default search action
49th DSN 2019: Portland, OR, USA
- 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019, Portland, OR, USA, June 24-27, 2019. IEEE 2019, ISBN 978-1-7281-0057-9
Best Paper Award Candidates
- Georgios Mappouras, Alireza Vahid, A. Robert Calderbank, Daniel J. Sorin:
GreenFlag: Protecting 3D-Racetrack Memory from Shift Errors. 1-12 - Minesh Patel, Jeremie S. Kim, Hasan Hassan, Onur Mutlu:
Understanding and Modeling On-Die Error Correction in Modern DRAM: An Experimental Study Using Real Devices. 13-25 - Athanasios Chatzidimitriou, Pablo Bodmann, George Papadimitriou, Dimitris Gizopoulos, Paolo Rech:
Demystifying Soft Error Assessment Strategies on ARM CPUs: Microarchitectural Fault Injection vs. Neutron Beam Experiments. 26-38
Session 1 - Machine Learning Security
- Qiang Zeng, Jianhai Su, Chenglong Fu, Golam Kayas, Lannan Luo, Xiaojiang Du, Chiu C. Tan, Jie Wu:
A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples. 39-51 - Jiaqi Yan, Guanhua Yan, Dong Jin:
Classifying Malware Represented as Control Flow Graphs using Deep Graph Convolutional Neural Network. 52-63 - Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
ZK-GanDef: A GAN Based Zero Knowledge Adversarial Training Defense for Neural Networks. 64-75
Session 2 - Modeling
- Hananeh Aliee, Faramarz Khosravi, Jürgen Teich:
Efficient Treatment of Uncertainty in System Reliability Analysis using Importance Measures. 76-87 - Hoang Hai Nguyen, Kartik Palani, David M. Nicol:
Extensions of Network Reliability Analysis. 88-99 - Peter Buchholz, Iryna Dohndorf, Jan Kriege:
An Online Approach to Estimate Parameters of Phase-Type Distributions. 100-111
Session 3 - Machine Learning Reliability
- Saurabh Jha, Subho S. Banerjee, Timothy Tsai, Siva Kumar Sastry Hari, Michael B. Sullivan, Zbigniew T. Kalbarczyk, Stephen W. Keckler, Ravishankar K. Iyer:
ML-Based Fault Injection for Autonomous Vehicles: A Case for Bayesian Fault Injection. 112-124 - Weibin Wu, Hui Xu, Sanqiang Zhong, Michael R. Lyu, Irwin King:
Deep Validation: Toward Detecting Real-World Corner Cases for Deep Neural Networks. 125-137 - Ankush Desai, Shromona Ghosh, Sanjit A. Seshia, Natarajan Shankar, Ashish Tiwari:
SOTER: A Runtime Assurance Framework for Programming Safe Robotics Systems. 138-150
Session 4 - Transactions and Concurrency
- Pedro Ramalhete, Andreia Correia, Pascal Felber, Nachshon Cohen:
OneFile: A Wait-Free Persistent Transactional Memory. 151-163 - Zhongmiao Li, Paolo Romano, Peter Van Roy:
Sparkle: Speculative Deterministic Concurrency Control for Partially Replicated Transactional Stores. 164-175 - Alexey Gotsman, Anatole Lefort, Gregory V. Chockler:
White-Box Atomic Multicast. 176-187
Session 5 - Hardware Reliability
- Yanyan Shen, Gernot Heiser, Kevin Elphinstone:
Fault Tolerance Through Redundant Execution on COTS Multicores: Exploring Trade-Offs. 188-200 - Sam Ainsworth, Timothy M. Jones:
ParaMedic: Heterogeneous Parallel Error Correction. 201-213 - Radha Venkatagiri, Khalique Ahmed, Abdulrahman Mahmoud, Sasa Misailovic, Darko Marinov, Christopher W. Fletcher, Sarita V. Adve:
gem5-Approxilyzer: An Open-Source Tool for Application-Level Soft Error Analysis. 214-221
Session 6 - IoT Security
- Jiongyi Chen, Chaoshun Zuo, Wenrui Diao, Shuaike Dong, Qingchuan Zhao, Menghan Sun, Zhiqiang Lin, Yinqian Zhang, Kehuan Zhang:
Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users. 222-233 - Naif Saleh Almakhdhub, Abraham A. Clements, Mathias Payer, Saurabh Bagchi:
BenchIoT: A Security Benchmark for the Internet of Things. 234-246 - K. Virgil English, Islam Obaidat, Meera Sridhar:
Exploiting Memory Corruption Vulnerabilities in Connman for IoT Devices. 247-255
Session 7 - Network Reliability
- Ajay Mahimkar, Zihui Ge, Sanjeev Ahuja, Shomik Pathak, Nauman Shafi:
Rigorous, Effortless and Timely Assessment of Cellular Network Changes. 256-263 - Karla Vargas, Sergio Rajsbaum:
An Eventually Perfect Failure Detector for Networks of Arbitrary Topology Connected with ADD Channels Using Time-To-Live Values. 264-275 - Klaus-Tycho Foerster, Andrzej Kamisinski, Yvonne-Anne Pignolet, Stefan Schmid, Gilles Trédan:
Bonsai: Efficient Fast Failover Routing Using Small Arborescences. 276-288
Session 8 - Hardware Security
- Shengye Wan, Jianhua Sun, Kun Sun, Ning Zhang, Qi Li:
SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors. 289-301 - Kuniyasu Suzaki, Yohei Hori, Kazukuni Kobara, Mohammad Mannan:
DeviceVeil: Robust Authentication for Individual USB Devices Using Physical Unclonable Functions. 302-314 - Mateus Tymburibá, Hugo Sousa, Fernando Magno Quintão Pereira:
Multilayer ROP Protection Via Microarchitectural Units Available in Commodity Hardware. 315-327
Session 9 - IoT and SCADA Reliability
- Amy Babay, John L. Schultz, Thomas Tantillo, Samuel Beckley, Eamon Jordan, Kevin Ruddell, Kevin Jordan, Yair Amir:
Deploying Intrusion-Tolerant SCADA for the Power Grid. 328-335 - Zhongshu Gu, Hani Jamjoom, Dong Su, Heqing Huang, Jialong Zhang, Tengfei Ma, Dimitrios Pendarakis, Ian M. Molloy:
Reaching Data Confidentiality and Model Accountability on the CalTrain. 336-348 - Pengfei Sun, Luis Garcia, Saman A. Zonouz:
Tell Me More Than Just Assembly! Reversing Cyber-Physical Execution Semantics of Embedded IoT Controller Software Binaries. 349-361
Session 10 - Memory Systems Reliability
- Haonan Wang, Adwait Jog:
Exploiting Latency and Error Tolerance of GPGPU Applications for an Energy-Efficient DRAM. 362-374 - Sébastien Ollivier, Donald Kline Jr., Kawsher A. Roxy, Rami G. Melhem, Sanjukta Bhanja, Alex K. Jones:
Leveraging Transverse Reads to Correct Alignment Faults in Domain Wall Memories. 375-387 - Prashant J. Nair, Bahar Asgari, Moinuddin K. Qureshi:
SuDoku: Tolerating High-Rate of Transient Failures for Enabling Scalable STTRAM. 388-400
Session 11 - Trusted Computing
- Judicael Briand Djoko, Jack Lange, Adam J. Lee:
NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGX. 401-413 - Maurice Bailleu, Donald Dragoti, Pramod Bhatotia, Christof Fetzer:
TEE-Perf: A Profiler for Trusted Execution Environments. 414-421 - Brian Delgado, Tejaswini Vibhute, John Fastabend, Karen L. Karavanic:
EPA-RIMM : An Efficient, Performance-Aware Runtime Integrity Measurement Mechanism for Modern Server Platforms. 422-434
