


default search action
55th DSN 2025: Naples, Italy - Supplemental Volume
- 2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2025 - Supplemental Volume, Naples, Italy, June 23-26, 2025. IEEE 2025, ISBN 979-8-3315-1203-3

- Zhihan Jiang, Rui Ren, Guangba Yu, Yulun Wu, Wenwei Gu, Yichen Li, Yujie Huang, Cong Feng, Zengyin Yang, Yongqiang Yang, Michael R. Lyu:

LLMPrism: Black-box Performance Diagnosis for Production LLM Training Platforms. 1-7 - Nawel Benarba, Mathieu Chevalier, Sara Bouchenak, Benjamin Bertin, Olivier Jung:

Anomaly Detection in Energy Performance Certificates - From Oblivious to Enlightened. 8-14 - Odd Ivar Haugen, Aleks Karlsen, Steven Mearns, Jan van Tiggelen:

Beyond Component Failures: Safety Challenges in Complex Maritime Control Systems. 15-21 - Zhilong Wang, Neha Nagaraja, Lan Zhang, Hayretdin Bahsi, Pawan Patil, Peng Liu:

To Protect the LLM Agent Against the Prompt Injection Attack with Polymorphic Prompt. 22-28 - Elisa Chiapponi, Umberto Fontana, Elyssa Boulila

, Claudio Costanza, Vincent Rigal, Olivier Thonnard:
When Features Gets Exploited: Functional Abuse and the Future of Industrial Fraud Prevention. 29-35 - Majed Valad Beigi, Yi Cao, Grace Tsai, Sudhanva Gurumurthi, Vilas Sridharan:

DDR5 DRAM Faults in the Field. 36-41 - Stephan Kleber, Jeremias Eppler, Tim Palm, Dennis Eisermann, Frank Kargl:

Assessing the Transferability of Adversarial Patches in Real-World Systems: Implications for Adversarial Testing of Image Recognition Security. 42-48 - Carmine Cesarano, Alessio Foggia, Gianluca Roscigno, Luca Andreani, Roberto Natella:

Security-by-Design at the Telco Edge with OSS: Challenges and Lessons Learned. 49-55 - Larry Huynh, Jake Hesford, Daniel Cheng, Alan Wan, Seungho Kim, Hyoungshick Kim, Jin B. Hong:

Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice. 56-62 - Mario Fiorentino

, Michele Caggiano, Alessandro Magliacane, Angelo Coppola, Andrea Marchetta:
Bridging the Safety Gap: A C-ITS Solution for Protecting Vulnerable Road Users. 63-69 - Andrea Bastoni, Alexander Zuepke, Marco Solieri:

Observe and Regulate Memory Interference on MPSoC: a Practical Approach. 70-76 - Wenwei Gu, Jiazhen Gu, Renyi Zhong, Wenyu Zhang, Ming Li, Michael R. Lyu:

Cordial: Cross-row Failure Prediction Method Based on Bank-level Error Locality for HBMs. 77-83 - Daeho Kim, Eun-Kyu Lee, Jiwoo Lee:

Energy-Efficient Anomaly Detection in Autonomous Vehicles Using RSNNs. 84-90 - Yilin Sun, Dian Lyu, Cheng Cui, Hui Xu:

KubeChecker: Detecting Configuration Bugs in Container Orchestration. 91-97 - Mike Da Silva

, Nga Nguyen:
Quantitative Security Metrics: Assessment of Cyberattack Scenarios for Cyber-Physical Systems. 98-104 - Alfredo Petruolo, Luigi Coppolino, Roberto Nardone, Luigi Romano:

Regulating Prosumer Device Security: a Key Priority in Power Grid Protection. 105-111 - Hisham Unniyankal

, Davide Ancona, Angelo Ferrando, Fabio Parodi, Alessandro Alessi, Federico Bottino:
Runtime Verification of Program Organization Units in Safe Programmable Logic Controller Systems. 112-118 - Leonardo da Costa, Witor Oliveira, Caio Peres, Rene de Mello, Jonghun Song, Seokwon Jeong, Hyungchul Jung:

