Abstract is missing.
- GreenFlag: Protecting 3D-Racetrack Memory from Shift ErrorsGeorgios Mappouras, Alireza Vahid, A. Robert Calderbank, Daniel J. Sorin. 1-12 [doi]
- Understanding and Modeling On-Die Error Correction in Modern DRAM: An Experimental Study Using Real DevicesMinesh Patel, Jeremie S. Kim, Hasan Hassan, Onur Mutlu. 13-25 [doi]
- Demystifying Soft Error Assessment Strategies on ARM CPUs: Microarchitectural Fault Injection vs. Neutron Beam ExperimentsAthanasios Chatzidimitriou, Pablo Bodmann, George Papadimitriou, Dimitris Gizopoulos, Paolo Rech. 26-38 [doi]
- A Multiversion Programming Inspired Approach to Detecting Audio Adversarial ExamplesQiang Zeng 0001, Jianhai Su, Chenglong Fu, Golam Kayas, Lannan Luo, Xiaojiang Du, Chiu Chiang Tan, Jie Wu 0001. 39-51 [doi]
- Classifying Malware Represented as Control Flow Graphs using Deep Graph Convolutional Neural NetworkJiaqi Yan, Guanhua Yan, Dong Jin. 52-63 [doi]
- ZK-GanDef: A GAN Based Zero Knowledge Adversarial Training Defense for Neural NetworksGuanxiong Liu, Issa Khalil, Abdallah Khreishah. 64-75 [doi]
- Efficient Treatment of Uncertainty in System Reliability Analysis using Importance MeasuresHananeh Aliee, Faramarz Khosravi, Jürgen Teich. 76-87 [doi]
- Extensions of Network Reliability AnalysisHoang Hai Nguyen, Kartik Palani, David M. Nicol. 88-99 [doi]
- An Online Approach to Estimate Parameters of Phase-Type DistributionsPeter Buchholz 0001, Iryna Dohndorf, Jan Kriege. 100-111 [doi]
- ML-Based Fault Injection for Autonomous Vehicles: A Case for Bayesian Fault InjectionSaurabh Jha, Subho S. Banerjee, Timothy Tsai, Siva Kumar Sastry Hari, Michael B. Sullivan, Zbigniew T. Kalbarczyk, Stephen W. Keckler, Ravishankar K. Iyer. 112-124 [doi]
- Deep Validation: Toward Detecting Real-World Corner Cases for Deep Neural NetworksWeibin Wu, Hui Xu, Sanqiang Zhong, Michael R. Lyu, Irwin King. 125-137 [doi]
- SOTER: A Runtime Assurance Framework for Programming Safe Robotics SystemsAnkush Desai, Shromona Ghosh, Sanjit A. Seshia, Natarajan Shankar, Ashish Tiwari. 138-150 [doi]
- OneFile: A Wait-Free Persistent Transactional MemoryPedro Ramalhete, Andreia Correia, Pascal Felber, Nachshon Cohen. 151-163 [doi]
- Sparkle: Speculative Deterministic Concurrency Control for Partially Replicated Transactional StoresZhongmiao Li, Paolo Romano 0002, Peter Van Roy. 164-175 [doi]
- White-Box Atomic MulticastAlexey Gotsman, Anatole Lefort, Gregory V. Chockler. 176-187 [doi]
- Fault Tolerance Through Redundant Execution on COTS Multicores: Exploring Trade-OffsYanyan Shen, Gernot Heiser, Kevin Elphinstone. 188-200 [doi]
- ParaMedic: Heterogeneous Parallel Error CorrectionSam Ainsworth, Timothy M. Jones 0001. 201-213 [doi]
- gem5-Approxilyzer: An Open-Source Tool for Application-Level Soft Error AnalysisRadha Venkatagiri, Khalique Ahmed, Abdulrahman Mahmoud, Sasa Misailovic, Darko Marinov, Christopher W. Fletcher, Sarita V. Adve. 214-221 [doi]
- Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and UsersJiongyi Chen, Chaoshun Zuo, Wenrui Diao, Shuaike Dong, Qingchuan Zhao, Menghan Sun, Zhiqiang Lin, Yinqian Zhang, Kehuan Zhang. 222-233 [doi]
- BenchIoT: A Security Benchmark for the Internet of ThingsNaif Saleh Almakhdhub, Abraham A. Clements, Mathias Payer, Saurabh Bagchi. 234-246 [doi]
- Exploiting Memory Corruption Vulnerabilities in Connman for IoT DevicesK. Virgil English, Islam Obaidat, Meera Sridhar. 247-255 [doi]
- Rigorous, Effortless and Timely Assessment of Cellular Network ChangesAjay Mahimkar, Zihui Ge, Sanjeev Ahuja, Shomik Pathak, Nauman Shafi. 256-263 [doi]
- An Eventually Perfect Failure Detector for Networks of Arbitrary Topology Connected with ADD Channels Using Time-To-Live ValuesKarla Vargas, Sergio Rajsbaum. 264-275 [doi]
- Bonsai: Efficient Fast Failover Routing Using Small ArborescencesKlaus-Tycho Foerster, Andrzej Kamisinski, Yvonne Anne Pignolet, Stefan Schmid 0001, Gilles Trédan. 276-288 [doi]
- SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM ProcessorsShengye Wan, Jianhua Sun, Kun Sun 0001, Ning Zhang 0017, Qi Li 0002. 289-301 [doi]
- DeviceVeil: Robust Authentication for Individual USB Devices Using Physical Unclonable FunctionsKuniyasu Suzaki, Yohei Hori, Kazukuni Kobara, Mohammad Mannan. 302-314 [doi]
- Multilayer ROP Protection Via Microarchitectural Units Available in Commodity HardwareMateus Tymburibá, Hugo Sousa, Fernando Magno Quintão Pereira. 315-327 [doi]
- Deploying Intrusion-Tolerant SCADA for the Power GridAmy Babay, John L. Schultz, Thomas Tantillo, Samuel Beckley, Eamon Jordan, Kevin Ruddell, Kevin Jordan, Yair Amir. 328-335 [doi]
- Reaching Data Confidentiality and Model Accountability on the CalTrainZhongshu Gu, Hani Jamjoom, Dong Su, Heqing Huang, Jialong Zhang, Tengfei Ma, Dimitrios Pendarakis, Ian Molloy. 336-348 [doi]
- Tell Me More Than Just Assembly! Reversing Cyber-Physical Execution Semantics of Embedded IoT Controller Software BinariesPengfei Sun, Luis Garcia, Saman A. Zonouz. 349-361 [doi]
- Exploiting Latency and Error Tolerance of GPGPU Applications for an Energy-Efficient DRAMHaonan Wang, Adwait Jog. 362-374 [doi]
- Leveraging Transverse Reads to Correct Alignment Faults in Domain Wall MemoriesSébastien Ollivier, Donald Kline Jr., Kawsher A. Roxy, Rami G. Melhem, Sanjukta Bhanja, Alex K. Jones. 375-387 [doi]
- SuDoku: Tolerating High-Rate of Transient Failures for Enabling Scalable STTRAMPrashant J. Nair, Bahar Asgari, Moinuddin K. Qureshi. 388-400 [doi]
- NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGXJudicael Briand Djoko, Jack Lange, Adam J. Lee. 401-413 [doi]
- TEE-Perf: A Profiler for Trusted Execution EnvironmentsMaurice Bailleu, Donald Dragoti, Pramod Bhatotia, Christof Fetzer. 414-421 [doi]
- EPA-RIMM : An Efficient, Performance-Aware Runtime Integrity Measurement Mechanism for Modern Server PlatformsBrian Delgado, Tejaswini Vibhute, John Fastabend, Karen L. Karavanic. 422-434 [doi]
