Abstract is missing.
- Message from the DSN 2023 Program ChairsOnur Mutlu, Xavier Défago. [doi]
- SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home SystemsNur Imtiazul Haque, Maurice Ngouen, Mohammad Ashiqur Rahman, A. Selcuk Uluagac, Laurent Njilla. 1-13 [doi]
- SecDDR: Enabling Low-Cost Secure Memories by Protecting the DDR InterfaceAli Fakhrzadehgan, Prakash Ramrakhyani, Moinuddin K. Qureshi, Mattan Erez. 14-27 [doi]
- Devils in Your Apps: Vulnerabilities and User Privacy Exposure in Mobile Notification SystemsJiadong Lou, Xiaohan Zhang, Yihe Zhang, Xinghua Li, Xu Yuan, Ning Zhang 0017. 28-41 [doi]
- Breaking Geographic Routing Among Connected VehiclesZizheng Liu, Shaan Shekhar, Chunyi Peng. 42-54 [doi]
- NPTSN: RL-Based Network Planning with Guaranteed Reliability for In-Vehicle TSSDNWeijiang Kong, Majid Nabi, Kees Goossens. 55-66 [doi]
- Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Aerial VehiclesAolin Ding, Matthew Chan, Amin Hass, Nils Ole Tippenhauer, ShiQing Ma, Saman A. Zonouz. 67-80 [doi]
- Compiler-Implemented Differential Checksums: Effective Detection and Correction of Transient and Permanent Memory ErrorsChristoph Borchert, Horst Schirmeier, Olaf Spinczyk. 81-94 [doi]
- PT-Guard: Integrity-Protected Page Tables to Defend Against Breakthrough Rowhammer AttacksAnish Saxena, Gururaj Saileshwar, Jonas Juffinger, Andreas Kogler, Daniel Gruss, Moinuddin K. Qureshi. 95-108 [doi]
- Don't Knock! Rowhammer at the Backdoor of DNN ModelsM. Caner Tol, Saad Islam, Andrew J. Adiletta, Berk Sunar, Ziming Zhang. 109-122 [doi]
- Micro ReplicationTobias Distler, Michael Eischer, Laura Lawniczak. 123-137 [doi]
- Heron: Scalable State Machine Replication on Shared MemoryMojtaba Eslahi-Kelorazi, Long Hoang Le, Fernando Pedone. 138-150 [doi]
- Analyzing the Performance of the Inter-Blockchain Communication ProtocolJoão Otávio Massari Chervinski, Diego Kreutz, Xiwei Xu 0001, Jiangshan Yu. 151-164 [doi]
- MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware DetectorsXiaohui Chen, Lei Cui, Hui-Wen, Zhi Li 0018, Hongsong Zhu, Zhiyu Hao, Limin Sun. 165-178 [doi]
- Tabby: Automated Gadget Chain Detection for Java Deserialization VulnerabilitiesXingchen Chen, Baizhu Wang, Ze Jin, Yun-feng, Xianglong Li, Xincheng Feng, Qixu Liu. 179-192 [doi]
- TagClass: A Tool for Extracting Class-Determined Tags from Massive Malware Labels via Incremental ParsingYongkang Jiang, Gaolei Li, Shenghong Li. 193-200 [doi]
- Āpta: Fault-tolerant object-granular CXL disaggregated memory for accelerating FaaSAdarsh Patil 0002, Vijay Nagarajan, Nikos Nikoleris, Nicolai Oswald. 201-215 [doi]
- HiMFP: Hierarchical Intelligent Memory Failure Prediction for Cloud Service ReliabilityQiao Yu, Wengui Zhang, Paolo Notaro, Soroush Haeri, Jorge Cardoso 0001, Odej Kao. 216-228 [doi]
- SGX Switchless Calls Made ConfiglessPeterson Yuhala, Michael Paper, Timothée Zerbib, Pascal Felber, Valerio Schiavoni, Alain Tchana. 229-238 [doi]
- Poisoning Online Learning Filters by Shifting on the MoveWesley Joon-Wie Tann, Ee-Chien Chang. 239-251 [doi]
- YODA: Covert Communication Channel over Public DNS ResolversSandip Saha, Sareena Karapoola, Chester Rebeiro, V. Kamakoti 0001. 252-260 [doi]
- Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio LayerJaeJong Baek, Pradeep Kumar Duraisamy Soundrapandian, Sukwha Kyung, Ruoyu Wang 0001, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn. 261-273 [doi]
- Fabricated Flips: Poisoning Federated Learning without DataJiyue Huang, Zilong Zhao 0001, Lydia Y. Chen, Stefanie Roos. 274-287 [doi]
- Fortifying Federated Learning against Membership Inference Attacks via Client-level Input PerturbationYuchen Yang, Haolin Yuan, Bo Hui, Neil Zhenqiang Gong, Neil Fendley, Philippe Burlina, Yinzhi Cao. 288-301 [doi]
