


default search action
54th DSN 2024: Brisbane, Australia
- 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2024, Brisbane, Australia, June 24-27, 2024. IEEE 2024, ISBN 979-8-3503-9572-3

- Juan-Carlos Ruiz-Garcia, Homa Alemzadeh, Jean-Charles Fabre, Jiangshan Yu, Sy-Yen Kuo, Elias P. Duarte:

Test of Time Award; DSN 2024. xxvi - Marco Barletta, Marcello Cinque, Catello Di Martino, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:

Mutiny! How Does Kubernetes Fail, and What Can We Do About It? 1-14 - Takeru Wada, Hiroshi Yamada:

Reboot-Based Recovery of Unikernels at the Component Level. 15-28 - Sheng Yu, Wei Song, Xunchao Hu, Heng Yin

:
On the Correctness of Metadata-Based SBOM Generation: A Differential Analysis Approach. 29-36 - Dimitrios Stavrakakis, Alexandrina Panfil, MJin Nam, Pramod Bhatotia:

SPP: Safe Persistent Pointers for Memory Safety. 37-52 - Ulysse Pavloff, Yackolley Amoussou-Guenou, Sara Tucci Piergiovanni:

Byzantine Attacks Exploiting Penalties in Ethereum PoS. 53-65 - Nhu Long Nguyen, Nickolas J. G. Falkner, Hung X. Nguyen:

ADSynth: Synthesizing Realistic Active Directory Attack Graphs. 66-74 - Ataberk Olgun, Majd Osseiran, A. Giray Yaglikçi

, Yahya Can Tugrul, Haocong Luo, Steve Rhyner, Behzad Salami, Juan Gómez-Luna, Onur Mutlu
:
Read Disturbance in High Bandwidth Memory: A Detailed Experimental Study on HBM2 DRAM Chips. 75-89 - Zhengyang He, Hui Xu, Guanpeng Li:

A Fast Low-Level Error Detection Technique. 90-98 - Ismail Emir Yüksel, Yahya Can Tugrul, F. Nisa Bostanci, Geraldo F. Oliveira

, A. Giray Yaglikçi, Ataberk Olgun, Melina Soysal, Haocong Luo, Juan Gómez-Luna, Mohammad Sadrosadati, Onur Mutlu
:
Simultaneous Many-Row Activation in Off-the-Shelf DRAM Chips: Experimental Characterization and Analysis. 99-114 - Xuhang Gu

, Qingyang Wang, Jianshu Liu, Jinpeng Wei:
Grunt Attack: Exploiting Execution Dependencies in Microservices. 115-128 - Alvi Ataur Khalil, Mohammad Ashiqur Rahman

:
PAROLE: Profitable Arbitrage in Optimistic Rollup with ERC-721 Token Transactions. 129-141 - Shengkun Cui, Saurabh Jha, Ziheng Chen

, Zbigniew T. Kalbarczvk, Ravishankar K. Iyer:
iPrism: Characterize and Mitigate Risk by Quantifying Change in Escape Routes. 142-155 - Jean-Baptiste Decourcelle, Boris Teabe, Daniel Hagimont:

JITBULL: Securing JavaScript Runtime with a Go/No-Go Policy for JIT Engine. 156-168 - Danyang Xiao, Diying Yang

, Jialun Li
, Xu Chen, Weigang Wu:
Privacy Leakage from Logits Attack and its Defense in Federated Distillation. 169-182 - Adriaan Jacobs, Merve Gülmez

, Alicia Andries, Stijn Volckaert, Alexios Voulimeneas
:
System Call Interposition Without Compromise. 183-194 - Xiaoxuan Lou, Kangjie Chen, Guowen Xu, Han Qiu, Shangwei Guo, Tianwei Zhang:

Protecting Confidential Virtual Machines from Hardware Performance Counter Side Channels. 195-208 - Alejandro Ranchal-Pedrosa, Vincent Gramoli:

ZLB: A Blockchain to Tolerate Colluding Majorities. 209-222 - Marina Minkin, Baris Kasikci:

ZipChannel: Cache Side-Channel Vulnerabilities in Compression Algorithms. 223-237 - Zifeng Niu

, Manuel Roveri, Giuliano Casale:
ChainNet: A Customized Graph Neural Network Model for Loss-Aware Edge AI Service Deployment. 238-251 - Houzhe Wang, Xiaojie Zhu, Chi Chen, Paulo Esteves-Veríssimo:

Goldfish: An Efficient Federated Unlearning Framework. 252-264 - Hong-Wei Li, Ping-Ting Liu