On the Feasibility of Exploiting the USB Power Line for Side-Channel Attacks against Samsung Smartphone Models. 119-125 - Roberto Moratore, Eduardo Barbaro, Yury Zhauniarovich:

IAM Role Diet: A Scalable Approach to Detecting RBAC Data Inefficiencies. 126-132 - Matthieu Bettinger

, Sonia Ben Mokhtar, Anthony Simonet-Boulogne:
An Open-source Implementation and Security Analysis of Triad's TEE Trusted Time Protocol. 133-139 - Xun Jiao, Abhinav Pandey, Karthik Pattabiraman, Fan Fred Lin:

Large-Scale AI Infra Reliability: Challenges, Strategies, and Llama 3 Training Experience. 140-146 - Olusiji Medaiyese, Fred Lin, Harish Dattatraya Dixit, Richa Mishra, Andrea Baglioni, Leandro Silva, Mike Elkin, Andrei Ilyashenko, Gor Safaryan, Dhankaran Singh Ajravat, Xun Jiao, Vineet Parekh:

Hardware Telemetry at Scale: A Case Study on SSDs Endurance Monitoring in Datacenters. 147-152 - Davide Ancona, Stefano Avola, Angelo Ferrando, Pierpaolo Baglietto, Maurice H. ter Beek, Andrea Parodi, Giancarlo Camera, Matteo Pinasco:

Integrating Testing with Runtime Verification for Mission-Critical Distributed Control Systems. 153-159 - Michal Nazarewicz

, Dhruv D. Jain
, Miguel Matos, Blas Rodriguez:
Be My Guest: Welcoming Interoperability into IBC-Incompatible Blockchains. 160-166 - Sebastian Schroder, Yao Deng, Alice James

, Avishkar Seth
, Kye Morton, Subhas Mukhopadhyay
, Richard Han
, Xi Zheng
:
Towards Robust Autonomous Landing Systems: Iterative Solutions and Key Lessons Learned. 167-173 - Pietro Liguori

, Roberto Natella, Domenico Cotroneo:
Generative AI in Cybersecurity: Generating Offensive Code from Natural Language. 174-175 - Hazel Murray, George O'Mahony, Anila Mjeda:

Quantum Computing and Post-Quantum Cryptography: Preparing for the Next Era of Cybersecurity. 176-177 - Jackson Clark, Rohan R. Arora, Saurabh Jha:

Benchmarking AI Agents for IT Automation Tasks with ITBench. 178-179 - Antonella Del Pozzo, Maxence Perion:

Decentralized Federated Learning: Enhancing Reliability with Blockchain. 180-181 - Vincent Gramoli, Rachid Guerraoui, Andrei Lebedev, Gauthier Voron:

Evaluating Blockchain Fault Tolerance with Stabl. 182-183 - András Földvári, András Pataricza:

Model-based Qualitative Dependability and Security Evaluation : Half-Day Tutorial. 184-185 - Michael Kevvay, Vladislav Gryaznykh, Oleg Kirovskii, Anton Korolev:

Assessing the Validity of LLM-Driven Hazard Analysis: An Assessor's Perspective. 186-190 - Roy Shadmon

, Owen Arden:
Enhancing Accuracy in Approximate Byzantine Agreement with Bayesian Inference. 191-195 - Nathanaël Denis, Roberto Di Pietro

:
Replicating Human Immune System via Harmonic Radar: A Framework and Preliminary Results in Thwarting Cyber-physical Attacks. 196-200 - Davide Rovelli, Patrick Eugster:

Digital Cluster Circuits for Reliable Datacenters. 201-205 - Yannis Formery, Léo Mendiboure, Jonathan Villain, Virginie Deniau, Christophe Gransart, Stéphane Delbruel:

Trusted Federated Learning: Towards a Partial Zero-Knowledge Proof Approach. 206-210 - Stéphane Delbruel, Léo Mendiboure, Yannis Formery, Joachim Bruneau-Queyreix, Laurent Réveillère:

UniPHY: Unified Physical Layer Security for LPWANs. 211-215 - João Imperadeiro, Ana Nunes Alonso, José Pereira:

Rethinking BFT: Leveraging Diverse Software Components with LLMs. 216-220 - Tommaso Puccetti:

Strategies to Describe and Timely Detect Attacks. 221-223 - Yuriko Ueda, Marin Wada, Miho Adachi, Ryusuke Miyamoto:

Effect of Human-Selected Hard Examples to Improve Accuracy of Semantic Segmentation. 224-226 - Paul R. B. Houssel

, Sylvie Laniepce, Olivier Levillain:
Towards Provenance for Cybersecurity in Cloud-Native Production Infrastructure. 227-229 - Francesco Marchiori, Mauro Conti

:
Leaving No Blind Spots: Toward Automotive Cybersecurity. 230-232 - Antonio Iannaccone

, Roberto Nardone:
Enhanced Cybersecurity Monitoring in Multi-Plant Flexible Manufacturing Environments. 233-235 - Trishna Rajkumar

, Johnny Öberg:
On Predictive Modeling of Multi-Bit Upsets for Emulated Fault Injection. 236-238 - Qingyang Zhang, Fumio Machida:

AI Agent-based Adaptive Task Offloading for Autonomous Drones in Dynamic Environments. 239-241 - Pasquale De Rosa

, Pascal Felber, Valerio Schiavoni:
ScamDetect: Towards a Robust, Agnostic Framework to Uncover Threats in Smart Contracts. 242-244 - Seong-Su Yoon, Dong-Hyuk Shin, Ieck-Chae Euom:

DeepICS: Deep Causal Relationship Modeling for Multi-Source Log-Based Anomaly Detection in Industrial Control Systems. 245-246 - Lewis Tseng, Yu-Tsun Shao:

Poster: Designing Scalable, Secure Systems for Atomic-Scale Physical AI: Enabling Open Science and Collaborative Data Management and Analytics. 247-248 - Lewis Tseng:

Poster: Agree to Disagree: Revisiting the Comparison of (Multi-)Paxos and Raft. 249-230 - Rina Mishra, Gaurav Varshney, Shreya Singh:

Jailbreaking Generative AI: Empowering Novices to Conduct Phishing Attacks. 251-252 - Min-Chieh Wu

, Yu-Sung Wu:
Adaptive Identity Management: Unified Personalization and Privacy Protection for Web Apps. 253-254 - Hyejin Kim, Seunghyun Yoon, Dan Dongseong Kim

, Jin-Hee Cho, Terrence J. Moore, Frederica F. Nelson, Hyuk Lim:
Intrusion Detection System with Domain-incremental Continual Learning. 255-256 - Umberto Fontana, Elisa Chiapponi, Claudio Costanza, Vincent Rigal, Olivier Thonnard, Martynas Buozis, Hervé Debar:

Detecting Scrapers on E-commerce Websites Using a Reduced Feature Set. 257-258 - Ijaz Ahmad, Joongheon Kim, Seokjoo Shin:

Learnable Encryption with a Diffusion Property. 259-260 - Sora Okada, Masaya Shimakawa, Takashi Minohara:

Security Vulnerability Risk Growth Model based on CVSS 4.0. 261-262 - Xinzhang Chen, Hassan Ali

, Arash Shaghaghi, Salil S. Kanhere, Sanjay K. Jha:
TOSense: We Read, You Click. 263-264 - Pasquale De Rosa, Simon Queyrut, Yérom-David Bromberg, Pascal Felber, Valerio Schiavoni:

PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM Opcodes. 265-266 - Tetsuro Takahashi, Rikima Mitsuhashi

, Masakatsu Nishigaki
, Tetsushi Ohki:
Study of Appropriate Information Combination in Image-based Obfuscated Malware Detection. 267-268 - André Augusto, Rafael Belchior, Jonas Pfannschmidt, André Vasconcelos, Miguel Correia:

Looking for Anomalies in Cross-Chain Bridges. 269-270 - Seunghyun Yoon, Ryangsoo Kim, Hark Yoo, Hyuk Lim:

Real-Time GOOSE Attack Detection in IEC 61850 Substations Using SDN-Based Traffic Inspection. 271-272

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














