


default search action
54th DSN 2024: Brisbane, Australia - Supplemental Volume
- 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2024 - Supplemental Volume, Brisbane, Australia, June 24-27, 2024. IEEE 2024, ISBN 979-8-3503-9570-9

- Nhung H. Nguyen

, Jin-Hee Cho, Terrence J. Moore, Seunghyun Yoon, Hyuk Lim, Frederica Nelson, Guangdong Bai
, Dan Dongseong Kim
:
AuSSE: A Novel Framework for Security and Safety Evaluation for Autonomous Vehicles. 1-5 - Haocong Luo, Ismail Emir Yüksel, Ataberk Olgun, A. Giray Yaglikçi

, Mohammad Sadrosadati, Onur Mutlu
:
An Experimental Characterization of Combined RowHammer and RowPress Read Disturbance in Modern DRAM Chips. 6-11 - Yang Zhang, Long Wang, Zhengang Wang, Dongdong Shangguan:

Exploring Use of Symbolic Execution for Service Analysis. 12-16 - Haoran Qiu, Weichao Mao, Chen Wang, Saurabh Jha, Hubertus Franke, Chandra Narayanaswami, Zbigniew Kalbarczyk, Tamer Basar, Ravishankar K. Iyer:

When Green Computing Meets Performance and Resilience SLOs. 17-22 - Domenico Cotroneo, Pietro Liguori

:
Neural Fault Injection: Generating Software Faults from Natural Language. 23-27 - Subrat Kumar Swain, Vireshwar Kumar, Guangdong Bai

, Dan Dongseong Kim
:
PANDA: Practical Adversarial Attack Against Network Intrusion Detection. 28-32 - Abraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan:

Harnessing Explainability to Improve ML Ensemble Resilience. 33-37 - Tiago Carvalho, António Casimiro

, Alysson Bessani:
On the Design of Coordination Services for IoT. 38-42 - Niklas Bunzel:

Patching the Cracks: Detecting and Addressing Adversarial Examples in Real-World Applications. 43-46 - Giann Spilere Nandi

, David Pereira, José Proença, Eduardo Tovar, Luís Nogueira
:
Reducing the gap between theory and practice in real-time systems with MARS. 47-49 - Tina Moghaddam, Guowei Yang

, Chandra Thapa, Seyit Camtepe, Dan Dongseong Kim
:
MTD in Plain Sight: Hiding Network Behavior in Moving Target Defenses. 50-52 - Sai Gautam Mandapati

, Chathurika Ranaweera, Robin Doss:
Advancing NDN Security for IoT: Harnessing Machine Learning to Detect Attacks. 53-55 - Manu Jo Varghese

, Adnan Anwar, Frank Jiang, Robin Doss:
Novel CAN Bus Fuzzing Framework for Finding Vulnerabilities in Automotive Systems. 56-58 - Anuj Nepal, Robin Doss, Frank Jiang:

Secure Data Provenance in Internet of Vehicles with Verifiable Credentials for Security and Privacy. 59-61 - Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate

:
(Re)-envisioning Approximate Agreement for Distributed Cryptography and Oracles. 62-64 - Taylor T. Johnson

, Diego Manzanas Lopez, Hoang-Dung Tran:
Tutorial: Safe, Secure, and Trustworthy Artificial Intelligence (AI) via Formal Verification of Neural Networks and Autonomous Cyber-Physical Systems (CPS) with NNV. 65-66 - Sushmita Ruj:

Zero-Knowledge Proofs for Blockchains. 67-68 - Andrei Lebedev, Vincent Gramoli:

Evaluating Performance and Dependability of Blockchain Protocols with Diablo. 69-70 - Karthik Pattabiraman, Abraham Chan:

Tutorial: LLTFI and the Art of Fault Injection. 71-72 - Jiongliang Lin, Yiwen Guo, Hao Chen:

Intrusion Detection at Scale with the Assistance of a Command-line Language Model. 73-79 - Shengye Wan, Joshua Saxe, Craig Gomes, Sahana Chennabasappa, Avilash Rath, Kun Sun, Xinda Wang:

Bridging the Gap: A Study of AI-based Vulnerability Management between Industry and Academia. 80-87 - Qiao Yu, Wengui Zhang, Min Zhou, Jialiang Yu, Zhenli Sheng, Jasmin Bogatinovski, Jorge Cardoso, Odej Kao:

Investigating Memory Failure Prediction Across CPU Architectures. 88-95 - Guofeng Li, Xia Feng, Liang-Min Wang, Haiqin Wu

, Boris Düdder
:
Federated Unlearning in the Internet of Vehicles. 96-103 - Fatema Bannat Wala, Stephan Bohacek:

Zone-Hopping: Sensitive Information Leakage Prevention for DNSSEC-NSEC. 104-110 - Saurabh Hukerikar, Atieh Lotfi, Yanxiang Huang, Jason Campbell, Nirmal R. Saxena:

Optimizing Large-Scale Fault Injection Experiments through Martingale Hypothesis: A Systematic Approach for Reliability Assessment of Safety-Critical Systems. 111-117 - Casidhe Hutchison, Milda Zizyte, David Guttendorf, Claire Le Goues, Philip Koopman:

Active Learning Omnivariate Decision Trees for Fault Diagnosis in Robotic Systems. 118-124 - Kurt Friday, Elias Bou-Harb, Ron Lee, Pramod Peethambaran, Mayank Saxena:

Empowering Data Centers with Computational Storage Drive-Based Deep Learning Inference Functionality to Combat Ransomware. 125-132 - Wei-Jia Chen, Chia-Yi Hsu, Wei-Bin Lee, Chia-Mu Yu, Chun-Ying Huang:

Road Decals as Trojans: Disrupting Autonomous Vehicle Navigation with Adversarial Patterns. 133-140 - Saurabh Jha, Jesus Rios, Naoki Abe, Frank Bagehorn, Laura Shwartz:

Fault Localization Using Interventional Causal Learning for Cloud-Native Applications. 141-147 - Chunjiong Zhang

, Byeong-Hee Roh, Gaoyang Shan:
Federated Anomaly Detection. 148-149 - Huiju Lee, Huy Kang Kim:

Mitigating False Positives in DGA Detection for Non-English Domain Names. 150-151 - Ziqiang Xu, Ahmad Salehi S., Naveen K. Chilamkurti:

Cryptography-Based Bootstrapping Scheme for Permissionless Sharding Blockchain. 152-153 - Christian Berger, Hans P. Reiser:

Poster: Optimizing Tree-based Quorum Certification for BFT Systems at Planetary-Scale. 154-156 - Niousha Nazemi, Omid Tavallaie

, Shuaijun Chen, Albert Y. Zomaya
, Ralph Holz
:
Boosting Communication Efficiency of Federated Learning's Secure Aggregation. 157-158 - Shuwen Liu, Yongfeng Qian, Yixue Hao:

Balancing Privacy and Attack Utility: Calibrating Sample Difficulty for Membership Inference Attacks in Transfer Learning. 159-160 - Yu-Chen Hsiao, Chia-Heng Yen

, Bo-Yang Ke, Kai-Chiang Wu:
Synergizing GCN and GAT for Hardware Trojan Detection and Localization. 161-162

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














