


default search action
55th DSN 2025: Naples, Italy
- 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2025, Naples, Italy, June 23-26, 2025. IEEE 2025, ISBN 979-8-3315-1201-9

- Christian Böttger, Henry Hosseini, Christine Utz, Nurullah Demir, Jan Hörnemann, Christian Wressnegger, Thomas Hupperich

, Norbert Pohlmann, Matteo Große-Kampmann, Tobias Urban:
Privacy from 5 PM to 6 AM: Tracking and Transparency Mechanisms in the HbbTV Ecosystem. 1-15 - F. Nisa Bostanci, Konstantinos Kanellopoulos, Ataberk Olgun, A. Giray Yaglikçi, Ismail Emir Yüksel, Nika Mansouri-Ghiasi, Zülal Bingöl, Mohammad Sadrosadati, Onur Mutlu:

Revisiting Main Memory-Based Covert and Side Channel Attacks in the Context of Processing-in-Memory. 16-32 - Zilong Zhao, Han Wu, Aad van Moorsel, Lydia Y. Chen:

GTV: Generating Tabular Data via Vertical Federated Learning. 33-46 - Yong Zhao, Ang Xia, Jie Yin, Zhi Wang, Yaqin Cao, Xiangyi Zeng, Yuling Liu:

BASSET: Enhancing Binary Code Clone Searching through Multi-Level Hybrid Semantic Indexing. 47-60 - Ke He, Dan Dongseong Kim

, Muhammad Rizwan Asghar:
LAGER: Layer-wise Graph Feature Extractor for Network Intrusion Detection. 61-74 - Junchen Hou, Lan Zhang:

VerifyVFL: Practical Verifiable Vertical Federated Learning. 75-87 - Md Rashedul Hasan, Mohannad Alhanahnah, Clay Stevens, Hamid Bagheri:

Towards More Dependable Specifications: An Empirical Study Exploring the Synergy of Traditional and LLM-Based Repair Approaches. 88-101 - Yuanda Wang, Xinhui Han:

PTC: Prefix Tuning CodeT5 for High-Quality Secure Network Measurement Script Generation. 102-115 - Tolga O. Atalay, Alireza Famili, Sudip Maitra, Dragoslav Stojadinovic, Angelos Stavrou, Haining Wang:

5G-STREAM: Service Mesh Tailored for Reliable, Efficient and Authorized Microservices in the Cloud. 116-128 - Yuwei Yang, Skyler Grandel, Jeremy Lacomis, Edward J. Schwartz, Bogdan Vasilescu, Claire Le Goues, Kevin Leach:

A Human Study of Automatically Generated Decompiler Annotations. 129-142 - Nicolas Michel, Mohamed E. Najd, Ghada Almashaqbeh:

ammBoost: State Growth Control for AMMs. 143-156 - Kezhi Xiong, Soonwon Moon, Joshua H. Kang, Bryant Curto, Jieung Kim, Ji-Yong Shin:

ReCraft: Self-Contained Split, Merge, and Membership Change of Raft Protocol. 157-170 - Hao Tian, Hao-Tian Wu, Yiu-Ming Cheung, Junhui He, Zhihong Tian:

Semantically Improved Adversarial Attack Based on Masked Language Model via Context Preservation. 171-182 - Lorenzo Cazzaro

, Stefano Calzavara, Maksim Kovalkov, Aleksei Stafeev, Giancarlo Pellegrino:
Less is More: Boosting Coverage of Web Crawling through Adversarial Multi-Armed Bandit. 183-192 - Md. Raihan Ahmed, Jainta Paul, Levi Taiji Li, Luis Garcia, Mu Zhang:

ICSTracker: Backtracking Intrusions in Modern Industrial Control Systems. 193-207 - Pierrick Philippe, Mohamed Sabt, Pierre-Alain Fouque:

GnuZero: A Compiler-Based Zeroization Static Detection Tool for the Masses. 208-221 - Pasquale De Rosa

, Simon Queyrut, Yérom-David Bromberg, Pascal Felber, Valerio Schiavoni:
PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM Opcodes. 222-232 - Zhengyi Li, Wei Cheng, Huanrong Tang, Yaohua Wang:

GREAT: Global Representation and Edge-Attention for Hardware Trojan Detection. 233-245 - Hong-Wei Li, Ping-Ting Liu, Bo-Wei Lin, Yennun Huang:

IPMES+: Enhancing Incremental TTP Detection with Frequency and Flow Semantics. 246-255 - Margie Ruffin, Chenkai Wang

, Gheorghe Almási, Abdulhamid Adebayo, Hubertus Franke, Gang Wang:
Towards Continuous Integrity Attestation and Its Challenges in Practice: A Case Study of Keylime. 256-265 - Qihang Peng, Mingming Zhang

, Deliang Chang, Jia Zhang, Baojun Liu, Haixin Duan:
Decoding DNS Centralization: Measuring and Identifying NS Domains Across Hosting Providers. 266-278 - Andrea De Murtas, Daniele Cono D'Elia, Giuseppe Antonio Di Luna, Pascal Felber, Leonardo Querzoni, Valerio Schiavoni:

ConfBench: A Tool for Easy Evaluation of Confidential Virtual Machines. 279-288 - Haoran Wang, Zheng Yang, Sangdon Park, Yibin Yang, Seulbae Kim, Willian T. Lunardi

, Martin Andreoni, Taesoo Kim, Wenke Lee:
SoundBoost: Effective RCA and Attack Detection for UAV via Acoustic Side-Channel. 289-302 - Hanwen Feng

, Zhenliang Lu
, Tiancheng Mai, Qiang Tang:
Faster Hash-based Multi-valued Validated Asynchronous Byzantine Agreement. 303-316 - Liqun Shan, Xingli Zhang, Md. Imran Hossen, Xiali Hei:

LiveGuard: Voice Liveness Detection via Wavelet Scattering Transform and Mel Spectrogram Scaling. 317-330 - Oguzhan Canpolat, Ataberk Olgun, David Novo, Oguz Ergin, Onur Mutlu:

EasyDRAM: An FPGA-based Infrastructure for Fast and Accurate End-to-End Evaluation of Emerging DRAM Techniques. 331-344 - Jialiang Dong

, Xinzhang Chen, Willy Susilo
, Nan Sun
, Arash Shaghaghi, Siqi Ma:
What Lies Beneath: An Empirical Study of Silent Vulnerability Fixes in Open-Source Software. 345-357 - Danut-Valentin Copae, Reza Soltani

, Milan Lopuhaä-Zwakenberg
:
Attack-Defense Trees with Offensive and Defensive Attributes. 358-370 - Xiaoyan Zhou, Ying Zhang, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li:

An Analysis of Malicious Packages in Open-Source Software in the Wild. 371-385 - Minli Julie Liao, Sam Ainsworth, Lev Mukhanov, Adrián Barredo, Markos Kynigos, Timothy M. Jones:

ParaVerser: Harnessing Heterogeneous Parallelism for Affordable Fault Detection in Data Centers. 386-400 - Larry Huynh, Yinghao Zhang, Djimon Jayasundera, Woojin Jeon, Hyoungshick Kim, Tingting Bi

, Jin B. Hong:
Detecting Code Vulnerabilities using LLMs. 401-414 - Mohammad Amir Salari, Abhinav Kumar, Federico Rinaudi, Reza Tourani, Alessio Sacco, Flavio Esposito:

Privacy Analysis of Oblivious DNS over HTTPS: a Website Fingerprinting Study. 415-428 - Ranjitha K., Medha Rachel Panna, Stavan Nilesh Christian, Karuturi Havya Sree, Sri Hari Malla, Dheekshitha Bheemanath, Rinku Shah, Praveen Tammana:

Securing In-Network Traffic Control Systems with P4Auth. 429-442 - Mert D. Pesé, Bulut Gözübüyük, Eric Andrechek, Habeeb Olufowobi, Mohammad Hamad, Kang G. Shin:

MichiCAN: Spoofing and Denial-of-Service Protection using Integrated CAN Controllers. 443-456 - Xiaodong Lei, Yongjun Wang, Lin Liu, Jun-Jie Huang, Jiangyong Shi, Luming Yang:

SemiAF: Semi-Supervised App Fingerprinting on Unknown Traffic via Graph Neural Network. 457-469 - Renjie Li, Zhou Zhou, Hao Miao, Fengyuan Shi, Qingyun Liu:

MalTAG: Encrypted Malware Traffic Detection Framework via Graph Based Flow Interaction Mining. 470-482 - Nikhilesh Singh, Chester Rebeiro:

Valkyrie: A Response Framework to Augment Runtime Detection of Time-Progressive Attacks. 483-496 - Carmine Cesarano, Roberto Natella:

KubeFence: Security Hardening of the Kubernetes Attack Surface. 497-510 - Suman Kumar, Abhishek Kumar Mishra

, Anup Das, Nagarajan Kandasamy:
Hierarchical Model-Based Approach for Concurrent Testing of Neuromorphic Architecture. 511-523 - Liliana Kistenmacher

, Anum Talpur, Mathias Fischer:
QUIC-Aware Load Balancing: Attacks and Mitigations. 524-536 - Pritam Dash, Karthik Pattabiraman:

RAVAGE: Robotic Autonomous Vehicles' Attack Generation Engine. 537-546 - Zi-Xuan Huang, Jia-Wei Chen, Zhi-Peng Zhang, Chia-Mu Yu:

Prompting the Unseen: Detecting Hidden Backdoors in Black-Box Models. 547-561 - Moein Ghaniyoun, Kristin Barber, Yinqian Zhang, Radu Teodorescu:

MicroSampler: A Framework for Microarchitecture-Level Leakage Detection in Constant Time Execution. 562-575 - Yuqi Liu, Rui Xi, Karthik Pattabiraman:

Reentrancy Redux: The Evolution of Real-World Reentrancy Attacks on Blockchains. 576-588 - Jason Yih, Katerina Goseva-Popstojanova, Michel Cukier:

On Security Vulnerabilities in Transportation IoT Devices. 589-598 - Cheng Chen, Grant Xiao, Daehyun Lee, Lishan Yang

, Evgenia Smirni
, Homa Alemzadeh, Xugui Zhou:
Safety Interventions against Adversarial Patches in an Open-Source Driver Assistance System. 599-608 - Djob Mvondo, Yérom-David Bromberg:

Secure access to network data for mobile network traffic analysis applications. 609-626 - Daniele Ottaviano

, Marco Barletta, Francesco Boccola:
Zero-Interference Containers: A Framework to Orchestrate Mixed-Criticality Applications. 627-636 - Wassim Yahyaoui, Joachim Bruneau-Queyreix, Jérémie Decouchant, Marcus Völp

:
Mitigating Front-Running Attacks through Fair and Resilient Transaction Dissemination. 637-649 - Elyssa Boulila

, Marc Dacier, Siva Prem Vengadessa Peroumal, Nicolas Veys, Simone Aonzo:
A Closer Look At Modern Evasive Phishing Emails. 650-663 - Moumita Das Purba, Bill Chu, Will French:

Towards Automated and Explainable Threat Hunting with Generative AI. 664-677 - Carlos Nkuba Kayembe

, Jimin Kang, Seunghoon Woo, Heejo Lee:
ZCover: Uncovering Z-Wave Controller Vulnerabilities Through Systematic Security Analysis of Application Layer Implementation. 678-690 - Abraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan:

ReMlX: Resilience for ML Ensembles using XAI at Inference against Faulty Training Data. 691-705 - Muneeba Asif, Jean C. Tonday Rodriguez, Mohammad Kumail Kazmi, Mohammad Ashiqur Rahman

, Kemal Akkaya:
"I will always be by your side": A Side-Channel Aided PWM-based Holistic Attack Recovery for Unmanned Aerial Vehicles. 706-719 - Qiang Wen, Júlio Mendonça

, Fumio Machida, Marcus Völp
:
Multi-version Machine Learning and Rejuvenation for Resilient Perception in Safety-critical Systems. 720-733 - XiangRui Zhang, XueJie Du, HaoYu Chen, Yongzhong He, Wenjia Niu, Qiang Li:

Automatically Generating Rules of Malicious Software Packages via Large Language Model. 734-747

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