Session 12 - Network Security
- Yihe Zhang, Hao Zhang, Xu Yuan, Nian-Feng Tzeng:
Pseudo-Honeypot: Toward Efficient and Scalable Spam Sniffer. 435-446 - Steven R. Gomez, Samuel Jero, Richard Skowyra, Jason Martin, Patrick Sullivan, David Bigelow, Zachary Ellenbogen, Bryan C. Ward, Hamed Okhravi, James W. Landry:
Controller-Oblivious Dynamic Access Control in Software-Defined Networks. 447-459 - Onur Zungur, Guillermo Suarez-Tangil, Gianluca Stringhini, Manuel Egele:
BorderPatrol: Securing BYOD using Fine-Grained Contextual Information. 460-472
Session 13 - Empirical Studies
- Sheng Di, Hanqi Guo, Eric Pershey, Marc Snir, Franck Cappello:
Characterizing and Understanding HPC Job Failures Over The 2K-Day Life of IBM BlueGene/Q System. 473-484 - Xinda Wang, Kun Sun, Archer L. Batcheller, Sushil Jajodia:
Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS. 485-492 - Jeman Park, Aminollah Khormali, Manar Mohaisen, Aziz Mohaisen:
Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers. 493-504
Session 14 - Randomization and Vulnerabilities
- Jonghwan Kim, DaeHee Jang, Yunjong Jeong, Brent ByungHoon Kang:
POLaR: Per-Allocation Object Layout Randomization. 505-516 - David Pouliot, Scott Griffy, Charles V. Wright:
The Strength of Weak Randomization: Easily Deployable, Efficiently Searchable Encryption with Minimal Leakage. 517-529 - Qiang Zeng, Golam Kayas, Emil Mohammed, Lannan Luo, Xiaojiang Du, Junghwan Rhee:
HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding. 530-542
Session 15 - Storage Systems and Blockchain
- Hui Kang, Ting Dai, Nerla Jean-Louis, Shu Tao, Xiaohui Gu:
FabZK: Supporting Privacy-Preserving, Auditable Smart Contracts in Hyperledger Fabric. 543-555 - Zhirong Shen, Xiaolu Li, Patrick P. C. Lee:
Fast Predictive Repair in Erasure-Coded Storage. 556-567 - Guy Golan-Gueta, Ittai Abraham, Shelly Grossman, Dahlia Malkhi, Benny Pinkas, Michael K. Reiter, Dragos-Adrian Seredinschi, Orr Tamir, Alin Tomescu:
SBFT: A Scalable and Decentralized Trust Infrastructure. 568-580
Session 16 - Symbolic Execution
- Jin Huang, Yu Li, Junjie Zhang, Rui Dai:
UChecker: Automatically Detecting PHP-Based Unrestricted File Upload Vulnerabilities. 581-592 - John Criswell, Jie Zhou, Spyridoula Gravani, Xiaoyu Hu:
PrivAnalyzer: Measuring the Efficacy of Linux Privilege Use. 593-604 - Jiaqi Peng, Feng Li, Bingchang Liu, Lili Xu, Binghong Liu, Kai Chen, Wei Huo:
1dVul: Discovering 1-Day Vulnerabilities through Binary Patches. 605-616
Session 17 - Potpourri
- Mohammad A. Noureddine, Ahmed M. Fawaz, Amanda Hsu, Cody Guldner, Sameer Vijay, Tamer Basar, William H. Sanders:
Revisiting Client Puzzles for State Exhaustion Attacks Resilience. 617-629 - Zilong Zhao, Sophie Cerf, Robert Birke, Bogdan Robu, Sara Bouchenak, Sonia Ben Mokhtar, Lydia Y. Chen:
Robust Anomaly Detection on Unreliable Data. 630-637 - Ricardo Couceiro, Gonçalo Duarte, João Durães, João Castelhano, Catarina Duarte, César A. D. Teixeira, Miguel Castelo-Branco, Paulo Carvalho, Henrique Madeira:
Pupillography as Indicator of Programmers' Mental Effort and Cognitive Overload. 638-644
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.