


default search action
53rd DSN 2023: Porto, Portugal
- 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, DSN 2023, Porto, Portugal, June 27-30, 2023. IEEE 2023, ISBN 979-8-3503-4793-7

- Onur Mutlu

, Xavier Défago:
Message from the DSN 2023 Program Chairs. xv-xvi - Nur Imtiazul Haque, Maurice Ngouen, Mohammad Ashiqur Rahman

, A. Selcuk Uluagac, Laurent Njilla:
SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems. 1-13 - Ali Fakhrzadehgan, Prakash Ramrakhyani, Moinuddin K. Qureshi, Mattan Erez:

SecDDR: Enabling Low-Cost Secure Memories by Protecting the DDR Interface. 14-27 - Jiadong Lou, Xiaohan Zhang, Yihe Zhang

, Xinghua Li, Xu Yuan
, Ning Zhang:
Devils in Your Apps: Vulnerabilities and User Privacy Exposure in Mobile Notification Systems. 28-41 - Zizheng Liu, Shaan Shekhar, Chunyi Peng:

Breaking Geographic Routing Among Connected Vehicles. 42-54 - Weijiang Kong

, Majid Nabi, Kees Goossens:
NPTSN: RL-Based Network Planning with Guaranteed Reliability for In-Vehicle TSSDN. 55-66 - Aolin Ding, Matthew Chan, Amin Hass, Nils Ole Tippenhauer, Shiqing Ma, Saman A. Zonouz:

Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Aerial Vehicles. 67-80 - Christoph Borchert, Horst Schirmeier

, Olaf Spinczyk:
Compiler-Implemented Differential Checksums: Effective Detection and Correction of Transient and Permanent Memory Errors. 81-94 - Anish Saxena, Gururaj Saileshwar, Jonas Juffinger

, Andreas Kogler, Daniel Gruss
, Moinuddin K. Qureshi:
PT-Guard: Integrity-Protected Page Tables to Defend Against Breakthrough Rowhammer Attacks. 95-108 - M. Caner Tol, Saad Islam, Andrew J. Adiletta, Berk Sunar, Ziming Zhang:

Don't Knock! Rowhammer at the Backdoor of DNN Models. 109-122 - Tobias Distler, Michael Eischer, Laura Lawniczak

:
Micro Replication. 123-137 - Mojtaba Eslahi-Kelorazi, Long Hoang Le

, Fernando Pedone:
Heron: Scalable State Machine Replication on Shared Memory. 138-150 - João Otávio Massari Chervinski, Diego Kreutz, Xiwei Xu, Jiangshan Yu

:
Analyzing the Performance of the Inter-Blockchain Communication Protocol. 151-164 - Xiaohui Chen

, Lei Cui, Hui Wen, Zhi Li, Hongsong Zhu, Zhiyu Hao, Limin Sun:
MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors. 165-178 - Xingchen Chen, Baizhu Wang, Ze Jin, Yun Feng, Xianglong Li, Xincheng Feng, Qixu Liu:

Tabby: Automated Gadget Chain Detection for Java Deserialization Vulnerabilities. 179-192 - Yongkang Jiang, Gaolei Li, Shenghong Li:

TagClass: A Tool for Extracting Class-Determined Tags from Massive Malware Labels via Incremental Parsing. 193-200 - Adarsh Patil, Vijay Nagarajan, Nikos Nikoleris, Nicolai Oswald:

Āpta: Fault-tolerant object-granular CXL disaggregated memory for accelerating FaaS. 201-215 - Qiao Yu, Wengui Zhang, Paolo Notaro, Soroush Haeri, Jorge Cardoso, Odej Kao:

HiMFP: Hierarchical Intelligent Memory Failure Prediction for Cloud Service Reliability. 216-228 - Peterson Yuhala

, Michael Paper, Timothée Zerbib, Pascal Felber, Valerio Schiavoni, Alain Tchana:
SGX Switchless Calls Made Configless. 229-238 - Wesley Joon-Wie Tann, Ee-Chien Chang:

Poisoning Online Learning Filters by Shifting on the Move. 239-251 - Sandip Saha, Sareena Karapoola, Chester Rebeiro, V. Kamakoti:

YODA: Covert Communication Channel over Public DNS Resolvers. 252-260 - Jaejong Baek, Pradeep Kumar Duraisamy Soundrapandian

, Sukwha Kyung, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn
:
Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer. 261-273 - Jiyue Huang, Zilong Zhao, Lydia Y. Chen, Stefanie Roos:

Fabricated Flips: Poisoning Federated Learning without Data. 274-287 - Yuchen Yang, Haolin Yuan, Bo Hui, Neil Zhenqiang Gong, Neil Fendley, Philippe Burlina, Yinzhi Cao:

Fortifying Federated Learning against Membership Inference Attacks via Client-level Input Perturbation. 288-301 - Shehzeen Hussain, Todd Huster, Chris Mesterharm, Paarth Neekhara

