-504
Session 14 - Randomization and Vulnerabilities
- Jonghwan Kim, DaeHee Jang, Yunjong Jeong, Brent ByungHoon Kang:

POLaR: Per-Allocation Object Layout Randomization. 505-516 - David Pouliot, Scott Griffy, Charles V. Wright:

The Strength of Weak Randomization: Easily Deployable, Efficiently Searchable Encryption with Minimal Leakage. 517-529 - Qiang Zeng, Golam Kayas, Emil Mohammed, Lannan Luo, Xiaojiang Du, Junghwan Rhee:

HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding. 530-542
Session 15 - Storage Systems and Blockchain
- Hui Kang, Ting Dai

, Nerla Jean-Louis, Shu Tao, Xiaohui Gu:
FabZK: Supporting Privacy-Preserving, Auditable Smart Contracts in Hyperledger Fabric. 543-555 - Zhirong Shen, Xiaolu Li, Patrick P. C. Lee

:
Fast Predictive Repair in Erasure-Coded Storage. 556-567 - Guy Golan-Gueta, Ittai Abraham, Shelly Grossman, Dahlia Malkhi, Benny Pinkas, Michael K. Reiter, Dragos-Adrian Seredinschi, Orr Tamir, Alin Tomescu:

SBFT: A Scalable and Decentralized Trust Infrastructure. 568-580
Session 16 - Symbolic Execution
- Jin Huang, Yu Li, Junjie Zhang, Rui Dai:

UChecker: Automatically Detecting PHP-Based Unrestricted File Upload Vulnerabilities. 581-592 - John Criswell

, Jie Zhou, Spyridoula Gravani
, Xiaoyu Hu:
PrivAnalyzer: Measuring the Efficacy of Linux Privilege Use. 593-604 - Jiaqi Peng, Feng Li, Bingchang Liu, Lili Xu, Binghong Liu, Kai Chen, Wei Huo:

1dVul: Discovering 1-Day Vulnerabilities through Binary Patches. 605-616
Session 17 - Potpourri
- Mohammad A. Noureddine, Ahmed M. Fawaz, Amanda Hsu, Cody Guldner, Sameer Vijay, Tamer Basar, William H. Sanders:

Revisiting Client Puzzles for State Exhaustion Attacks Resilience. 617-629 - Zilong Zhao

, Sophie Cerf, Robert Birke, Bogdan Robu
, Sara Bouchenak, Sonia Ben Mokhtar, Lydia Y. Chen:
Robust Anomaly Detection on Unreliable Data. 630-637 - Ricardo Couceiro

, Gonçalo Duarte, João Durães
, João Castelhano
, Isabel Catarina Duarte
, César A. D. Teixeira
, Miguel Castelo-Branco
, Paulo Carvalho, Henrique Madeira:
Pupillography as Indicator of Programmers' Mental Effort and Cognitive Overload. 638-644

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














