default search action
51st DSN 2021: Taipei, Taiwan
- 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2021, Taipei, Taiwan, June 21-24, 2021. IEEE 2021, ISBN 978-1-6654-3572-7
- Tzi-cker Chiueh:
Keynote I: Advances in memory state-preserving fault tolerance. xxvii-xxxi - Zitao Chen, Guanpeng Li, Karthik Pattabiraman:
A Low-cost Fault Corrector for Deep Neural Networks through Range Restriction. 1-13 - Maher Khan, Amy Babay:
Toward Intrusion Tolerance as a Service: Confidentiality in Partially Cloud-Based BFT Systems. 14-25 - Pritam Dash, Guanpeng Li, Zitao Chen, Mehdi Karimibiuki, Karthik Pattabiraman:
PID-Piper: Recovering Robotic Vehicles from Physical Attacks. 26-38
Dependability for Machine Learning
- Rachid Guerraoui, Arsany Guirguis, Jérémy Plassmann, Anton Ragot, Sébastien Rouault:
GARFIELD: System Support for Byzantine Machine Learning (Regular Paper). 39-51 - Peterson Yuhala, Pascal Felber, Valerio Schiavoni, Alain Tchana:
Plinius: Secure and Persistent Machine Learning Model Training. 52-62 - Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Surya Nepal, Hyoungshick Kim:
Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN. 63-74 - Jonathan Ponader, Kyle Thomas, Sandip Kundu, Yan Solihin:
MILR: Mathematically Induced Layer Recovery for Plaintext Space Error Correction of CNNs. 75-87
Networking
- Xiang Li, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Qi Li, Youjun Huang:
Fast IPv6 Network Periphery Discovery and Security Implications. 88-100 - Ayush Bhardwaj, Zhenyu Zhou, Theophilus A. Benson:
A Comprehensive Study of Bugs in Software Defined Networks. 101-115 - Simon Scherrer, Markus Legner, Adrian Perrig, Stefan Schmid:
Enabling Novel Interconnection Agreements with Path-Aware Networking Architectures. 116-128 - Francisco Pozo, Guillermo Rodríguez-Navas, Hans Hansson:
Self-Healing Protocol: Repairing Schedules Online after Link Failures in Time-Triggered Networks. 129-140
Attacks, Vulnerabilities, and Patches
- Lukas Baumann, Elias Heftrig, Haya Schulmann, Michael Waidner:
The Master and Parasite Attack. 141-148 - Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, Sushil Jajodia:
PatchDB: A Large-Scale Security Patch Dataset. 149-160 - Qiang Li, Jinke Song, Dawei Tan, Haining Wang, Jiqiang Liu:
PDGraph: A Large-Scale Empirical Study on Project Dependency of Security Vulnerabilities. 161-173 - Seongkyeong Kwon, Seunghoon Woo, Gangmo Seong, Heejo Lee:
OCTOPOCS: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of Concept. 174-185
Systems Dependability
- Rémi Dulong, Rafael Pires, Andreia Correia, Valerio Schiavoni, Pedro Ramalhete, Pascal Felber, Gaël Thomas:
NVCache: A Plug-and-Play NVMM-based I/O Booster for Legacy Systems. 186-198 - Khiem Ngo, Haonan Lu, Wyatt Lloyd:
K2: Reading Quickly from Storage Across Many Datacenters. 199-211 - Francisco Neves, Nuno Machado, Ricardo Vilaça, José Pereira:
Horus: Non-Intrusive Causal Analysis of Distributed Systems Logs. 212-223
Machine Learning for Dependability
- Shouguo Yang, Long Cheng, Yicheng Zeng, Zhe Lang, Hongsong Zhu, Zhiqiang Shi:
Asteria: Deep Learning-based AST-Encoding for Cross-platform Binary Code Similarity Detection. 224-236 - Khalid Ayedh Alharthi, Arshad Jhumka, Sheng Di, Franck Cappello, Edward Chuah:
Sentiment Analysis based Error Detection for Large-Scale Systems. 237-249 - Lun-Pin Yuan, Euijin Choo, Ting Yu, Issa Khalil, Sencun Zhu:
Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous Users. 250-262 - Fan Xu, Shujie Han, Patrick P. C. Lee, Yi Liu, Cheng He, Jiongzhou Liu:
General Feature Selection for Failure Prediction in Large-scale SSD Deployment. 263-270
GPUs
- Gurunath Kadam, Evgenia Smirni, Adwait Jog:
Data-centric Reliability Management in GPUs. 271-283 - Timothy Tsai, Siva Kumar Sastry Hari, Michael B. Sullivan, Oreste Villa, Stephen W. Keckler:
NVBitFI: Dynamic Fault Injection for GPUs. 284-291 - Fernando Fernandes dos Santos, Josie E. Rodriguez Condia, Luigi Carro, Matteo Sonza Reorda, Paolo Rech:
Revealing GPUs Vulnerabilities by Combining Register-Transfer and Software-Level Fault Injection. 292-304 - Amir Taherin, Tirthak Patel, Giorgis Georgakoudis, Ignacio Laguna, Devesh Tiwari:
Examining Failures and Repairs on Supercomputers with Multi-GPU Compute Nodes. 305-313
Systems Security
- Nada Lachtar, Abdulrahman Abu Elkhail, Anys Bacha, Hafiz Malik:
An Application Agnostic Defense Against the Dark Arts of Cryptojacking. 314-325 - Chao Su, Xuhua Ding, Qingkai Zeng:
Catch You With Cache: Out-of-VM Introspection to Trace Malicious Executions. 326-337 - Chengbin Pang, Ruotong Yu, Dongpeng Xu, Eric Koskinen, Georgios Portokalidis, Jun Xu:
Towards Optimal Use of Exception Handling Information for Function Detection. 338-349 - Joseph Connelly, Taylor Roberts, Xing Gao, Jidong Xiao, Haining Wang, Angelos Stavrou:
CloudSkulk: A Nested Virtual Machine Based Rootkit and Its Detection. 350-362
Fault Injection
- Koustubha Bhat, Erik van der Kouwe, Herbert Bos, Cristiano Giuffrida:
FIRestarter: Practical Software Crash Recovery with Targeted Library-level Fault Injection. 363-375 - Romain Cayre, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche, Géraldine Vache Marconato:
WazaBee: attacking Zigbee networks by diverting Bluetooth Low Energy chips. 376-387 - Romain Cayre, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche, Géraldine Vache Marconato:
InjectaBLE: Injecting malicious traffic into established Bluetooth Low Energy connections. 388-399 - Chad Spensky, Aravind Machiry, Nathan Burow, Hamed Okhravi, Rick Housley, Zhongshu Gu, Hani Jamjoom, Christopher Kruegel, Giovanni Vigna:
Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses. 400-412
Trusted Execution Environments
- Weijie Liu, Wenhao Wang, Hongbo Chen, Xiaofeng Wang, Yaosong Lu, Kai Chen, Xinyu Wang, Qintao Shen, Yi Chen, Haixu Tang:
Practical and Efficient in-Enclave Verification of Privacy Compliance. 413-425 - André Martin, Cong Lian, Franz Gregor, Robert Krahn, Valerio Schiavoni, Pascal Felber, Christof Fetzer:
ADAM-CS: Advanced Asynchronous Monotonic Counter Service. 426-437 - Benny Fuhry, Jayanth Jain H. A, Florian Kerschbaum:
EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database Using Enclaves. 438-450
Modeling
- Kizito Salako, Lorenzo Strigini, Xingyu Zhao:
Conservative Confidence Bounds in Safety, from Generalised Claims of Improvement & Statistical Evidence. 451-462 - Shahid Khan, Matthias Volk, Joost-Pieter Katoen, Alexis Braibant, Marc Bouissou:
Model Checking the Multi-Formalism Language FIGARO. 463-470 - Max Taylor, Haicheng Chen, Feng Qin, Christopher Stewart:
Avis: In-Situ Model Checking for Unmanned Aerial Vehicles. 471-483
IoT and Cyber Physical Systems
- Xugui Zhou, Bulbul Ahmed, James H. Aylor, Philip Asare, Homa Alemzadeh:
Data-driven Design of Context-aware Monitors for Hazard Prediction in Artificial Pancreas Systems. 484-496 - Morteza Safaei Pour, Dylan Watson, Elias Bou-Harb:
Sanitizing the IoT Cyber Security Posture: An Operational CTI Feed Backed up by Internet Measurements. 497-506 - Sriharsha Etigowni, Sizhuang Liang, Saman A. Zonouz, Raheem Beyah:
Physics-Aware Security Monitoring against Structural Integrity Attacks in 3D Printers. 507-518 - Zhengxian He, Mohit Narayan Rajput, Mustaque Ahamad:
Compromised Computers Meet Voice Assistants: Stealthily Exfiltrating Data as Voice over Telephony. 519-530
Software Dependability
- Alif Ahmed, Jason D. Hiser, Anh Nguyen-Tuong, Jack W. Davidson, Kevin Skadron:
BigMap: Future-proofing Fuzzers with Efficient Large Maps. 531-542 - Daoyuan Wu, Debin Gao, Robert H. Deng, Rocky K. C. Chang:
When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid. 543-554 - Pietro Borrello, Emilio Coppa, Daniele Cono D'Elia:
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation. 555-568 - Marvin Moog, Markus Demmel, Michael Backes, Aurore Fass:
Statically Detecting JavaScript Obfuscation and Minification Techniques in the Wild. 569-580
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.