Abstract is missing.
- KShot: Live Kernel Patching with SMM and SGXLei Zhou, Fengwei Zhang, Jinghui Liao, Zhenyu Ning, Jidong Xiao, Kevin Leach, Westley Weimer, Guojun Wang 0001. 1-13 [doi]
- CDN Backfired: Amplification Attacks Based on HTTP Range RequestsWeizhong Li, Kaiwen Shen, Run Guo, Baojun Liu, Jia Zhang, Haixin Duan, Shuang Hao, Xiarun Chen, Yao Wang. 14-25 [doi]
- Online Payments by Merely Broadcasting MessagesDaniel Collins, Rachid Guerraoui, Jovan Komatovic, Petr Kuznetsov, Matteo Monti, Matej Pavlovic, Yvonne Anne Pignolet, Dragos-Adrian Seredinschi, Andrei Tonkikh, Athanasios Xygkis. 26-38 [doi]
- Comprehensive Java Metadata Tracking for Attack Detection and RepairJeff H. Perkins, Jordan Eikenberry, Alessandro Coglio, Martin Rinard. 39-51 [doi]
- TraceSanitizer - Eliminating the Effects of Non-Determinism on Error Propagation AnalysisHabib Saissi, Stefan Winter 0001, Oliver Schwahn, Karthik Pattabiraman, Neeraj Suri. 52-63 [doi]
- JSKernel: Fortifying JavaScript against Web Concurrency Attacks via a Kernel-Like StructureZhanhao Chen, Yinzhi Cao. 64-75 [doi]
- Scarecrow: Deactivating Evasive Malware via Its Own Evasive LogicJialong Zhang, Zhongshu Gu, Jiyong Jang, Dhilung Kirat, Marc Ph. Stoecklin, Xiaokui Shu, Heqing Huang. 76-87 [doi]
- CATI: Context-Assisted Type Inference from Stripped BinariesLigeng Chen, Zhongling He, Bing Mao. 88-98 [doi]
- PolygraphMR: Enhancing the Reliability and Dependability of CNNsSalar Latifi, Babak Zamirai, Scott A. Mahlke. 99-112 [doi]
- ML-Driven Malware that Targets AV SafetySaurabh Jha, Shengkun Cui, Subho S. Banerjee, James Cyriac, Timothy Tsai, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 113-124 [doi]
- Leaky DNN: Stealing Deep-Learning Model Secret with GPU Context-Switching Side-ChannelJunyi Wei, Yicheng Zhang, Zhe Zhou, Zhou Li, Mohammad Abdullah Al Faruque. 125-137 [doi]
- An Experimental Study of Reduced-Voltage Operation in Modern FPGAs for Neural Network AccelerationBehzad Salami 0001, Erhan Baturay Onural, Ismail Emir Yuksel, Fahrettin Koc, Oguz Ergin, Adrián Cristal Kestelman, Osman S. Unsal, Hamid Sarbazi-Azad, Onur Mutlu. 138-149 [doi]
- Quantifying DNN Model Robustness to the Real-World ThreatsZhenyu Zhong, Zhisheng Hu, Xiaowei Chen. 150-157 [doi]
- The Mystery of the Failing Jobs: Insights from Operational Data from Two University-Wide Computing SystemsRakesh Kumar, Saurabh Jha, Ashraf Mahgoub, Rajesh Kalyanam, Stephen Lien Harrell, Xiaohui Carol Song, Zbigniew Kalbarczyk, William T. Kramer, Ravishankar T. Iyer, Saurabh Bagchi. 158-171 [doi]
- Reliable, Efficient Recovery for Complex Services with Replicated SubsystemsEdward Tremel, Sagar Jha, Weijia Song, David Chu, Ken Birman. 172-183 [doi]
- HAMS: High Availability for Distributed Machine Learning Service GraphsShixiong Zhao, Xusheng Chen, Cheng Wang, Fanxin Li, Qi Ji, Heming Cui, Cheng Li, Sen Wang. 184-196 [doi]
- Fine-Grained Fault Tolerance for Resilient pVM-Based Virtual Machine MonitorsDjob Mvondo, Alain Tchana, Renaud Lachaize, Daniel Hagimont, Noël De Palma. 197-208 [doi]
- Data-Driven Model-Based Analysis of the Ethereum Verifier's DilemmaMaher Alharby, Roben Castagna Lunardi, Amjad Aldweesh, Aad van Moorsel. 209-220 [doi]
- SMACS: Smart Contract Access Control ServiceBowen Liu, Siwei Sun, Pawel Szalachowski. 221-232 [doi]
- Smart Contracts on the MoveEnrique Fynn, Alysson Bessani, Fernando Pedone. 233-244 [doi]
- Impact of Geo-Distribution and Mining Pools on Blockchains: A Study of EthereumPaulo Silva, David Vavricka, João Barreto 0001, Miguel Matos. 245-252 [doi]
- Ephemeral Exit Bridges for TorZhao Zhang, Tavish Vaidya, Kartik Subramanian, Wenchao Zhou, Micah Sherr. 253-265 [doi]
- The Impact of DNS Insecurity on TimePhilipp Jeitner, Haya Shulman, Michael Waidner. 266-277 [doi]
