Abstract is missing.
- Foreword for the Industry TrackSy-Yen Kuo, Hari Ramasamy, Bob Swarz, Alan Wood. 1 [doi]
- Autonomous Driving System : Model Based Safety AnalysisMohamed Tlig, Mathilde Machin, Romain Kerneis, Emmanuel Arbaretier, Linda Zhao, Florent Meurville, Jean Van Frank. 2-5 [doi]
- Measuring and Exploiting Guardbands of Server-Grade ARMv8 CPU Cores and DRAMsKonstantinos Tovletoglou, Lev Mukhanov, Georgios Karakonstantis, Athanasios Chatzidimitriou, George Papadimitriou, Manolis Kaliorakis, Dimitris Gizopoulos, Zacharias Hadjilambrou, Yiannakis Sazeides, Alejandro Lampropulos, Shidhartha Das, Phong Vo. 6-9 [doi]
- Hardening the Core: Understanding and Detection of XNU Kernel VulnerabilitiesXianyu Liu, Min Zheng, Aimin Pan, Quan Lu. 10-13 [doi]
- Hardware Remediation at ScaleFan Lin, Matt Beadon, Harish Dattatraya Dixit, Gautham Vunnam, Amol Desai, Sriram Sankar. 14-17 [doi]
- Cross-Stack Threat Sensing for Cyber Security and ResilienceFrederico Araujo, Teryl Taylor, Jialong Zhang, Marc Ph. Stoecklin. 18-21 [doi]
- Lifeguard: Local Health Awareness for More Accurate Failure DetectionArmon Dadgar, James Phillips, Jon Currey. 22-25 [doi]
- Diagnosing Failures of Cloud Management ActionsRohit Ranchal, Praveen Jayachandran. 26-29 [doi]
- ConfEx: Towards Automating Software Configuration Analytics in the CloudOzan Tuncer, Nilton Bila, Sastry S. Duri, Canturk Isci, Ayse Kivilcim Coskun. 30-33 [doi]
- A Large-Scale System for Real-Time Glucose MonitoringLong H. Vu, Venkata N. Pavuluri, Yuan-Chi Chang, Deepak S. Turaga, Alex Zhong, Pratik Agrawal, Amit Singh, Boyi Jiang, Krishna Chirutha. 34-37 [doi]
- Challenges of DB2 Restore in a Distributed Systems Environment and Engineered SolutionsPratik Mukherjee, Valentina Salapura. 38-42 [doi]
- Dependability in a Multi-tenant Multi-framework Deep Learning as-a-Service PlatformScott Boag, Parijat Dube, Kaoutar El Maghraoui, Benjamin Herta, Waldemar Hummer, K. R. Jayaram, Rania Khalaf, Vinod Muthusamy, Michael H. Kalantar, Archit Verma. 43-46 [doi]
- EUBra-BIGSEA, A Cloud-Centric Big Data Scientific Research PlatformIgnacio Blanquer, Wagner Meira Jr.. 47-48 [doi]
- SWAMP: Smart Water Management Platform Overview and Security ChallengesCarlos Kamienski, João H. Kleinschmidt, Juha-Pekka Soininen, Kari Kolehmainen, Luca Roffia, Marcos Visoli, Rodrigo Filev Maia, Stenio Fernandes. 49-50 [doi]
- ATMOSPHERE: Adaptive, Trustworthy, Manageable, Orchestrated, Secure, Privacy-Assuring, Hybrid Ecosystem for REsilient Cloud ComputingFrancisco V. Brasileiro, Andrey Brito, Ignacio Blanquer. 51-52 [doi]
- SecureCloud: Secure Big Data Processing in Untrusted CloudsAndrey Brito, Christof Fetzer. 53-54 [doi]
- AVFI: Fault Injection for Autonomous VehiclesSaurabh Jha, Subho S. Banerjee, James Cyriac, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer. 55-56 [doi]
- Reconfiguration Strategies for Critical Adaptive Distributed Embedded SystemsAlberto Ballesteros, Julian Proenza, Manuel Barranco, Luís Almeida 0001. 57-58 [doi]
- Towards Lightweight Temporal and Fault Isolation in Mixed-Criticality Systems with Real-Time ContainersMarcello Cinque, Domenico Cotroneo. 59-60 [doi]