, Farinaz Koushanfar:
ReFace: Adversarial Transformation Networks for Real-time Attacks on Face Recognition Systems. 302-312 - Naiqian Zhang, Daroc Alden, Dongpeng Xu, Shuai Wang, Trent Jaeger, Wheeler Ruml

:
No Free Lunch: On the Increased Code Reuse Attack Surface of Obfuscated Programs. 313-326 - Yan Qin, Weiping Wang, Zixian Chen, Hong Song, Shigeng Zhang:

TransAST: A Machine Translation-Based Approach for Obfuscated Malicious JavaScript Detection. 327-338 - Kunlun Ren, Weizhong Qiang, Yueming Wu

, Yi Zhou, Deqing Zou, Hai Jin:
JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation. 339-351 - Dustin Kern

, Christoph Krauß
:
Detection of e-Mobility-Based Attacks on the Power Grid. 352-365 - Yingao Elaine Yao, Pritam Dash, Karthik Pattabiraman:

SwarmFuzz: Discovering GPS Spoofing Attacks in Drone Swarms. 366-375 - Wei Lin

, Heng Chuan Tan
, Binbin Chen
, Fan Zhang:
DNAttest: Digital-twin-based Non-intrusive Attestation under Transient Uncertainty. 376-388 - Carmine Cesarano, Marcello Cinque, Domenico Cotroneo, Luigi De Simone

, Giorgio Farina:
IRIS: a Record and Replay Framework to Enable Hardware-assisted Virtualization Fuzzing. 389-401 - Merve Gülmez

, Thomas Nyman
, Christoph Baumann, Jan Tobias Mühlberg
:
Rewind & Discard: Improving Software Resilience using Isolated Domains. 402-416 - Charles F. Gonçalves

, Nuno Antunes, Marco Vieira
:
Intrusion Injection for Virtualized Systems: Concepts and Approach. 417-430 - He Shuang, Lianying Zhao

, David Lie:
vWitness: Certifying Web Page Interactions with Computer Vision. 431-444 - Vasilios Mavroudis

, Jamie Hayes:
Adaptive Webpage Fingerprinting from TLS Traces. 445-458 - Chenxu Wang, Zhao Li, Jiangyi Yin, Zhenni Liu, Zhongyi Zhang, Qingyun Liu:

IDTracker: Discovering Illicit Website Communities via Third-party Service IDs. 459-469 - Islam Obaidat

, Bennett Kahn, Fatemeh Tavakoli, Meera Sridhar:
Creating a Large-scale Memory Error IoT Botnet Using NS3DockerEmulator. 470-479 - Zhaoxin Cai, Yuhong Nan, Xueqiang Wang

, Mengyi Long, Qihua Ou, Min Yang, Zibin Zheng:
DARPA: Combating Asymmetric Dark UI Patterns on Android with Run-time View Decorator. 480-493 - Jincheng Wang, Zhuohua Li

, Mingshen Sun, Bin Yuan, John C. S. Lui:
IoT Anomaly Detection Via Device Interaction Graph. 494-507 - Khalid Ayedh Alharthi, Arshad Jhumka, Sheng Di, Lin Gui

, Franck Cappello, Simon McIntosh-Smith:
Time Machine: Generative Real-Time Model for Failure (and Lead Time) Prediction in HPC Systems. 508-521 - Xiaoting Qin, Minghua Ma, Yuheng Zhao

, Jue Zhang, Chao Du, Yudong Liu, Anjaly Parayil, Chetan Bansal, Saravan Rajmohan, Íñigo Goiri, Eli Cortez, Si Qin
, Qingwei Lin, Dongmei Zhang:
How Different are the Cloud Workloads? Characterizing Large-Scale Private and Public Cloud Workloads. 522-530 - Jiacen Xu, Zhe Zhou, Boyuan Feng, Yufei Ding, Zhou Li:

On Adversarial Robustness of Point Cloud Semantic Segmentation. 531-544 - Milan Lopuhaä-Zwakenberg

, Mariëlle Stoelinga
:
Cost-Damage Analysis of Attack Trees. 545-558 - Jette Petzold, Jana Kreiß, Reinhard von Hanxleden:

PASTA: Pragmatic Automated System-Theoretic Process Analysis. 559-567 - Haibin Zhang, Sisi Duan, Chao Liu, Boxin Zhao, Xuanji Meng, Shengli Liu, Yong Yu

, Fangguo Zhang
, Liehuang Zhu:
Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model. 568-581 - Xuening Xu, Chenglong Fu, Xiaojiang Du, E. Paul Ratazzi

:
VoiceGuard: An Effective and Practical Approach for Detecting and Blocking Unauthorized Voice Commands to Smart Speakers. 582-596 - Shaohu Zhang, Aafaq Sabir, Anupam Das:

Speaker Orientation-Aware Privacy Control to Thwart Misactivation of Voice Assistants. 597-610

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














