Abstract is missing.
- Keynote I: Advances in memory state-preserving fault toleranceTzi-cker Chiueh. [doi]
- A Low-cost Fault Corrector for Deep Neural Networks through Range RestrictionZitao Chen, Guanpeng Li, Karthik Pattabiraman. 1-13 [doi]
- Toward Intrusion Tolerance as a Service: Confidentiality in Partially Cloud-Based BFT SystemsMaher Khan, Amy Babay. 14-25 [doi]
- PID-Piper: Recovering Robotic Vehicles from Physical AttacksPritam Dash, Guanpeng Li, Zitao Chen, Mehdi Karimibiuki, Karthik Pattabiraman. 26-38 [doi]
- GARFIELD: System Support for Byzantine Machine Learning (Regular Paper)Rachid Guerraoui, Arsany Guirguis, Jérémy Plassmann, Anton Ragot, Sébastien Rouault. 39-51 [doi]
- Plinius: Secure and Persistent Machine Learning Model TrainingPeterson Yuhala, Pascal Felber, Valerio Schiavoni, Alain Tchana. 52-62 [doi]
- Decamouflage: A Framework to Detect Image-Scaling Attacks on CNNBedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Surya Nepal, Hyoungshick Kim. 63-74 [doi]
- MILR: Mathematically Induced Layer Recovery for Plaintext Space Error Correction of CNNsJonathan Ponader, Kyle Thomas, Sandip Kundu, Yan Solihin. 75-87 [doi]
- Fast IPv6 Network Periphery Discovery and Security ImplicationsXiang Li, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Qi Li, Youjun Huang. 88-100 [doi]
- A Comprehensive Study of Bugs in Software Defined NetworksAyush Bhardwaj, Zhenyu Zhou, Theophilus A. Benson. 101-115 [doi]
- Enabling Novel Interconnection Agreements with Path-Aware Networking ArchitecturesSimon Scherrer, Markus Legner, Adrian Perrig, Stefan Schmid 0001. 116-128 [doi]
- Self-Healing Protocol: Repairing Schedules Online after Link Failures in Time-Triggered NetworksFrancisco Pozo, Guillermo Rodríguez-Navas, Hans Hansson. 129-140 [doi]
- The Master and Parasite AttackLukas Baumann, Elias Heftrig, Haya Shulman, Michael Waidner. 141-148 [doi]
- PatchDB: A Large-Scale Security Patch DatasetXinda Wang, Shu Wang, Pengbin Feng, Kun Sun 0001, Sushil Jajodia. 149-160 [doi]
- PDGraph: A Large-Scale Empirical Study on Project Dependency of Security VulnerabilitiesQiang Li, Jinke Song, Dawei Tan, Haining Wang, Jiqiang Liu. 161-173 [doi]
- OCTOPOCS: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of ConceptSeongkyeong Kwon, Seunghoon Woo, Gangmo Seong, Heejo Lee. 174-185 [doi]
- NVCache: A Plug-and-Play NVMM-based I/O Booster for Legacy SystemsRémi Dulong, Rafael Pires, Andreia Correia, Valerio Schiavoni, Pedro Ramalhete, Pascal Felber, Gaël Thomas 0001. 186-198 [doi]
- K2: Reading Quickly from Storage Across Many DatacentersKhiem Ngo, Haonan Lu, Wyatt Lloyd. 199-211 [doi]
- Horus: Non-Intrusive Causal Analysis of Distributed Systems LogsFrancisco Neves, Nuno Machado, Ricardo Vilaça, José Pereira 0001. 212-223 [doi]
- Asteria: Deep Learning-based AST-Encoding for Cross-platform Binary Code Similarity DetectionShouguo Yang, Long Cheng, Yicheng Zeng, Zhe Lang, Hongsong Zhu, Zhiqiang Shi. 224-236 [doi]
- Sentiment Analysis based Error Detection for Large-Scale SystemsKhalid Ayedh Alharthi, Arshad Jhumka, Sheng Di, Franck Cappello, Edward Chuah. 237-249 [doi]
- Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous UsersLun-Pin Yuan, Euijin Choo, Ting Yu, Issa Khalil, Sencun Zhu. 250-262 [doi]
- General Feature Selection for Failure Prediction in Large-scale SSD DeploymentFan Xu, Shujie Han 0001, Patrick P. C. Lee, Yi Liu, Cheng He, Jiongzhou Liu. 263-270 [doi]
- Data-centric Reliability Management in GPUsGurunath Kadam, Evgenia Smirni, Adwait Jog. 271-283 [doi]
- NVBitFI: Dynamic Fault Injection for GPUsTimothy Tsai 0002, Siva Kumar Sastry Hari, Michael B. Sullivan, Oreste Villa, Stephen W. Keckler. 284-291 [doi]
- Revealing GPUs Vulnerabilities by Combining Register-Transfer and Software-Level Fault InjectionFernando F. Dos Santos, Josie E. Rodriguez Condia, Luigi Carro, Matteo Sonza Reorda, Paolo Rech. 292-304 [doi]