- ReFace: Adversarial Transformation Networks for Real-time Attacks on Face Recognition SystemsShehzeen Hussain, Todd Huster, Chris Mesterharm, Paarth Neekhara, Farinaz Koushanfar. 302-312 [doi]
- No Free Lunch: On the Increased Code Reuse Attack Surface of Obfuscated ProgramsNaiqian Zhang, Daroc Alden, Dongpeng Xu, Shuai Wang, Trent Jaeger, Wheeler Ruml. 313-326 [doi]
- TransAST: A Machine Translation-Based Approach for Obfuscated Malicious JavaScript DetectionYan Qin, Weiping Wang 0003, Zixian Chen, Hong Song, Shigeng Zhang. 327-338 [doi]
- JSRevealer: A Robust Malicious JavaScript Detector against ObfuscationKunlun Ren, Weizhong Qiang, Yueming Wu, Yi Zhou, Deqing Zou, Hai Jin 0001. 339-351 [doi]
- Detection of e-Mobility-Based Attacks on the Power GridDustin Kern, Christoph Krauß. 352-365 [doi]
- SwarmFuzz: Discovering GPS Spoofing Attacks in Drone SwarmsYingao Elaine Yao, Pritam Dash, Karthik Pattabiraman. 366-375 [doi]
- DNAttest: Digital-twin-based Non-intrusive Attestation under Transient UncertaintyWei Lin, Heng Chuan Tan, Binbin Chen 0001, Fan Zhang. 376-388 [doi]
- IRIS: a Record and Replay Framework to Enable Hardware-assisted Virtualization FuzzingCarmine Cesarano, Marcello Cinque, Domenico Cotroneo, Luigi De Simone, Giorgio Farina. 389-401 [doi]
- Rewind & Discard: Improving Software Resilience using Isolated DomainsMerve Gülmez, Thomas Nyman, Christoph Baumann, Jan Tobias Mühlberg. 402-416 [doi]
- Intrusion Injection for Virtualized Systems: Concepts and ApproachCharles F. Gonçalves, Nuno Antunes, Marco Vieira. 417-430 [doi]
- vWitness: Certifying Web Page Interactions with Computer VisionHe Shuang, Lianying Zhao, David Lie. 431-444 [doi]
- Adaptive Webpage Fingerprinting from TLS TracesVasilios Mavroudis, Jamie Hayes. 445-458 [doi]
- IDTracker: Discovering Illicit Website Communities via Third-party Service IDsChenxu Wang, Zhao Li, Jiangyi Yin, Zhenni Liu, Zhongyi Zhang, Qingyun Liu. 459-469 [doi]
- Creating a Large-scale Memory Error IoT Botnet Using NS3DockerEmulatorIslam Obaidat, Bennett Kahn, Fatemeh Tavakoli, Meera Sridhar. 470-479 [doi]
- DARPA: Combating Asymmetric Dark UI Patterns on Android with Run-time View DecoratorZhaoxin Cai, Yuhong Nan, Xueqiang Wang, Mengyi Long, Qihua Ou, Min Yang 0002, Zibin Zheng. 480-493 [doi]
- IoT Anomaly Detection Via Device Interaction GraphJincheng Wang, Zhuohua Li, Mingshen Sun, Bin Yuan, John C. S. Lui. 494-507 [doi]
- Time Machine: Generative Real-Time Model for Failure (and Lead Time) Prediction in HPC SystemsKhalid Ayedh Alharthi, Arshad Jhumka, Sheng Di, Lin Gui, Franck Cappello, Simon McIntosh-Smith. 508-521 [doi]
- How Different are the Cloud Workloads? Characterizing Large-Scale Private and Public Cloud WorkloadsXiaoting Qin, Minghua Ma, Yuheng Zhao, Jue Zhang, Chao Du, Yudong Liu, Anjaly Parayil, Chetan Bansal, Saravan Rajmohan, Íñigo Goiri, Eli Cortez, Si-qin, Qingwei Lin, Dongmei Zhang 0001. 522-530 [doi]
- On Adversarial Robustness of Point Cloud Semantic SegmentationJiacen Xu, Zhe Zhou 0001, Boyuan Feng, Yufei Ding, Zhou Li 0001. 531-544 [doi]
- Cost-Damage Analysis of Attack TreesMilan Lopuhaä-Zwakenberg, Mariëlle Stoelinga. 545-558 [doi]
- PASTA: Pragmatic Automated System-Theoretic Process AnalysisJette Petzold, Jana Kreiß, Reinhard von Hanxleden. 559-567 [doi]
- Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard ModelHaibin Zhang, Sisi Duan, Chao Liu, Boxin Zhao, Xuanji Meng, Shengli Liu, Yong Yu, Fangguo Zhang, Liehuang Zhu. 568-581 [doi]
- VoiceGuard: An Effective and Practical Approach for Detecting and Blocking Unauthorized Voice Commands to Smart SpeakersXuening Xu, Chenglong Fu 0002, Xiaojiang Du, E. Paul Ratazzi. 582-596 [doi]
- Speaker Orientation-Aware Privacy Control to Thwart Misactivation of Voice AssistantsShaohu Zhang, Aafaq Sabir, Anupam Das 0001. 597-610 [doi]