default search action
54th DSN 2024: Brisbane, Australia
- 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2024, Brisbane, Australia, June 24-27, 2024. IEEE 2024, ISBN 979-8-3503-9572-3
- Juan-Carlos Ruiz-Garcia, Homa Alemzadeh, Jean-Charles Fabre, Jiangshan Yu, Sy-Yen Kuo, Elias P. Duarte:
Test of Time Award; DSN 2024. xxvi - Marco Barletta, Marcello Cinque, Catello Di Martino, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Mutiny! How Does Kubernetes Fail, and What Can We Do About It? 1-14 - Takeru Wada, Hiroshi Yamada:
Reboot-Based Recovery of Unikernels at the Component Level. 15-28 - Sheng Yu, Wei Song, Xunchao Hu, Heng Yin:
On the Correctness of Metadata-Based SBOM Generation: A Differential Analysis Approach. 29-36 - Dimitrios Stavrakakis, Alexandrina Panfil, MJin Nam, Pramod Bhatotia:
SPP: Safe Persistent Pointers for Memory Safety. 37-52 - Ulysse Pavloff, Yackolley Amoussou-Guenou, Sara Tucci Piergiovanni:
Byzantine Attacks Exploiting Penalties in Ethereum PoS. 53-65 - Nhu Long Nguyen, Nickolas J. G. Falkner, Hung X. Nguyen:
ADSynth: Synthesizing Realistic Active Directory Attack Graphs. 66-74 - Ataberk Olgun, Majd Osseiran, A. Giray Yaglikçi, Yahya Can Tugrul, Haocong Luo, Steve Rhyner, Behzad Salami, Juan Gómez-Luna, Onur Mutlu:
Read Disturbance in High Bandwidth Memory: A Detailed Experimental Study on HBM2 DRAM Chips. 75-89 - Zhengyang He, Hui Xu, Guanpeng Li:
A Fast Low-Level Error Detection Technique. 90-98 - Ismail Emir Yüksel, Yahya Can Tugrul, F. Nisa Bostanci, Geraldo F. Oliveira, A. Giray Yaglikçi, Ataberk Olgun, Melina Soysal, Haocong Luo, Juan Gómez-Luna, Mohammad Sadrosadati, Onur Mutlu:
Simultaneous Many-Row Activation in Off-the-Shelf DRAM Chips: Experimental Characterization and Analysis. 99-114 - Xuhang Gu, Qingyang Wang, Jianshu Liu, Jinpeng Wei:
Grunt Attack: Exploiting Execution Dependencies in Microservices. 115-128 - Alvi Ataur Khalil, Mohammad Ashiqur Rahman:
PAROLE: Profitable Arbitrage in Optimistic Rollup with ERC-721 Token Transactions. 129-141 - Shengkun Cui, Saurabh Jha, Ziheng Chen, Zbigniew T. Kalbarczvk, Ravishankar K. Iyer:
iPrism: Characterize and Mitigate Risk by Quantifying Change in Escape Routes. 142-155 - Jean-Baptiste Decourcelle, Boris Teabe, Daniel Hagimont:
JITBULL: Securing JavaScript Runtime with a Go/No-Go Policy for JIT Engine. 156-168 - Danyang Xiao, Diying Yang, Jialun Li, Xu Chen, Weigang Wu:
Privacy Leakage from Logits Attack and its Defense in Federated Distillation. 169-182 - Adriaan Jacobs, Merve Gülmez, Alicia Andries, Stijn Volckaert, Alexios Voulimeneas:
System Call Interposition Without Compromise. 183-194 - Xiaoxuan Lou, Kangjie Chen, Guowen Xu, Han Qiu, Shangwei Guo, Tianwei Zhang:
Protecting Confidential Virtual Machines from Hardware Performance Counter Side Channels. 195-208 - Alejandro Ranchal-Pedrosa, Vincent Gramoli:
ZLB: A Blockchain to Tolerate Colluding Majorities. 209-222 - Marina Minkin, Baris Kasikci:
ZipChannel: Cache Side-Channel Vulnerabilities in Compression Algorithms. 223-237 - Zifeng Niu, Manuel Roveri, Giuliano Casale:
ChainNet: A Customized Graph Neural Network Model for Loss-Aware Edge AI Service Deployment. 238-251 - Houzhe Wang, Xiaojie Zhu, Chi Chen, Paulo Esteves-Veríssimo:
Goldfish: An Efficient Federated Unlearning Framework. 252-264 - Hong-Wei Li, Ping-Ting Liu, Bo-Wei Lin, Yi-Chun Liao, Yennun Huang:
IPMES: A Tool for Incremental TTP Detection Over the System Audit Event Stream. 265-273 - Haofan Zheng, Tuan Tran, Roy Shadmon, Owen Arden:
Decentagram: Highly-Available Decentralized Publish/Subscribe Systems. 274-287 - Xiang Zheng, Xingjun Ma, Shengjie Wang, Xinyu Wang, Chao Shen, Cong Wang:
Toward Evaluating Robustness of Reinforcement Learning with Adversarial Policy. 288-301 - Sudip Maitra, Tolga O. Atalay, Angelos Stavrou, Haining Wang:
Towards Shielding 5G Control Plane Functions. 302-315 - Anamta Khan, Naghmeh Ivaki, Henrique Madeira:
A Comprehensive Study on Drones Resilience in the Presence of Inertial Measurement Unit Faults. 316-323 - Siyuan Tang, Eihal Alowaisheq, Xianghang Mi, Yi Chen, XiaoFeng Wang, Yanzhi Dou:
Stealthy Peers: Understanding Security and Privacy Risks of Peer-Assisted Video Streaming. 324-337 - Kim Hammar, Rolf Stadler:
Intrusion Tolerance for Networked Systems through Two-Level Feedback Control. 338-352 - Zainab Saeed Wattoo, Petal Vitis, Ruizhe Zhu, Noah Depner, Ivory Zhang, Jason Hein, Arpan Gujarati, Margo I. Seltzer:
RABIT, a Robot Arm Bug Intervention Tool for Self-Driving Labs. 353-361 - Yu Zhao, Wenjie Xue, Weijie Chen, Weizhong Qiang, Deqing Zou, Hai Jin:
Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications. 362-376 - Vincent Gramoli, Zhenliang Lu, Qiang Tang, Pouriya Zarbafian:
AOAB: Optimal and Fair Ordering of Financial Transactions. 377-388 - Jinghui Liao, Borui Gong, Wenhai Sun, Fengwei Zhang, Zhenyu Ning, Man Ho Au, Weisong Shi:
BFTRAND: Low-Latency Random Number Provider for BFT Smart Contracts. 389-402 - Song Gao, Bohua Zhan, Zhilin Wu, Lijun Zhang:
Verifying Randomized Consensus Protocols with Common Coins. 403-415 - Junyu Zhang, Pengfei Chen, Zilong He, Hongyang Chen, Xiaoyun Li:
Real-Time Intrusion Detection and Prevention with Neural Network in Kernel Using eBPF. 416-428 - Xingyu Su, Xiaojie Zhu, Yang Li, Yong Li, Chi Chen, Paulo Jorge Esteves Veríssimo:
PagPassGPT: Pattern Guided Password Guessing via Generative Pretrained Transformer. 429-442 - Arian Baloochestani, Hanish Gogada, Leander Jehl, Hein Meling:
Iniva: Inclusive and Incentive-Compatible Vote Aggregation. 443-455 - Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Chen-Da Liu-Zhang, Michael K. Reiter:
Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles. 456-469 - Isaac Doidge, Raghavendra Ramesh, Nibesh Shrestha, Joshua Tobkin:
Moonshot: Optimizing Block Period and Commit Latency in Chain-Based Rotating Leader BFT. 470-482 - Csaba Györgyi, Kim G. Larsen, Stefan Schmid, Jirí Srba:
SyRep: Efficient Synthesis and Repair of Fast Re-Route Forwarding Tables for Resilient Networks. 483-494 - Yuting Xiao, Jiongyi Chen, Yupeng Hu, Jing Huang:
FIRMRES: Exposing Broken Device-Cloud Access Control in IoT Through Static Firmware Analysis. 495-506 - Mingxuan Liu, Zhenglong Jin, Jiahai Yang, Baoiun Liu, Haixin Duan, Ying Liu, Ximeng Liu, Shujun Tang:
ChatScam: Unveiling the Rising Impact of ChatGPT on Domain Name Abuse. 507-521 - Yang Chen, Shengzhi Zhang, Xiaoqi Jia, Qihang Zhou, Heqing Huang, Shaowen Xu, Haochao Du:
SEDSpec: Securing Emulated Devices by Enforcing Execution Specification. 522-534 - Jason Blocklove, Md Raz, Prithwish Basu Roy, Hammond Pearce, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri:
Offramps: An FPGA-Based Intermediary for Analysis and Modification of Additive Manufacturing Control Systems. 535-543
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.