- Depending on HTTP/2 for Privacy? Good Luck!Gargi Mitra, Prasanna Karthik Vairam, Patanjali SLPSK, Nitin Chandrachoodan, Kamakoti Veezhinathan. 278-285 [doi]
- Diving into Email Bomb AttackMarkus Schneider, Haya Shulman, Adi Sidis, Ravid Sidis, Michael Waidner. 286-293 [doi]
- HardSnap: Leveraging Hardware Snapshotting for Embedded Systems Security TestingNassim Corteggiani, Aurélien Francillon. 294-305 [doi]
- iScanU: A Portable Scanner for Undocumented Instructions on RISC ProcessorsRens Dofferhoff, Michael Göbel, Kristian F. D. Rietveld, Erik van der Kouwe. 306-317 [doi]
- Libspector : Context-Aware Large-Scale Network Traffic Analysis of Android ApplicationsOnur Zungur, Gianluca Stringhini, Manuel Egele. 318-330 [doi]
- Foosball Coding: Correcting Shift Errors and Bit Flip Errors in 3D Racetrack MemorySamantha Archer, Georgios Mappouras, A. Robert Calderbank, Daniel J. Sorin. 331-342 [doi]
- Extreme Protection Against Data Loss with Single-Overlap Declustered ParityHuan Ke, Haryadi S. Gunawi, David Bonnie, Nathan DeBardeleben, Michael Grosskopf, Terry Grové, Dominic Manno, Elisabeth Moore, Brad Settlemyer. 343-354 [doi]
- Chaser: An Enhanced Fault Injection Tool for Tracing Soft Errors in MPI ApplicationsQiang Guan, Xunchao Hu, Terence Grove, Bo Fang, Hailong Jiang, Heng Yin, Nathan DeBardeleben. 355-363 [doi]
- ProFIPy: Programmable Software Fault Injection as-a-ServiceDomenico Cotroneo, Luigi De Simone, Pietro Liguori, Roberto Natella. 364-372 [doi]
- Hybrid Firmware Analysis for Known Mobile and IoT Security VulnerabilitiesPengfei Sun, Luis Garcia, Gabriel Salles-Loustau, Saman A. Zonouz. 373-384 [doi]
- Real-Time Context-Aware Detection of Unsafe Events in Robot-Assisted SurgeryMohammad Samin Yasar, Homa Alemzadeh. 385-397 [doi]
- Scalable Approach to Enhancing ICS Resilience by Network DiversityTingting Li, Cheng Feng 0004, Chris Hankin. 398-410 [doi]
- Cross-App Interference Threats in Smart Homes: Categorization, Detection and HandlingHaotian Chi, Qiang Zeng 0001, Xiaojiang Du, Jiaping Yu. 411-423 [doi]
- From Byzantine Replication to Blockchain: Consensus is Only the BeginningAlysson Bessani, Eduardo Alchieri, João Sousa 0002, André Oliveira 0002, Fernando Pedone. 424-436 [doi]
- EPIC: Efficient Asynchronous BFT with Adaptive SecurityChao Liu, Sisi Duan, Haibin Zhang. 437-451 [doi]
- On Incentive Compatible Role-Based Reward Distribution in AlgorandMehdi Fooladgar, Mohammad Hossein Manshaei, Murtuza Jadliwala, Mohammad Ashiqur Rahman. 452-463 [doi]
- FSTR: Funds Skewness Aware Transaction Routing for Payment Channel NetworksSiyi Lin, Jingjing Zhang, Weigang Wu. 464-475 [doi]
- SeGShare: Secure Group File Sharing in the Cloud using EnclavesBenny Fuhry, Lina Hirschoff, Samuel Koesnadi, Florian Kerschbaum. 476-488 [doi]
- Omega: a Secure Event Ordering Service for the EdgeCláudio Correia, Miguel Correia 0001, Luís Rodrigues. 489-501 [doi]
- Trust Management as a Service: Enabling Trusted Execution in the Face of Byzantine StakeholdersFranz Gregor, Wojciech Ozga, Sébastien Vaucher, Rafael Pires, Do Le Quoc, Sergei Arnautov, André Martin, Valerio Schiavoni, Pascal Felber, Christof Fetzer. 502-514 [doi]
- UPA: An Automated, Accurate and Efficient Differentially Private Big-Data Mining SystemTsz On Li, Jianyu Jiang, Ji Qi, Chi Chiu So, Jiacheng Ma, Xusheng Chen, Tianxiang Shen, Heming Cui, Yuexuan Wang, Peng Wang. 515-527 [doi]
- Enhancing Reliability-Aware Speedup Modelling via ReplicationZaeem Hussain, Taieb Znati, Rami G. Melhem. 528-539 [doi]
- Service-Based Resilience for Embedded IoT NetworksDoganalp Ergenc, Jacek Rak, Mathias Fischer 0001. 540-551 [doi]
- Mining Multivariate Discrete Event Sequences for Knowledge Discovery and Anomaly DetectionBin Nie, Jianwu Xu, Jacob Alter, Haifeng Chen, Evgenia Smirni. 552-563 [doi]
- Learning to Reliably Deliver Streaming Data with Apache KafkaHan Wu, Zhihao Shang, Katinka Wolter. 564-571 [doi]