


default search action
47th DSN 2017: Denver, CO, USA
- 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017, Denver, CO, USA, June 26-29, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-0542-4

Best Paper Award Nominees
- Jingwei Li

, Chuan Qin, Patrick P. C. Lee
, Xiaosong Zhang:
Information Leakage in Encrypted Deduplication via Frequency Analysis. 1-12 - Jingyao Fan, Qinghua Li, Guohong Cao:

Privacy Disclosure through Smart Meters: Reactive Power Based Attack and Defense. 13-24 - Guosai Wang, Lifei Zhang, Wei Xu:

What Can We Learn from Four Years of Data Center Hardware Failures? 25-36
Algorithms and Agreement
- Paulo R. Coelho

, Nicolas Schiper, Fernando Pedone
:
Fast Atomic Multicast. 37-48 - Balaji Arun, Sebastiano Peluso, Roberto Palmieri

, Giuliano Losa, Binoy Ravindran
:
Speeding up Consensus by Chasing Fast Decisions. 49-60 - Sisi Duan, Michael K. Reiter, Haibin Zhang:

Secure Causal Atomic Broadcast, Revisited. 61-72
Hardware
- Meng Wang, Huixiang Chen, Tao Li:

Reducing the "Tax" of Reliability: A Hardware-Aware Method for Agile Data Persistence in Mobile Devices. 73-84 - Amin Jadidi, Mohammad Arjomand, Mohammad Khavari Tavana, David R. Kaeli, Mahmut T. Kandemir, Chita R. Das:

Exploring the Potential for Collaborative Data Compression and Hard-Error Tolerance in PCM Memories. 85-96 - Behrooz Sangchoolie, Karthik Pattabiraman, Johan Karlsson:

One Bit is (Not) Enough: An Empirical Study of the Impact of Single and Multiple Bit-Flip Errors. 97-108
Symbolic Execution and Synthesis Tools
- Fan Yao

, Yongbo Li, Yurong Chen, Hongfa Xue, Tian Lan, Guru Venkataramani
:
StatSym: Vulnerable Path Discovery through Statistics-Guided Symbolic Execution. 109-120 - Ilya Tuzov

, David de Andrés, Juan Carlos Ruiz:
Dependability-Aware Design Space Exploration for Optimal Synthesis Parameters Tuning. 121-132 - Qixue Xiao, Yu Chen, Chengang Wu, Kang Li, Junjie Mao, Shize Guo, Yuanchun Shi:

pbSE: Phase-Based Symbolic Execution. 133-144
Trusted Execution
- Chen Tian, Yazhe Wang, Peng Liu, Qihui Zhou, Chengyi Zhang, Zhen Xu:

IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZone. 145-156 - Marcus Brandenburger, Christian Cachin, Matthias Lorenz, Rüdiger Kapitza:

Rollback and Forking Detection for Trusted Execution Environments Using Lightweight Collective Memory. 157-168 - Bruno Vavala, Nuno Ferreira Neves

, Peter Steenkiste
:
Secure Tera-scale Data Crunching with a Small TCB. 169-180
Binaries
- Hui Xu, Yangfan Zhou, Yu Kang, Michael R. Lyu:

Concolic Execution on Small-Size Binaries: Challenges and Empirical Study. 181-188 - Benjamin Kollenda, Enes Göktas, Tim Blazytko, Philipp Koppe, Robert Gawlik, Radhesh Krishnan Konoth, Cristiano Giuffrida

, Herbert Bos
, Thorsten Holz
:
Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables. 189-200 - Rui Qiao, R. Sekar:

Function Interface Analysis: A Principled Approach for Function Recognition in COTS Binaries. 201-212
Cloud
- Bernardo Ferreira

, João Leitão
, Henrique João L. Domingos
:
Multimodal Indexable Encryption for Mobile Cloud-Based Applications. 213-224 - Jinyu Gu, Zhichao Hua, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan, Jinming Li:

Secure Live Migration of SGX Enclaves on Untrusted Cloud. 225-236 - Xing Gao, Zhongshu Gu, Mehmet Kayaalp, Dimitrios Pendarakis, Haining Wang:

ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds. 237-248
Anomaly Detection
- Seunghyeon Lee, Jinwoo Kim

, Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran:
Athena: A Framework for Scalable Anomaly Detection in Software-Defined Networks. 249-260 - Cheng Feng

, Tingting Li
, Deeph Chana:
Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks. 261-272 - Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong:

Random Walk Based Fake Account Detection in Online Social Networks. 273-284
Wireless and Sensors
- Zhili Chen, Lin Chen, Hong Zhong:

Towards Secure and Verifiable Database-Driven Spectrum Sharing. 285-296 - Wei-Han Lee, Ruby B. Lee:

Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning. 297-308 - Wei-Han Lee, Ruby B. Lee:

Sensor-Based Implicit Authentication of Smartphone Users. 309-320 - Varun Badrinath Krishna, Michael J. Rausch, Benjamin E. Ujcich

, Indranil Gupta, William H. Sanders:
REMAX: Reachability-Maximizing P2P Detection of Erroneous Readings in Wireless Sensor Networks. 321-332
Dependable Systems and Software
- Rainer Schiekofer, Johannes Behl, Tobias Distler:

Agora: A Dependable High-Performance Coordination Service for Multi-cores. 333-344 - Yvonne-Anne Pignolet, Stefan Schmid

, Gilles Trédan:
Load-Optimal Local Fast Rerouting for Resilient Networks. 345-356 - Julia Lawall, Gilles Muller:

JMake: Dependable Compilation for Kernel Janitors. 357-366
Measurement Studies
- Amit Klein

, Haya Schulmann, Michael Waidner
:
Counting in the Dark: DNS Caches Discovery and Enumeration in the Internet. 367-378 - Marcello Cinque

, Raffaele Della Corte, Antonio Pecchia:
Entropy-Based Security Analytics: Measurements from a Critical Information System. 379-390 - Babak Rahbarinia, Marco Balduzzi, Roberto Perdisci

:
Exploring the Long Tail of (Malicious) Software Downloads. 391-402
Android
- Yeonjoon Lee

, Tongxin Li, Nan Zhang, Soteris Demetriou
, Mingming Zha, XiaoFeng Wang, Kai Chen, Xiao-yong Zhou, Xinhui Han, Michael Grace:
Ghost Installer in the Shadow: Security Analysis of App Installation on Android. 403-414 - Zhengyang Qu, Shahid Alam

, Yan Chen, Xiaoyong Zhou, Wangjun Hong, Ryan D. Riley:
DyDroid: Measuring Dynamic Code Loading and Its Security Implications in Android Applications. 415-426 - Yacong Gu, Kun Sun, Purui Su, Qi Li, Yemian Lu, Lingyun Ying, Dengguo Feng:

JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android. 427-438
Privacy and Security
- Rachid Guerraoui

, Anne-Marie Kermarrec
, Rhicheek Patra, Mahammad Valiyev, Jingjing Wang:
I Know Nothing about You But Here is What You Might Like. 439-450 - Ping Chen, Jun Xu, Zhisheng Hu, Xinyu Xing, Minghui Zhu, Bing Mao, Peng Liu:

What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon. 451-462 - Birhanu Eshete

, V. N. Venkatakrishnan:
DynaMiner: Leveraging Offline Infection Analytics for On-the-Wire Malware Detection. 463-474
Analytic Models
- Carina Pilch, Anne Remke:

Statistical Model Checking for Hybrid Petri Nets with Multiple General Transitions. 475-486 - Laurent Chuat, Adrian Perrig

, Yih-Chun Hu:
Deadline-Aware Multipath Communication: An Optimization Problem. 487-498 - Daniel D. Dunn, Samuel A. Mitchell, Imran Sajjad, Ryan M. Gerdes, Rajnikant Sharma, Ming Li:

Regular: Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles. 499-510
Power System and Smart Grid
- Yan Liu, Yue Wu, Zbigniew Kalbarczyk:

Smart Maintenance via Dynamic Fault Tree Analysis: A Case Study on Singapore MRT System. 511-518 - Jinkyu Koo, Xiaojun Lin, Saurabh Bagchi:

RL-BLH: Learning-Based Battery Control for Cost Savings and Privacy Preservation for Smart Meters. 519-530 - Devendra Shelar, Pengfei Sun, Saurabh Amin, Saman A. Zonouz:

Compromising Security of Economic Dispatch in Power System Operations. 531-542
Tool/Demo Security and Testing Tools
- Oleksii Oleksenko, Dmitrii Kuvaiskii, Pramod Bhatotia, Christof Fetzer:

Fex: A Software Systems Evaluator. 543-550 - Iberia Medeiros

, Miguel Beatriz, Nuno Ferreira Neves
, Miguel Correia:
Demonstrating a Tool for Injection Attack Prevention in MySQL. 551-558 - William H. Hawkins, Jason D. Hiser, Michele Co, Anh Nguyen-Tuong, Jack W. Davidson:

Zipr: Efficient Static Binary Rewriting for Security. 559-566
Attacks
- Benjamin E. Ujcich

, Uttam Thakore, William H. Sanders:
ATTAIN: An Attack Injection Framework for Software-Defined Networking. 567-578 - Christopher Natoli, Vincent Gramoli:

The Balance Attack or Why Forkable Blockchains are Ill-Suited for Consortium. 579-590 - Yuan Yao, Bin Xiao

, Gaofei Wu, Xue Liu, Zhiwen Yu
, Kailong Zhang, Xingshe Zhou:
Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs. 591-602
Protocol and Behavioral Analysis
- Guido Lena Cota, Sonia Ben Mokhtar, Gabriele Gianini, Ernesto Damiani

, Julia Lawall, Gilles Muller, Lionel Brunie:
Analysing Selfishness Flooding with SEINE. 603-614 - Daiping Liu, Xing Gao, Mingwei Zhang, Haining Wang, Angelos Stavrou

:
Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency. 615-626 - Md. Endadul Hoque

, Omar Chowdhury, Sze Yiu Chau
, Cristina Nita-Rotaru, Ninghui Li:
Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs. 627-638

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