, Bo-Wei Lin, Yi-Chun Liao
, Yennun Huang:
IPMES: A Tool for Incremental TTP Detection Over the System Audit Event Stream. 265-273 - Haofan Zheng

, Tuan Tran, Roy Shadmon, Owen Arden:
Decentagram: Highly-Available Decentralized Publish/Subscribe Systems. 274-287 - Xiang Zheng

, Xingjun Ma, Shengjie Wang, Xinyu Wang
, Chao Shen, Cong Wang:
Toward Evaluating Robustness of Reinforcement Learning with Adversarial Policy. 288-301 - Sudip Maitra, Tolga O. Atalay, Angelos Stavrou, Haining Wang:

Towards Shielding 5G Control Plane Functions. 302-315 - Anamta Khan, Naghmeh Ivaki, Henrique Madeira:

A Comprehensive Study on Drones Resilience in the Presence of Inertial Measurement Unit Faults. 316-323 - Siyuan Tang, Eihal Alowaisheq, Xianghang Mi, Yi Chen, XiaoFeng Wang, Yanzhi Dou:

Stealthy Peers: Understanding Security and Privacy Risks of Peer-Assisted Video Streaming. 324-337 - Kim Hammar, Rolf Stadler:

Intrusion Tolerance for Networked Systems through Two-Level Feedback Control. 338-352 - Zainab Saeed Wattoo, Petal Vitis, Ruizhe Zhu, Noah Depner, Ivory Zhang, Jason Hein, Arpan Gujarati, Margo I. Seltzer:

RABIT, a Robot Arm Bug Intervention Tool for Self-Driving Labs. 353-361 - Yu Zhao, Wenjie Xue, Weijie Chen, Weizhong Qiang, Deqing Zou, Hai Jin:

Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications. 362-376 - Vincent Gramoli, Zhenliang Lu

, Qiang Tang
, Pouriya Zarbafian:
AOAB: Optimal and Fair Ordering of Financial Transactions. 377-388 - Jinghui Liao, Borui Gong, Wenhai Sun, Fengwei Zhang, Zhenyu Ning, Man Ho Au, Weisong Shi:

BFTRAND: Low-Latency Random Number Provider for BFT Smart Contracts. 389-402 - Song Gao, Bohua Zhan, Zhilin Wu, Lijun Zhang:

Verifying Randomized Consensus Protocols with Common Coins. 403-415 - Junyu Zhang, Pengfei Chen, Zilong He, Hongyang Chen, Xiaoyun Li:

Real-Time Intrusion Detection and Prevention with Neural Network in Kernel Using eBPF. 416-428 - Xingyu Su

, Xiaojie Zhu, Yang Li, Yong Li, Chi Chen, Paulo Jorge Esteves Veríssimo:
PagPassGPT: Pattern Guided Password Guessing via Generative Pretrained Transformer. 429-442 - Arian Baloochestani, Hanish Gogada, Leander Jehl, Hein Meling:

Iniva: Inclusive and Incentive-Compatible Vote Aggregation. 443-455 - Akhil Bandarupalli

, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Chen-Da Liu-Zhang, Michael K. Reiter:
Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles. 456-469 - Isaac Doidge, Raghavendra Ramesh, Nibesh Shrestha, Joshua Tobkin:

Moonshot: Optimizing Block Period and Commit Latency in Chain-Based Rotating Leader BFT. 470-482 - Csaba Györgyi, Kim G. Larsen

, Stefan Schmid
, Jirí Srba
:
SyRep: Efficient Synthesis and Repair of Fast Re-Route Forwarding Tables for Resilient Networks. 483-494 - Yuting Xiao

, Jiongyi Chen, Yupeng Hu, Jing Huang:
FIRMRES: Exposing Broken Device-Cloud Access Control in IoT Through Static Firmware Analysis. 495-506 - Mingxuan Liu, Zhenglong Jin, Jiahai Yang, Baoiun Liu, Haixin Duan, Ying Liu, Ximeng Liu, Shujun Tang:

ChatScam: Unveiling the Rising Impact of ChatGPT on Domain Name Abuse. 507-521 - Yang Chen, Shengzhi Zhang

, Xiaoqi Jia, Qihang Zhou
, Heqing Huang, Shaowen Xu, Haochao Du:
SEDSpec: Securing Emulated Devices by Enforcing Execution Specification. 522-534 - Jason Blocklove, Md Raz, Prithwish Basu Roy, Hammond Pearce, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri:

Offramps: An FPGA-Based Intermediary for Analysis and Modification of Additive Manufacturing Control Systems. 535-543

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














