


default search action
53rd DSN 2023: Porto, Portugal - Supplemental Volume
- 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2023 - Supplemental Volume, Porto, Portugal, June 27-30, 2023. IEEE 2023, ISBN 979-8-3503-2545-4

- Alysson Neves Bessani:

Byzantine State Machine Replication in the Age of Blockchains: Fundamentals and Recent Results (Tutorial). 1 - Edoardo Giusto

, Emanuele Dri
, Bartolomeo Montrucchio, Betis Baheri
, Qiang Guan, Devesh Tiwari, Paolo Rech:
Quantum Computing Reliability: Problems, Tools, and Potential Solutions. 2-3 - Gernot Heiser, Ivan Velickovic:

Tutorial: Using the seL4 Microkernel. 4 - Luigi Coppolino, Giovanni Mazzeo, Luigi Romano:

Awesome Trusted Execution Environment. 5-6 - Zhixian Chu, Lingqi Guo, Jingyu Wang

, Qi Qi, Zirui Zhuang
, Haifeng Sun, Cheng Zhou:
HIRN: A Hierarchical Intent Refinement Approach for Dependable Network Slicing with Multi-path Resource Allocation. 7-13 - Gabriel Fré, Bilgehan Erman, Catello Di Martino:

Data Shower in Electronics Manufacturing: Measuring Wi-Fi 4, Wi-Fi 6, and 5G SA behavior in production assembly lines. 14-20 - Zach Miller, Olusiji Medaiyese, Madhavan Ravi, Alex Beatty, Fred Lin:

Hard Disk Drive Failure Analysis and Prediction: An Industry View. 21-27 - Jeoungwon Lee, Heekwon Park, Gunhee Choi

, Bryan S. Kim, Seehwan Yoo, Jaedong Lee, Jongmoo Choi:
ACE: An Analog Cell Emulator for Dependability Study of NAND Flash Memory. 28-34 - Xiangjun Peng, Zheng Huang, Alex Cantrell, Bihua Shu, Ke Ke Xie, Yi Li, Yu Li, Li Jiang, Qiang Xu, Ming-Chang Yang:

EXPERT: EXPloiting DRAM ERror Types to Improve the Effective Forecasting Coverage in the Field. 35-41 - Alexander Will, Aidan G. Collins, Robert Grizzard, Smitha Gautham, Patrick Martin

, Evan Dill, Carl R. Elks
:
An Integrated Runtime Verification and Simulation Testbed for UAM Hazard Assessment. 42-48 - Daisuke Mashima, Muhammad M. Roomi, Bennet Ng, Zbigniew Kalberczyk, S. M. Suhail Hussain, Ee-Chien Chang:

Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training. 49-55 - Ralf Gräfe, Syed Sha Qutub, Florian Geissler, Michael Paulitsch:

Large-Scale Application of Fault Injection into PyTorch Models -an Extension to PyTorchFI for Validation Efficiency. 56-62 - Karthik Swaminathan, Ramon Bertran

, Doug Balazich, Alper Buyuktosunoglu, Arvind Haran, Sean M. Carey, Karl Anderson, Hans M. Jacobson, Matthias Pflanz, Pradip Bose:
Characterization and Exploration of Latch Checkers for Efficient RAS Protection. 63-69 - Jan Ruh

, Wilfried Steiner, Gerhard Fohler:
IEEE 802.1AS Multi-Domain Aggregation for Virtualized Distributed Real-Time Systems. 70-76 - Abdullah Al-Mamun, Dongfang Zhao:

ECHAIN: Securing Electronic Device Provenance through Privacy-Preserving Consortium Blockchains. 77-83 - Marco Barletta, Marcello Cinque, Luigi De Simone

, Raffaele Della Corte, Giorgio Farina, Daniele Ottaviano
:
Partitioned Containers: Towards Safe Clouds for Industrial Applications. 84-88 - Xuhua Ding

:
How to Resuscitate a Sick VM in the Cloud. 89-93 - Jayashree Srinivasan, Sai Ritvik Tanksalkar, Paschal C. Amusuo, James C. Davis

, Aravind Machiry:
Towards Rehosting Embedded Applications as Linux Applications. 94-99 - Alain Tchana, Raphaël Colin

, Adrien Le Berre, Vincent Berger, Benoît Combemale, Ludovic Pailler:
rgpdOS: GDPR Enforcement By The Operating System. 100-104 - Iliès Benhabbour

, Yérom-David Bromberg, Marc Dacier
, Sven Dietrich
, Rodrigo Seromenho Miragaia Rodrigues, Paulo Esteves Veríssimo:
Attacks on tomorrow's virtual world. 105-110 - Tadeu Freitas, João Soares

, Manuel Eduardo Correia
, Rolando Martins
:
Skynet: a Cyber-Aware Intrusion Tolerant Overseer. 111-116 - Jiangshan Yu

:
Fault Independence in Blockchain. 117-121 - Atul Sharma, Joshua C. Zhao, Wei Chen, Qiang Qiu, Saurabh Bagchi, Somali Chaterji

