Abstract is missing.
- HDiff: A Semi-automatic Framework for Discovering Semantic Gap Attack in HTTP ImplementationsKaiwen Shen, Jianyu Lu, Yaru Yang, Jianjun Chen, Mingming Zhang, Haixin Duan, Jia Zhang, Xiaofeng Zheng. 1-13 [doi]
- Treaty: Secure Distributed TransactionsDimitra Giantsidi, Maurice Bailleu, Natacha Crooks, Pramod Bhatotia. 14-27 [doi]
- CAROL: Confidence-Aware Resilience Model for Edge FederationsShreshth Tuli, Giuliano Casale, Nicholas R. Jennings. 28-40 [doi]
- Cycle: Sustainable Off-Chain Payment Channel Network with Asynchronous RebalancingZicong Hong, Song Guo 0001, Rui Zhang, Peng Li 0017, Yufeng Zhan, Wuhui Chen. 41-53 [doi]
- Marlin: Two-Phase BFT with LinearityXiao Sui, Sisi Duan, Haibin Zhang. 54-66 [doi]
- ZugChain: Blockchain-Based Juridical Data Recording in Railway SystemsSigne Rüsch, Kai Bleeke, Ines Messadi, Stefan Schmidt, Andreas Krampf, Katharina Olze, Susanne Stahnke, Robert Schmid, Lukas Pirl, Roland Kittel, Andreas Polze, Marquart Franz, Matthias Müller, Leander Jehl, Rüdiger Kapitza. 67-78 [doi]
- Strategic Safety-Critical Attacks Against an Advanced Driver Assistance SystemXugui Zhou, Anna Schmedding, Haotian Ren, Lishan Yang, Philip Schowitz, Evgenia Smirni, Homa Alemzadeh. 79-87 [doi]
- Exploiting Temporal Data Diversity for Detecting Safety-critical Faults in AV Compute SystemsSaurabh Jha, Shengkun Cui, Timothy Tsai 0002, Siva Kumar Sastry Hari, Michael B. Sullivan 0001, Zbigniew T. Kalbarczyk, Stephen W. Keckler, Ravishankar K. Iyer. 88-100 [doi]
- Arming IDS Researchers with a Robotic Arm DatasetArpan Gujarati, Zainab Saeed Wattoo, Maryam Raiyat Aliabadi, Sean Clark, Xiaoman Liu, Parisa Shiri, Amee Trivedi, Ruizhe Zhu, Jason Hein, Margo I. Seltzer. 101-108 [doi]
- STBPU: A Reasonably Secure Branch Prediction UnitTao Zhang 0059, Timothy Lesch, Kenneth Koltermann, Dmitry Evtyushkin. 109-123 [doi]
- COMET: On-die and In-controller Collaborative Memory ECC Technique for Safer and Stronger Correction of DRAM ErrorsIrina Alam, Puneet Gupta 0001. 124-136 [doi]
- QuFI: a Quantum Fault Injector to Measure the Reliability of Qubits and Quantum CircuitsDaniel Oliveira 0002, Edoardo Giusto, Emanuele Dri, Nadir Casciola, Betis Baheri, Qiang Guan, Bartolomeo Montrucchio, Paolo Rech. 137-149 [doi]
- SEVulDet: A Semantics-Enhanced Learnable Vulnerability DetectorZhiquan Tang, Qiao Hu, Yupeng Hu, Wenxin Kuang, Jiongyi Chen. 150-162 [doi]
- The Fault in Our Data Stars: Studying Mitigation Techniques against Faulty Training Data in Machine Learning ApplicationsAbraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan. 163-171 [doi]
- CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow GraphsJerome Dinal Herath, Priti Prabhakar Wakodikar, Ping Yang, Guanhua Yan. 172-184 [doi]
- ComFASE: A Tool for Evaluating the Effects of V2V Communication Faults and Attacks on Automated VehiclesMateen Malik, Mehdi Maleki, Peter Folkesson, Behrooz Sangchoolie, Johan Karlsson. 185-192 [doi]
- A Comprehensive, Longitudinal Study of Government DNS Deployment at Global ScaleRebekah Houser, Shuai Hao 0001, Chase Cotton, Haining Wang. 193-204 [doi]
- GoldenEye: A Platform for Evaluating Emerging Numerical Data Formats in DNN AcceleratorsAbdulrahman Mahmoud, Thierry Tambe, Tarek Aloui, David Brooks 0001, Gu-Yeon Wei. 206-214 [doi]
- On the Price of Locality in Static Fast ReroutingKlaus-Tycho Foerster, Juho Hirvonen, Yvonne Anne Pignolet, Stefan Schmid 0001, Gilles Trédan. 215-226 [doi]
- BLAP: Bluetooth Link Key Extraction and Page Blocking AttacksChangseok Koh, Jonghoon Kwon, Junbeom Hur. 227-238 [doi]
- The Hazard Value: A Quantitative Network Connectivity Measure Accounting for FailuresPieter Cuijpers, Stefan Schmid 0001, Nicolas Schnepf, Jirí Srba. 239-250 [doi]
- PassFlow: Guessing Passwords with Generative FlowsGiulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi V. Mancini. 251-262 [doi]
- Active-MTSAD: Multivariate Time Series Anomaly Detection With Active LearningWenlu Wang, Pengfei Chen, Yibin Xu, Zilong He. 263-274 [doi]
