


default search action
55th DSN 2025: Naples, Italy
- 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2025, Naples, Italy, June 23-26, 2025. IEEE 2025, ISBN 979-8-3315-1201-9
- Christian Böttger, Henry Hosseini, Christine Utz, Nurullah Demir, Jan Hörnemann, Christian Wressnegger, Thomas Hupperich
, Norbert Pohlmann, Matteo Große-Kampmann, Tobias Urban:
Privacy from 5 PM to 6 AM: Tracking and Transparency Mechanisms in the HbbTV Ecosystem. 1-15 - F. Nisa Bostanci, Konstantinos Kanellopoulos, Ataberk Olgun, A. Giray Yaglikçi, Ismail Emir Yüksel, Nika Mansouri-Ghiasi, Zülal Bingöl, Mohammad Sadrosadati, Onur Mutlu:
Revisiting Main Memory-Based Covert and Side Channel Attacks in the Context of Processing-in-Memory. 16-32 - Zilong Zhao, Han Wu, Aad van Moorsel, Lydia Y. Chen:
GTV: Generating Tabular Data via Vertical Federated Learning. 33-46 - Yong Zhao, Ang Xia, Jie Yin, Zhi Wang, Yaqin Cao, Xiangyi Zeng, Yuling Liu:
BASSET: Enhancing Binary Code Clone Searching through Multi-Level Hybrid Semantic Indexing. 47-60 - Ke He, Dan Dongseong Kim
, Muhammad Rizwan Asghar:
LAGER: Layer-wise Graph Feature Extractor for Network Intrusion Detection. 61-74 - Junchen Hou, Lan Zhang:
VerifyVFL: Practical Verifiable Vertical Federated Learning. 75-87 - Md Rashedul Hasan, Mohannad Alhanahnah, Clay Stevens, Hamid Bagheri:
Towards More Dependable Specifications: An Empirical Study Exploring the Synergy of Traditional and LLM-Based Repair Approaches. 88-101 - Yuanda Wang, Xinhui Han:
PTC: Prefix Tuning CodeT5 for High-Quality Secure Network Measurement Script Generation. 102-115 - Tolga O. Atalay, Alireza Famili, Sudip Maitra, Dragoslav Stojadinovic, Angelos Stavrou, Haining Wang:
5G-STREAM: Service Mesh Tailored for Reliable, Efficient and Authorized Microservices in the Cloud. 116-128 - Yuwei Yang, Skyler Grandel, Jeremy Lacomis, Edward J. Schwartz, Bogdan Vasilescu, Claire Le Goues, Kevin Leach:
A Human Study of Automatically Generated Decompiler Annotations. 129-142 - Nicolas Michel, Mohamed E. Najd, Ghada Almashaqbeh:
ammBoost: State Growth Control for AMMs. 143-156 - Kezhi Xiong, Soonwon Moon, Joshua H. Kang, Bryant Curto, Jieung Kim, Ji-Yong Shin:
ReCraft: Self-Contained Split, Merge, and Membership Change of Raft Protocol. 157-170 - Hao Tian, Hao-Tian Wu, Yiu-Ming Cheung, Junhui He, Zhihong Tian:
Semantically Improved Adversarial Attack Based on Masked Language Model via Context Preservation. 171-182 - Lorenzo Cazzaro
, Stefano Calzavara, Maksim Kovalkov, Aleksei Stafeev, Giancarlo Pellegrino:
Less is More: Boosting Coverage of Web Crawling through Adversarial Multi-Armed Bandit. 183-192 - Md. Raihan Ahmed, Jainta Paul, Levi Taiji Li, Luis Garcia, Mu Zhang:
ICSTracker: Backtracking Intrusions in Modern Industrial Control Systems. 193-207 - Pierrick Philippe, Mohamed Sabt, Pierre-Alain Fouque:
GnuZero: A Compiler-Based Zeroization Static Detection Tool for the Masses. 208-221 - Pasquale De Rosa
, Simon Queyrut, Yérom-David Bromberg, Pascal Felber, Valerio Schiavoni:
PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM Opcodes. 222-232 - Zhengyi Li, Wei Cheng, Huanrong Tang, Yaohua Wang:
GREAT: Global Representation and Edge-Attention for Hardware Trojan Detection. 233-245 - Hong-Wei Li, Ping-Ting Liu, Bo-Wei Lin, Yennun Huang:
IPMES+: Enhancing Incremental TTP Detection with Frequency and Flow Semantics. 246-255 - Margie Ruffin, Chenkai Wang
, Gheorghe Almási, Abdulhamid Adebayo, Hubertus Franke, Gang Wang:
Towards Continuous Integrity Attestation and Its Challenges in Practice: A Case Study of Keylime. 256-265 - Qihang Peng, Mingming Zhang
, Deliang Chang, Jia Zhang, Baojun Liu, Haixin Duan:
Decoding DNS Centralization: Measuring and Identifying NS Domains Across Hosting Providers. 266-278 - Andrea De Murtas, Daniele Cono D'Elia, Giuseppe Antonio Di Luna, Pascal Felber, Leonardo Querzoni, Valerio Schiavoni:
ConfBench: A Tool for Easy Evaluation of Confidential Virtual Machines. 279-288 - Haoran Wang, Zheng Yang, Sangdon Park, Yibin Yang, Seulbae Kim, Willian T. Lunardi
, Martin Andreoni, Taesoo Kim, Wenke Lee:
SoundBoost: Effective RCA and Attack Detection for UAV via Acoustic Side-Channel. 289-302 - Hanwen Feng
, Zhenliang Lu
, Tiancheng Mai, Qiang Tang:
Faster Hash-based Multi-valued Validated Asynchronous Byzantine Agreement. 303-316 - Liqun Shan, Xingli Zhang, Md. Imran Hossen, Xiali Hei:
LiveGuard: Voice Liveness Detection via Wavelet Scattering Transform and Mel Spectrogram Scaling. 317-330 - Oguzhan Canpolat, Ataberk Olgun, David Novo, Oguz Ergin, Onur Mutlu:
EasyDRAM: An FPGA-based Infrastructure for Fast and Accurate End-to-End Evaluation of Emerging DRAM Techniques. 331-344 - Jialiang Dong
, Xinzhang Chen, Willy Susilo
, Nan Sun
, Arash Shaghaghi, Siqi Ma:
What Lies Beneath: An Empirical Study of Silent Vulnerability Fixes in Open-Source Software. 345-357 - Danut-Valentin Copae, Reza Soltani
, Milan Lopuhaä-Zwakenberg
:
Attack-Defense Trees with Offensive and Defensive Attributes. 358-370 - Xiaoyan Zhou, Ying Zhang, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li:
An Analysis of Malicious Packages in Open-Source Software in the Wild. 371-385 - Minli Julie Liao, Sam Ainsworth, Lev Mukhanov, Adrián Barredo, Markos Kynigos, Timothy M. Jones:
ParaVerser: Harnessing Heterogeneous Parallelism for Affordable Fault Detection in Data Centers. 386-400 - Larry Huynh, Yinghao Zhang, Djimon Jayasundera, Woojin Jeon, Hyoungshick Kim, Tingting Bi
, Jin B. Hong:
Detecting Code Vulnerabilities using LLMs. 401-414 - Mohammad Amir Salari, Abhinav Kumar, Federico Rinaudi, Reza Tourani, Alessio Sacco, Flavio Esposito:
Privacy Analysis of Oblivious DNS over HTTPS: a Website Fingerprinting Study. 415-428 - Ranjitha K., Medha Rachel Panna, Stavan Nilesh Christian, Karuturi Havya Sree, Sri Hari Malla, Dheekshitha Bheemanath, Rinku Shah, Praveen Tammana:
Securing In-Network Traffic Control Systems with P4Auth. 429-442 - Mert D. Pesé, Bulut Gözübüyük, Eric Andrechek, Habeeb Olufowobi, Mohammad Hamad, Kang G. Shin:
MichiCAN: Spoofing and Denial-of-Service Protection using Integrated CAN Controllers. 443-456 - Xiaodong Lei, Yongjun Wang, Lin Liu, Jun-Jie Huang, Jiangyong Shi, Luming Yang:
SemiAF: Semi-Supervised App Fingerprinting on Unknown Traffic via Graph Neural Network. 457-469 - Renjie Li, Zhou Zhou, Hao Miao, Fengyuan Shi, Qingyun Liu:
MalTAG: Encrypted Malware Traffic Detection Framework via Graph Based Flow Interaction Mining. 470-482 - Nikhilesh Singh, Chester Rebeiro:
Valkyrie: A Response Framework to Augment Runtime Detection of Time-Progressive Attacks. 483-496 - Carmine Cesarano, Roberto Natella:
KubeFence: Security Hardening of the Kubernetes Attack Surface. 497-510 - Suman Kumar, Abhishek Kumar Mishra
, Anup Das, Nagarajan Kandasamy:
Hierarchical Model-Based Approach for Concurrent Testing of Neuromorphic Architecture. 511-523 - Liliana Kistenmacher
, Anum Talpur, Mathias Fischer:
QUIC-Aware Load Balancing: Attacks and Mitigations. 524-536 - Pritam Dash, Karthik Pattabiraman:
RAVAGE: Robotic Autonomous Vehicles' Attack Generation Engine. 537-546 - Zi-Xuan Huang, Jia-Wei Chen, Zhi-Peng Zhang, Chia-Mu Yu:
Prompting the Unseen: Detecting Hidden Backdoors in Black-Box Models. 547-561 - Moein Ghaniyoun, Kristin Barber, Yinqian Zhang, Radu Teodorescu:
MicroSampler: A Framework for Microarchitecture-Level Leakage Detection in Constant Time Execution. 562-575 - Yuqi Liu, Rui Xi, Karthik Pattabiraman:
Reentrancy Redux: The Evolution of Real-World Reentrancy Attacks on Blockchains. 576-588 - Jason Yih, Katerina Goseva-Popstojanova, Michel Cukier:
On Security Vulnerabilities in Transportation IoT Devices. 589-598 - Cheng Chen, Grant Xiao, Daehyun Lee, Lishan Yang
, Evgenia Smirni
, Homa Alemzadeh, Xugui Zhou:
Safety Interventions against Adversarial Patches in an Open-Source Driver Assistance System. 599-608 - Djob Mvondo, Yérom-David Bromberg:
Secure access to network data for mobile network traffic analysis applications. 609-626 - Daniele Ottaviano
, Marco Barletta, Francesco Boccola:
Zero-Interference Containers: A Framework to Orchestrate Mixed-Criticality Applications. 627-636 - Wassim Yahyaoui, Joachim Bruneau-Queyreix, Jérémie Decouchant, Marcus Völp
:
Mitigating Front-Running Attacks through Fair and Resilient Transaction Dissemination. 637-649 - Elyssa Boulila
, Marc Dacier, Siva Prem Vengadessa Peroumal, Nicolas Veys, Simone Aonzo:
A Closer Look At Modern Evasive Phishing Emails. 650-663 - Moumita Das Purba, Bill Chu, Will French:
Towards Automated and Explainable Threat Hunting with Generative AI. 664-677 - Carlos Nkuba Kayembe
, Jimin Kang, Seunghoon Woo, Heejo Lee:
ZCover: Uncovering Z-Wave Controller Vulnerabilities Through Systematic Security Analysis of Application Layer Implementation. 678-690 - Abraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan:
ReMlX: Resilience for ML Ensembles using XAI at Inference against Faulty Training Data. 691-705 - Muneeba Asif, Jean C. Tonday Rodriguez, Mohammad Kumail Kazmi, Mohammad Ashiqur Rahman
, Kemal Akkaya:
"I will always be by your side": A Side-Channel Aided PWM-based Holistic Attack Recovery for Unmanned Aerial Vehicles. 706-719 - Qiang Wen, Júlio Mendonça
, Fumio Machida, Marcus Völp
:
Multi-version Machine Learning and Rejuvenation for Resilient Perception in Safety-critical Systems. 720-733 - XiangRui Zhang, XueJie Du, HaoYu Chen, Yongzhong He, Wenjia Niu, Qiang Li:
Automatically Generating Rules of Malicious Software Packages via Large Language Model. 734-747

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.