


default search action
51st DSN 2021: Taipei, Taiwan
- 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2021, Taipei, Taiwan, June 21-24, 2021. IEEE 2021, ISBN 978-1-6654-3572-7

- Tzi-cker Chiueh:

Keynote I: Advances in memory state-preserving fault tolerance. xxvii-xxxi - Zitao Chen

, Guanpeng Li, Karthik Pattabiraman:
A Low-cost Fault Corrector for Deep Neural Networks through Range Restriction. 1-13 - Maher Khan, Amy Babay

:
Toward Intrusion Tolerance as a Service: Confidentiality in Partially Cloud-Based BFT Systems. 14-25 - Pritam Dash, Guanpeng Li, Zitao Chen

, Mehdi Karimibiuki, Karthik Pattabiraman:
PID-Piper: Recovering Robotic Vehicles from Physical Attacks. 26-38
Dependability for Machine Learning
- Rachid Guerraoui

, Arsany Guirguis, Jérémy Plassmann, Anton Ragot, Sébastien Rouault:
GARFIELD: System Support for Byzantine Machine Learning (Regular Paper). 39-51 - Peterson Yuhala

, Pascal Felber
, Valerio Schiavoni
, Alain Tchana:
Plinius: Secure and Persistent Machine Learning Model Training. 52-62 - Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Surya Nepal, Hyoungshick Kim:

Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN. 63-74 - Jonathan Ponader, Kyle Thomas, Sandip Kundu, Yan Solihin:

MILR: Mathematically Induced Layer Recovery for Plaintext Space Error Correction of CNNs. 75-87
Networking
- Xiang Li

, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Qi Li, Youjun Huang:
Fast IPv6 Network Periphery Discovery and Security Implications. 88-100 - Ayush Bhardwaj, Zhenyu Zhou, Theophilus A. Benson:

A Comprehensive Study of Bugs in Software Defined Networks. 101-115 - Simon Scherrer, Markus Legner, Adrian Perrig, Stefan Schmid

:
Enabling Novel Interconnection Agreements with Path-Aware Networking Architectures. 116-128 - Francisco Pozo, Guillermo Rodríguez-Navas, Hans Hansson:

Self-Healing Protocol: Repairing Schedules Online after Link Failures in Time-Triggered Networks. 129-140
Attacks, Vulnerabilities, and Patches
- Lukas Baumann, Elias Heftrig, Haya Schulmann, Michael Waidner

:
The Master and Parasite Attack. 141-148 - Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, Sushil Jajodia:

PatchDB: A Large-Scale Security Patch Dataset. 149-160 - Qiang Li, Jinke Song, Dawei Tan, Haining Wang, Jiqiang Liu:

PDGraph: A Large-Scale Empirical Study on Project Dependency of Security Vulnerabilities. 161-173 - Seongkyeong Kwon, Seunghoon Woo

, Gangmo Seong, Heejo Lee:
OCTOPOCS: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of Concept. 174-185
Systems Dependability
- Rémi Dulong, Rafael Pires

, Andreia Correia, Valerio Schiavoni
, Pedro Ramalhete, Pascal Felber
, Gaël Thomas:
NVCache: A Plug-and-Play NVMM-based I/O Booster for Legacy Systems. 186-198 - Khiem Ngo, Haonan Lu, Wyatt Lloyd:

K2: Reading Quickly from Storage Across Many Datacenters. 199-211 - Francisco Neves

, Nuno Machado, Ricardo Vilaça
, José Pereira
:
Horus: Non-Intrusive Causal Analysis of Distributed Systems Logs. 212-223
Machine Learning for Dependability
- Shouguo Yang, Long Cheng, Yicheng Zeng, Zhe Lang

, Hongsong Zhu, Zhiqiang Shi:
Asteria: Deep Learning-based AST-Encoding for Cross-platform Binary Code Similarity Detection. 224-236 - Khalid Ayedh Alharthi, Arshad Jhumka, Sheng Di, Franck Cappello, Edward Chuah:

Sentiment Analysis based Error Detection for Large-Scale Systems. 237-249 - Lun-Pin Yuan, Euijin Choo, Ting Yu, Issa Khalil

, Sencun Zhu:
Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous Users. 250-262 - Fan Xu, Shujie Han, Patrick P. C. Lee

, Yi Liu, Cheng He, Jiongzhou Liu:
General Feature Selection for Failure Prediction in Large-scale SSD Deployment. 263-270
GPUs
- Gurunath Kadam

, Evgenia Smirni
, Adwait Jog:
Data-centric Reliability Management in GPUs. 271-283 - Timothy Tsai, Siva Kumar Sastry Hari, Michael B. Sullivan, Oreste Villa, Stephen W. Keckler:

NVBitFI: Dynamic Fault Injection for GPUs. 284-291 - Fernando Fernandes dos Santos, Josie E. Rodriguez Condia