:
How to Learn Collaboratively - Federated Learning to Peer-to-Peer Learning and What's at Stake. 122-126 - Diogo Vaz, David R. Matos, Miguel L. Pardal

, Miguel Correia:
Automatic Generation of Distributed Algorithms with Generative AI. 127-131 - Marta Catillo, Antonio Pecchia, Umberto Villano:

Machine Learning on Public Intrusion Datasets: Academic Hype or Concrete Advances in NIDS? 132-136 - Wei-Yang Chiu

, Weizhi Meng
, Brooke Lampe
:
No Free Wireless Charge: Covert Channels via Wireless Charging on Mobile Devices. 137-141 - Susmit Shannigrahi, Craig Partridge:

Big Data, Transmission Errors, and the Internet. 142-145 - Songsong Liu, Shu Wang

, Kun Sun:
Enhancing Honeypot Fidelity with Real-Time User Behavior Emulation. 146-150 - Ataberk Olgun, Majd Osseiran, Abdullah Giray Yaglikçi

, Yahya Can Tugrul, Haocong Luo, Steve Rhyner, Behzad Salami, Juan Gómez-Luna, Onur Mutlu
:
An Experimental Analysis of RowHammer in HBM2 DRAM Chips. 151-156 - Ali Shoker, Paulo Esteves Veríssimo, Marcus Völp

:
The Path to Fault- and Intrusion-Resilient Manycore Systems on a Chip. 157-162 - Bohan Zhang, Lishan Yang, Guanpeng Li, Hui Xu:

Investigating the Impact of High-Level Software Design on Low-Level Hardware Fault Resilience. 163-167 - Jose Luis de la Vara

, Barbara Gallina, Antonio Fernández-Caballero, José Pascual Molina, Arturo S. García
, Clara Ayora
:
Assurance of Software-Intensive Medical Devices: What About Mental Harm? 168-172 - Anna Galanou

:
Tailoring and Verification of the Trust Boundaries in a Heterogeneous TEE Landscape. 173-175 - Peterson Yuhala

:
Enhancing IoT Security and Privacy with Trusted Execution Environments and Machine Learning. 176-178 - Fernando Richter Vidal, Naghmeh Ivaki

, Nuno Laranjeiro:
Advancing Blockchain Security: from Vulnerability Detection to Transaction Revocation. 179-181 - Paulo Antunes, Ibéria Medeiros

, Nuno Neves:
Towards PHP Vulnerability Detection at an Intermediate Language Level. 182-184 - Alessandro Palma

, Silvia Bonomi:
A Workflow for Distributed and Resilient Attack Graph Generation. 185-187 - Horacio L. França, César Alexandre Teixeira

, Nuno Laranjeiro
:
Automating Vulnerability Management in the Software Development Lifecycle. 188-190 - Jessica Castro, Nuno Laranjeiro, Marco Vieira

:
Techniques and Tools for Runtime Security Monitoring and Analysis of Microservices. 191-193 - João Rafael Pinto Soares, Luís Rodrigues:

Multi-Consistency Transactional Support for Function-as-a-Service. 194-196 - Thomas Flinkow

, Barak A. Pearlmutter
, Rosemary Monahan
:
Rich and Expressive Specification of Continuous-Learning Cyber-Physical Systems. 197-199 - Zeng Wang, Lilas Alrahis

, Dominik Sisejkovic, Ozgur Sinanoglu:
AutoLock: Automatic Design of Logic Locking with Evolutionary Computation. 200-202 - Merve Gülmez

, Thomas Nyman
, Christoph Baumann, Jan Tobias Mühlberg:
Exploring the Environmental Benefits of In-Process Isolation for Software Resilience. 203-205 - Keerthi K., Chester Rebeiro:

Secure Compiler Framework to Design Fault Attack Resistant Software. 206-208 - Pritam Dash, Karthik Pattabiraman:

Beyond Detection: Securing Robotic Vehicles. 209-210 - Alessio Colucci

:
Towards Transient Fault Mitigation Techniques Optimized for Compressed Neural Networks. 211-213 - Qiang Wen, Fumio Machida:

Bayesian Network Reliability Modeling for Three-version Machine Learning Systems. 214-216 - Daniele Rizzieri

, Sarah Azimi
, Luca Sterpone, Corrado De Sio, Thomas Borel, Viyas Gupta, Margherita Cardi:
Programmable SEL Test Monitoring System for Radiation Hardness Assurance. 217-223 - Pegdwende Romaric Nikiema, Angeliki Kritikakou, Marcello Traiola, Olivier Sentieys:

Design with low complexity fine-grained Dual Core Lock-Step (DCLS) RISC-V processors. 224-229 - Udit Kumar Agarwal, Abraham Chan, Ali Asgari Khoshouyeh, Karthik Pattabiraman:

Towards Reliability Assessment of Systolic Arrays against Stuck-at Faults. 230-236

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