- Predicting DRAM-Caused Node Unavailability in Hyper-Scale CloudsPengcheng Zhang, Yunong Wang, Xuhua Ma, Yaoheng Xu, Bin Yao, Xudong Zheng, Linquan Jiang. 275-286 [doi]
- Tool: An Efficient and Flexible Simulator for Byzantine Fault-Tolerant ProtocolsPing-Lun Wang, Tzu-Wei Chao, Chia-Chien Wu, Hsu-Chun Hsiao. 287-294 [doi]
- Invoke-Deobfuscation: AST-Based and Semantics-Preserving Deobfuscation for PowerShell ScriptsHuajun Chai, Lingyun Ying, Haixin Duan, Daren Zha. 295-306 [doi]
- Exploiting monotonicity and symmetry for efficient simulation of highly dependable systemsHoang Hai Nguyen, Kartik Palani, David M. Nicol. 307-318 [doi]
- RAPMiner: A Generic Anomaly Localization Mechanism for CDN System with Multi-dimensional KPIsChang Liu, Yanwei Liu, Zhen Xu, Liang Dai. 319-330 [doi]
- Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple FlowsDinhnguyen Dao, RhongHo Jang, Changhun Jung, David Mohaisen, DaeHun Nyang. 331-342 [doi]
- L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz TestingHaram Park, Carlos Nkuba Kayembe, Seunghoon Woo, Heejo Lee. 343-354 [doi]
- NEC: Speaker Selective Cancellation via Neural Enhanced Ultrasound ShadowingHanqing Guo, Chenning Li, Lingkun Li, Zhichao Cao, Qiben Yan, Li Xiao 0001. 355-366 [doi]
- False Data Injection Attack Detection for Secure Distributed Demand Response in Smart GridsThusitha Dayaratne, Mahsa Salehi, Carsten Rudolph, Ariel Liebman. 367-380 [doi]
- Solution Bundles of Markov Performability Models through Adaptive Cross ApproximationGiulio Masetti, Leonardo Robol, Silvano Chiaradonna, Felicita Di Giandomenico. 381-392 [doi]
- Characterizing and Mitigating Anti-patterns of Alerts in Industrial Cloud SystemsTianyi Yang, Jiacheng Shen, Yuxin Su 0001, Xiaoxue Ren, Yongqiang Yang, Michael R. Lyu. 393-401 [doi]
- Torpedo: A Fuzzing Framework for Discovering Adversarial Container WorkloadsKenton McDonough, Xing Gao, Shuai Wang, Haining Wang. 402-414 [doi]
- Back to the future: N-Versioning of MicroservicesAntonio M. Espinoza, Riley Wood, Stephanie Forrest, Mohit Tiwari. 415-427 [doi]
- IoT Phantom-Delay Attacks: Demystifying and Exploiting IoT Timeout BehaviorsChenglong Fu 0002, Qiang Zeng 0001, Haotian Chi, Xiaojiang Du, Siva Likitha Valluru. 428-440 [doi]
- BFL: a Logic to Reason about Fault TreesStefano M. Nicoletti, Ernst Moritz Hahn, Mariëlle Stoelinga. 441-452 [doi]
- TimeDice: Schedulability-Preserving Priority Inversion for Mitigating Covert Timing Channels Between Real-time PartitionsMan-Ki Yoon, Jung-Eun Kim, Richard M. Bradford, Zhong Shao. 453-465 [doi]
- ERIC: An Efficient and Practical Software Obfuscation FrameworkAlperen Bolat, Seyyid Hikmet Çelik, Ataberk Olgun, Oguz Ergin, Marco Ottavi. 466-474 [doi]
- Understanding RowHammer Under Reduced Wordline Voltage: An Experimental Study Using Real DRAM DevicesAbdullah Giray Yaglikçi, Haocong Luo, Geraldo F. de Oliviera, Ataberk Olgun, Minesh Patel, Jisung Park 0001, Hasan Hassan, Jeremie S. Kim, Lois Orosa 0001, Onur Mutlu. 475-487 [doi]
- KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile CommunicationsYiWei Zhang, Siqi Ma, Juanru Li, Dawu Gu, Elisa Bertino. 488-500 [doi]
- WideLeak: How Over-the-Top Platforms Fail in AndroidGwendal Patat, Mohamed Sabt, Pierre-Alain Fouque. 501-508 [doi]
- Hardening In-memory Key-value Stores against ECC-uncorrectable Memory ErrorsTsuyoshi Shimomura, Hiroshi Yamada. 509-521 [doi]
- Background Buster: Peeking through Virtual Backgrounds in Online Video CallsMohd Sabra, Anindya Maiti, Murtuza Jadliwala. 522-533 [doi]
- SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication ServicesZiyi Zhou, Xing Han, Zeyuan Chen, Yuhong Nan, Juanru Li, Dawu Gu. 534-546 [doi]
- DisTA: Generic Dynamic Taint Tracking for Java-Based Distributed SystemsDong Wang, Yu Gao, Wensheng Dou, Jun Wei 0001. 547-558 [doi]
- How'd Security Benefit Reverse Engineers? : The Implication of Intel CET on Function IdentificationHyungSeok Kim, Junoh Lee, Soomin Kim 0002, SeungIl Jung, Sang Kil Cha. 559-566 [doi]
- SAINTDroid: Scalable, Automated Incompatibility Detection for AndroidBruno Vieira Resende e Silva, Clay Stevens, Niloofar Mansoor, Witawas Srisa-an, Tingting Yu, Hamid Bagheri. 567-579 [doi]