, Luigi Carro, Matteo Sonza Reorda
, Paolo Rech:
Revealing GPUs Vulnerabilities by Combining Register-Transfer and Software-Level Fault Injection. 292-304 - Amir Taherin, Tirthak Patel

, Giorgis Georgakoudis
, Ignacio Laguna, Devesh Tiwari:
Examining Failures and Repairs on Supercomputers with Multi-GPU Compute Nodes. 305-313
Systems Security
- Nada Lachtar, Abdulrahman Abu Elkhail, Anys Bacha, Hafiz Malik

:
An Application Agnostic Defense Against the Dark Arts of Cryptojacking. 314-325 - Chao Su

, Xuhua Ding
, Qingkai Zeng:
Catch You With Cache: Out-of-VM Introspection to Trace Malicious Executions. 326-337 - Chengbin Pang, Ruotong Yu, Dongpeng Xu, Eric Koskinen, Georgios Portokalidis

, Jun Xu:
Towards Optimal Use of Exception Handling Information for Function Detection. 338-349 - Joseph Connelly, Taylor Roberts, Xing Gao, Jidong Xiao, Haining Wang, Angelos Stavrou

:
CloudSkulk: A Nested Virtual Machine Based Rootkit and Its Detection. 350-362
Fault Injection
- Koustubha Bhat, Erik van der Kouwe

, Herbert Bos
, Cristiano Giuffrida
:
FIRestarter: Practical Software Crash Recovery with Targeted Library-level Fault Injection. 363-375 - Romain Cayre

, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche, Géraldine Vache Marconato:
WazaBee: attacking Zigbee networks by diverting Bluetooth Low Energy chips. 376-387 - Romain Cayre

, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche, Géraldine Vache Marconato:
InjectaBLE: Injecting malicious traffic into established Bluetooth Low Energy connections. 388-399 - Chad Spensky, Aravind Machiry, Nathan Burow, Hamed Okhravi

, Rick Housley, Zhongshu Gu, Hani Jamjoom, Christopher Kruegel, Giovanni Vigna:
Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses. 400-412
Trusted Execution Environments
- Weijie Liu

, Wenhao Wang, Hongbo Chen
, Xiaofeng Wang, Yaosong Lu, Kai Chen, Xinyu Wang, Qintao Shen, Yi Chen, Haixu Tang:
Practical and Efficient in-Enclave Verification of Privacy Compliance. 413-425 - André Martin, Cong Lian, Franz Gregor, Robert Krahn

, Valerio Schiavoni
, Pascal Felber
, Christof Fetzer:
ADAM-CS: Advanced Asynchronous Monotonic Counter Service. 426-437 - Benny Fuhry

, Jayanth Jain H. A, Florian Kerschbaum:
EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database Using Enclaves. 438-450
Modeling
- Kizito Salako

, Lorenzo Strigini, Xingyu Zhao
:
Conservative Confidence Bounds in Safety, from Generalised Claims of Improvement & Statistical Evidence. 451-462 - Shahid Khan, Matthias Volk, Joost-Pieter Katoen, Alexis Braibant, Marc Bouissou:

Model Checking the Multi-Formalism Language FIGARO. 463-470 - Max Taylor, Haicheng Chen

, Feng Qin, Christopher Stewart
:
Avis: In-Situ Model Checking for Unmanned Aerial Vehicles. 471-483
IoT and Cyber Physical Systems
- Xugui Zhou, Bulbul Ahmed, James H. Aylor, Philip Asare, Homa Alemzadeh

:
Data-driven Design of Context-aware Monitors for Hazard Prediction in Artificial Pancreas Systems. 484-496 - Morteza Safaei Pour

, Dylan Watson, Elias Bou-Harb:
Sanitizing the IoT Cyber Security Posture: An Operational CTI Feed Backed up by Internet Measurements. 497-506 - Sriharsha Etigowni, Sizhuang Liang, Saman A. Zonouz, Raheem Beyah:

Physics-Aware Security Monitoring against Structural Integrity Attacks in 3D Printers. 507-518 - Zhengxian He, Mohit Narayan Rajput, Mustaque Ahamad:

Compromised Computers Meet Voice Assistants: Stealthily Exfiltrating Data as Voice over Telephony. 519-530
Software Dependability
- Alif Ahmed, Jason D. Hiser, Anh Nguyen-Tuong, Jack W. Davidson, Kevin Skadron

:
BigMap: Future-proofing Fuzzers with Efficient Large Maps. 531-542 - Daoyuan Wu

, Debin Gao
, Robert H. Deng
, Rocky K. C. Chang:
When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid. 543-554 - Pietro Borrello

, Emilio Coppa
, Daniele Cono D'Elia:
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation. 555-568 - Marvin Moog, Markus Demmel, Michael Backes, Aurore Fass:

Statically Detecting JavaScript Obfuscation and Minification Techniques in the Wild. 569-580

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