- Finding Top-k Most Frequent Items in Distributed Streams in the Time-Sliding Window ModelEmmanuelle Anceaume, Yann Busnel, Vasile Cazacu. 61-62 [doi]
- Mixing Time and Spatial Redundancy Over Time Sensitive NetworkingInes Alvarez, Julian Proenza, Manuel Barranco. 63-64 [doi]
- Stateless Security Risk Assessment for Dynamic NetworksJin Bum Hong, Simon Enoch Yusuf, Dong Seong Kim, Khaled M. D. Khan. 65-66 [doi]
- Using Diverse Detectors for Detecting Malicious Web Scraping ActivityPedro Marques, Zayani Dabbabi, Miruna-Mihaela Mironescu, Olivier Thonnard, Frances V. Buontempo, Ilir Gashi, Alysson Bessani. 67-68 [doi]
- On Verifying and Assuring the Cloud SLA by Evaluating the Performance of SaaS Web Services Across Multi-cloud ProvidersAbdallah Ali Zainelabden Abdallah Ibrahim, Sébastien Varrette, Pascal Bouvry. 69-70 [doi]
- Sources of Variation in Error Sensitivity Measurements, Significant or Not?Fatemeh Ayatolahi, Johan Karlsson. 71-72 [doi]
- Towards Dynamic End-to-End Privacy Preserving Data ClassificationRania Talbi, Sara Bouchenak, Lydia Y. Chen. 73-74 [doi]
- HIT: Hybrid-Mode Information Flow Tracking with Taint Semantics Extraction and ReplayYu Hsin Hung, Hong-wei Li, Yu-Sung Wu, Bing-Jhong Jheng, Yennun Huang. 75-76 [doi]
- An Analysis of Automated Software Diversity Using Unstructured Text AnalyticsAndrew S. Gearhart, Peter A. Hamilton, Joel Coffman. 79-80 [doi]
- Random Mining Group Selection to Prevent 51% Attacks on BitcoinJaewon Bae, Hyuk Lim. 81-82 [doi]
- PRESEnCE: A Framework for Monitoring, Modelling and Evaluating the Performance of Cloud SaaS Web ServicesAbdallah Ali Zainelabden Abdallah Ibrahim. 83-86 [doi]
- Mu-Transaction Sagas in DerechoSagar Jha. 87-91 [doi]
- Enhanced Dependability Evaluation Through Krylov Methods and Matrix Functions: The Case of Load-Sharing SystemsGiulio Masetti. 92-95 [doi]
- Design, Development and Implementation of a Network Intrusion Detection Tool for Air Traffic Management SystemsThobald de Riberolles. 96-99 [doi]
- Best of SELSE 2018 IntroductionAlan Wood. 100 [doi]
- Hamartia: A Fast and Accurate Error Injection FrameworkChun-Kai Chang, Sangkug Lym, Nicholas Kelly, Michael B. Sullivan, Mattan Erez. 101-108 [doi]
- Low Cost Transient Fault Protection Using Loop Output PredictionSunghyun Park, Shikai Li, Scott A. Mahlke. 109-113 [doi]
- Parity++: Lightweight Error Correction for Last Level CachesIrina Alam, Clayton Schoeny, Lara Dolecek, Puneet Gupta. 114-120 [doi]
- BCRB 2018 introductionAlysson Bessani, Hans P. Reiser, Marko Vukolic, Tobias Distler. 121 [doi]
- Protecting Early Stage Proof-of-Work Based Public BlockchainLin Chen 0009, Lei Xu, Zhimin Gao, Yang Lu, Weidong Shi. 122-127 [doi]
- Challenges and Pitfalls of Partitioning BlockchainsEnrique Fynn, Fernando Pedone. 128-133 [doi]
- Towards Model-Driven Engineering of Smart Contracts for Cyber-Physical SystemsPeter Garamvolgyi, Imre Kocsis, Benjamin Gehl, Attila Klenik. 134-139 [doi]
- Latency-Aware Leader Selection for Geo-Replicated Byzantine Fault-Tolerant SystemsMichael Eischer, Tobias Distler. 140-145 [doi]