- Pseudo-Honeypot: Toward Efficient and Scalable Spam SnifferYihe Zhang, Hao Zhang, Xu Yuan, Nian-Feng Tzeng. 435-446 [doi]
- Controller-Oblivious Dynamic Access Control in Software-Defined NetworksSteven R. Gomez, Samuel Jero, Richard Skowyra, Jason Martin, Patrick Sullivan, David Bigelow, Zachary Ellenbogen, Bryan C. Ward, Hamed Okhravi, James W. Landry. 447-459 [doi]
- BorderPatrol: Securing BYOD using Fine-Grained Contextual InformationOnur Zungur, Guillermo Suarez-Tangil, Gianluca Stringhini, Manuel Egele. 460-472 [doi]
- Characterizing and Understanding HPC Job Failures Over The 2K-Day Life of IBM BlueGene/Q SystemSheng Di, Hanqi Guo, Eric Pershey, Marc Snir, Franck Cappello. 473-484 [doi]
- Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSSXinda Wang, Kun Sun 0001, Archer L. Batcheller, Sushil Jajodia. 485-492 [doi]
- Where Are You Taking Me? Behavioral Analysis of Open DNS ResolversJeman Park 0001, Aminollah Khormali, Manar Mohaisen, Aziz Mohaisen. 493-504 [doi]
- POLaR: Per-Allocation Object Layout RandomizationJonghwan Kim, DaeHee Jang, Yunjong Jeong, Brent ByungHoon Kang. 505-516 [doi]
- The Strength of Weak Randomization: Easily Deployable, Efficiently Searchable Encryption with Minimal LeakageDavid Pouliot, Scott Griffy, Charles V. Wright. 517-529 [doi]
- HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context EncodingQiang Zeng 0001, Golam Kayas, Emil Mohammed, Lannan Luo, Xiaojiang Du, Junghwan Rhee. 530-542 [doi]
- FabZK: Supporting Privacy-Preserving, Auditable Smart Contracts in Hyperledger FabricHui Kang, Ting Dai, Nerla Jean-Louis, Shu Tao, Xiaohui Gu. 543-555 [doi]
- Fast Predictive Repair in Erasure-Coded StorageZhirong Shen, Xiaolu Li, Patrick P. C. Lee. 556-567 [doi]
- SBFT: A Scalable and Decentralized Trust InfrastructureGuy Golan-Gueta, Ittai Abraham, Shelly Grossman, Dahlia Malkhi, Benny Pinkas, Michael K. Reiter, Dragos-Adrian Seredinschi, Orr Tamir, Alin Tomescu. 568-580 [doi]
- UChecker: Automatically Detecting PHP-Based Unrestricted File Upload VulnerabilitiesJin Huang, Yu Li, Junjie Zhang, Rui Dai. 581-592 [doi]
- PrivAnalyzer: Measuring the Efficacy of Linux Privilege UseJohn Criswell, Jie Zhou, Spyridoula Gravani, Xiaoyu Hu. 593-604 [doi]
- 1dVul: Discovering 1-Day Vulnerabilities through Binary PatchesJiaqi Peng, Feng Li, Bingchang Liu, Lili Xu, Binghong Liu, Kai Chen, Wei Huo. 605-616 [doi]
- Revisiting Client Puzzles for State Exhaustion Attacks ResilienceMohammad A. Noureddine, Ahmed M. Fawaz, Amanda Hsu, Cody Guldner, Sameer Vijay, Tamer Basar, William H. Sanders. 617-629 [doi]
- Robust Anomaly Detection on Unreliable DataZilong Zhao, Sophie Cerf, Robert Birke, Bogdan Robu, Sara Bouchenak, Sonia Ben Mokhtar, Lydia Y. Chen. 630-637 [doi]
- Pupillography as Indicator of Programmers' Mental Effort and Cognitive OverloadRicardo Couceiro, Gonçalo Duarte, João Durães, João Castelhano, Catarina Duarte, César A. D. Teixeira, Miguel Castelo-Branco, Paulo Carvalho 0001, Henrique Madeira. 638-644 [doi]