- Examining Failures and Repairs on Supercomputers with Multi-GPU Compute NodesAmir Taherin, Tirthak Patel, Giorgis Georgakoudis, Ignacio Laguna, Devesh Tiwari. 305-313 [doi]
- An Application Agnostic Defense Against the Dark Arts of CryptojackingNada Lachtar, Abdulrahman Abu Elkhail, Anys Bacha, Hafiz Malik. 314-325 [doi]
- Catch You With Cache: Out-of-VM Introspection to Trace Malicious ExecutionsChao Su, Xuhua Ding, Qingkai Zeng. 326-337 [doi]
- Towards Optimal Use of Exception Handling Information for Function DetectionChengbin Pang, Ruotong Yu, Dongpeng Xu, Eric Koskinen, Georgios Portokalidis, Jun Xu. 338-349 [doi]
- CloudSkulk: A Nested Virtual Machine Based Rootkit and Its DetectionJoseph Connelly, Taylor Roberts, Xing Gao 0001, Jidong Xiao, Haining Wang, Angelos Stavrou. 350-362 [doi]
- FIRestarter: Practical Software Crash Recovery with Targeted Library-level Fault InjectionKoustubha Bhat, Erik van der Kouwe, Herbert Bos, Cristiano Giuffrida. 363-375 [doi]
- WazaBee: attacking Zigbee networks by diverting Bluetooth Low Energy chipsRomain Cayre, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche, Géraldine Vache Vache Marconato. 376-387 [doi]
- InjectaBLE: Injecting malicious traffic into established Bluetooth Low Energy connectionsRomain Cayre, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche, Géraldine Marconato. 388-399 [doi]
- Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and DefensesChad Spensky, Aravind Machiry, Nathan Burow, Hamed Okhravi, Rick Housley, Zhongshu Gu, Hani Jamjoom, Christopher Kruegel, Giovanni Vigna. 400-412 [doi]
- Practical and Efficient in-Enclave Verification of Privacy ComplianceWeijie Liu 0004, Wenhao Wang, Hongbo Chen, Xiaofeng Wang, Yaosong Lu, Kai Chen, Xinyu Wang, Qintao Shen, Yi Chen, Haixu Tang. 413-425 [doi]
- ADAM-CS: Advanced Asynchronous Monotonic Counter ServiceAndré Martin, Cong Lian, Franz Gregor, Robert Krahn, Valerio Schiavoni, Pascal Felber, Christof Fetzer. 426-437 [doi]
- EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database Using EnclavesBenny Fuhry, Jayanth Jain H. A, Florian Kerschbaum. 438-450 [doi]
- Conservative Confidence Bounds in Safety, from Generalised Claims of Improvement & Statistical EvidenceKizito Salako, Lorenzo Strigini, Xingyu Zhao. 451-462 [doi]
- Model Checking the Multi-Formalism Language FIGAROShahid Khan 0002, Matthias Volk 0001, Joost-Pieter Katoen, Alexis Braibant, Marc Bouissou. 463-470 [doi]
- Avis: In-Situ Model Checking for Unmanned Aerial VehiclesMax Taylor, Haicheng Chen, Feng Qin, Christopher Stewart. 471-483 [doi]
- Data-driven Design of Context-aware Monitors for Hazard Prediction in Artificial Pancreas SystemsXugui Zhou, Bulbul Ahmed, James H. Aylor, Philip Asare, Homa Alemzadeh. 484-496 [doi]
- Sanitizing the IoT Cyber Security Posture: An Operational CTI Feed Backed up by Internet MeasurementsMorteza Safaei Pour, Dylan Watson, Elias Bou-Harb. 497-506 [doi]
- Physics-Aware Security Monitoring against Structural Integrity Attacks in 3D PrintersSriharsha Etigowni, Sizhuang Liang, Saman A. Zonouz, Raheem Beyah. 507-518 [doi]
- Compromised Computers Meet Voice Assistants: Stealthily Exfiltrating Data as Voice over TelephonyZhengxian He, Mohit Narayan Rajput, Mustaque Ahamad. 519-530 [doi]
- BigMap: Future-proofing Fuzzers with Efficient Large MapsAlif Ahmed, Jason D. Hiser, Anh Nguyen-Tuong, Jack W. Davidson, Kevin Skadron. 531-542 [doi]
- When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroidDaoyuan Wu, Debin Gao, Robert H. Deng, Rocky K. C. Chang. 543-554 [doi]
- Hiding in the Particles: When Return-Oriented Programming Meets Program ObfuscationPietro Borrello, Emilio Coppa, Daniele Cono D'Elia. 555-568 [doi]
- Statically Detecting JavaScript Obfuscation and Minification Techniques in the WildMarvin Moog, Markus Demmel, Michael Backes 0001, Aurore Fass. 569-580 [doi]