- Towards Low-Latency Byzantine Agreement Protocols Using RDMASigne Rüsch, Ines Messadi, Rüdiger Kapitza. 146-151 [doi]
- Visualizing BFT SMR Distributed Systems - Example of BFT-SMaRtNoëlle Rakotondravony, Hans P. Reiser. 152-157 [doi]
- Dynamic State Partitioning in Parallelized Byzantine Fault ToleranceBijun Li, Wenbo Xu, Rüdiger Kapitza. 158-163 [doi]
- CERTS 2018 IntroductionMikael Asplund, Sibin Mohan. 164-165 [doi]
- A Systematic Way to Incorporate Security in Safety AnalysisElena Lisova, Aida Causevic, Kaj Hänninen, Henrik Thane, Hans Hansson. 166-171 [doi]
- Design for Dependability Through Error Propagation Space ExplorationImre Kocsis. 172-178 [doi]
- Validating and Securing DLMS/COSEM Implementations with the ValiDLMS FrameworkHenrique Mendes, Iberia Medeiros, Nuno Neves 0002. 179-184 [doi]
- Real-Time Security Through a TEERoberto Duenez, Albert Mo Kim Cheng. 185-186 [doi]
- DSML 2018 IntroductionHoma Alemzadeh, Karthik Pattabiraman, David E. Evans 0001. 187 [doi]
- Fairness and Transparency of Machine Learning for Trustworthy Cloud ServicesNuno Antunes, Leandro Balby, Flavio Figueiredo, Nuno Lourenço 0002, Wagner Meira Jr., Walter Santos. 188-193 [doi]
- Model, Data and Reward Repair: Trusted Machine Learning for Markov Decision ProcessesShalini Ghosh, Susmit Jha, Ashish Tiwari, Patrick Lincoln, Xiaojin Zhu 0001. 194-199 [doi]
- On the Limitation of MagNet Defense Against L1-Based Adversarial ExamplesPei-Hsuan Lu, Pin-Yu Chen, Kang-Cheng Chen, Chia-Mu Yu. 200-214 [doi]
- DCN: Detector-Corrector Network Against Evasion Attacks on Deep Neural NetworksJing Wen, Lucas C. K. Hui, Siu-Ming Yiu, Ruoqing Zhang. 215-221 [doi]
- SSIV 2018 IntroductionJoão Carlos Cunha, Kalinka Branco, Michael Lauer. 222 [doi]
- Risk Assessment and Security Countermeasures for Vehicular Instrument ClustersEugen Horatiu Gurban, Bogdan Groza, Pal-Stefan Murvay. 223-230 [doi]
- Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time WindowsAndrew Tomlinson, Jeremy Bryans, Siraj Ahmed Shaikh, Harsha Kumara Kalutarage. 231-238 [doi]
- Fuzz Testing for Automotive Cyber-SecurityDaniel S. Fowler, Jeremy Bryans, Siraj Ahmed Shaikh, Paul Wooderson. 239-246 [doi]
- Evaluating Optical Flow Vectors Under Varying Computer-Generated Snow Intensities and Pixel Density for Autonomous VehiclesVikas Agrawal, Marcel Frueh, Oliver Bringmann, Wolfgang Rosenstiel. 247-254 [doi]
- Prototyping Automotive Smart EcosystemsEmilia Cioroaica, Thomas Kuhn, Thomas Bauer. 255-262 [doi]
- Model-Based Dependability Analysis of Unmanned Aerial Vehicles - A Case StudyMatheus Lopes Franco, Kalinka R. J. L. Branco, Rosana T. V. Braga, André Luíz de Oliveira, Catherine Dezan, Jean-Philippe Diguet. 263-270 [doi]
- On the Safety of Automotive Systems Incorporating Machine Learning Based Components: A Position PaperMohamad Gharib, Paolo Lollini, Marco Botta, Elvio Gilberto Amparore, Susanna Donatelli, Andrea Bondavalli. 271-274 [doi]
- FMEDA-Based Fault Injection and Data Analysis in Compliance with ISO-26262Kuen-Long Lu, Yung-Yuan Chen, Li-Ren Huang. 275-278 [doi]