Abstract is missing.
- Byzantine State Machine Replication in the Age of Blockchains: Fundamentals and Recent Results (Tutorial)Alysson Neves Bessani. 1 [doi]
- Quantum Computing Reliability: Problems, Tools, and Potential SolutionsEdoardo Giusto, Emanuele Dri, Bartolomeo Montrucchio, Betis Baheri, Qiang Guan, Devesh Tiwari, Paolo Rech. 2-3 [doi]
- Tutorial: Using the seL4 MicrokernelGernot Heiser, Ivan Velickovic. 4 [doi]
- Awesome Trusted Execution EnvironmentLuigi Coppolino, Giovanni Mazzeo, Luigi Romano. 5-6 [doi]
- HIRN: A Hierarchical Intent Refinement Approach for Dependable Network Slicing with Multi-path Resource AllocationZhixian Chu, Lingqi Guo, Jingyu Wang 0001, Qi Qi 0001, Zirui Zhuang, Haifeng Sun 0001, Cheng Zhou. 7-13 [doi]
- Data Shower in Electronics Manufacturing: Measuring Wi-Fi 4, Wi-Fi 6, and 5G SA behavior in production assembly linesGabriel Fré, Bilghean Erman, Catello Di Martino. 14-20 [doi]
- Hard Disk Drive Failure Analysis and Prediction: An Industry ViewZach Miller, Olusiji Medaiyese, Madhavan Ravi, Alex Beatty, Fred Lin. 21-27 [doi]
- ACE: An Analog Cell Emulator for Dependability Study of NAND Flash MemoryJeoungwon Lee, Heekwon Park, Gunhee Choi, Bryan S. Kim, Seehwan Yoo, Jaedong Lee, Jongmoo Choi. 28-34 [doi]
- EXPERT: EXPloiting DRAM ERror Types to Improve the Effective Forecasting Coverage in the FieldXiangjun Peng, Zheng Huang, Alex Cantrell, Bihua Shu, Ke Ke Xie, Yi Li, Yu Li, Li Jiang, Qiang Xu, Ming-Chang Yang. 35-41 [doi]
- An Integrated Runtime Verification and Simulation Testbed for UAM Hazard AssessmentAlexander Will, Aidan G. Collins, Robert Grizzard, Smitha Gautham, Patrick Martin 0003, Evan Dill, Carl R. Elks. 42-48 [doi]
- Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and TrainingDaisuke Mashima, Muhammad M. Roomi, Bennet Ng, Zbigniew Kalberczyk, S. M. Suhail Hussain, Ee-Chien Chang. 49-55 [doi]
- Large-Scale Application of Fault Injection into PyTorch Models -an Extension to PyTorchFI for Validation EfficiencyRalf Gräfe, Qutub Syed Sha, Florian Geissler, Michael Paulitsch. 56-62 [doi]
- Characterization and Exploration of Latch Checkers for Efficient RAS ProtectionKarthik Swaminathan, Ramon Bertran, Doug Balazich, Alper Buyuktosunoglu, Arvind Haran, Sean M. Carey, Karl Anderson, Hans M. Jacobson, Matthias Pflanz, Pradip Bose. 63-69 [doi]
- IEEE 802.1AS Multi-Domain Aggregation for Virtualized Distributed Real-Time SystemsJan Ruh, Wilfried Steiner, Gerhard Fohler. 70-76 [doi]
- ECHAIN: Securing Electronic Device Provenance through Privacy-Preserving Consortium BlockchainsAbdullah Al-Mamun 0001, Dongfang Zhao 0001. 77-83 [doi]
- Partitioned Containers: Towards Safe Clouds for Industrial ApplicationsMarco Barletta, Marcello Cinque, Luigi De Simone, Raffaele Della Corte, Giorgio Farina, Daniele Ottaviano. 84-88 [doi]
- How to Resuscitate a Sick VM in the CloudXuhua Ding. 89-93 [doi]
- Towards Rehosting Embedded Applications as Linux ApplicationsJayashree Srinivasan, Sai Ritvik Tanksalkar, Paschal C. Amusuo, James C. Davis 0001, Aravind Machiry. 94-99 [doi]
- rgpdOS: GDPR Enforcement By The Operating SystemAlain Tchana, Raphael Colin, Adrien Le Berre, Vincent Berger, Benoît Combemale, Ludovic Pailler. 100-104 [doi]
- Attacks on tomorrow's virtual worldIliès Benhabbour, Yérom-David Bromberg, Marc Dacier, Sven Dietrich, Rodrigo Miragaia Rodrigues, Paulo Esteves Veríssimo. 105-110 [doi]
- Skynet: a Cyber-Aware Intrusion Tolerant OverseerTadeu Freitas, João Soares, Manuel Eduardo Correia, Rolando Martins. 111-116 [doi]
- Fault Independence in BlockchainJiangshan Yu. 117-121 [doi]
- How to Learn Collaboratively - Federated Learning to Peer-to-Peer Learning and What's at StakeAtul Sharma, Joshua C. Zhao, Wei Chen 0124, Qiang Qiu, Saurabh Bagchi, Somali Chaterji. 122-126 [doi]
- Automatic Generation of Distributed Algorithms with Generative AIDiogo Vaz, David R. Matos, Miguel L. Pardal, Miguel Correia 0001. 127-131 [doi]
- Machine Learning on Public Intrusion Datasets: Academic Hype or Concrete Advances in NIDS?Marta Catillo, Antonio Pecchia, Umberto Villano. 132-136 [doi]
- No Free Wireless Charge: Covert Channels via Wireless Charging on Mobile DevicesWei-Yang Chiu, Weizhi Meng 0001, Brooke Lampe. 137-141 [doi]
- Big Data, Transmission Errors, and the InternetSusmit Shannigrahi, Craig Partridge. 142-145 [doi]
- Enhancing Honeypot Fidelity with Real-Time User Behavior EmulationSongsong Liu, Shu Wang, Kun Sun 0001. 146-150 [doi]
- An Experimental Analysis of RowHammer in HBM2 DRAM ChipsAtaberk Olgun, Majd Osseiran, Abdullah Giray Yaglikçi, Yahya Can Tugrul, Haocong Luo, Steve Rhyner, Behzad Salami 0001, Juan Gómez-Luna, Onur Mutlu. 151-156 [doi]
- The Path to Fault- and Intrusion-Resilient Manycore Systems on a ChipAli Shoker, Paulo Esteves Veríssimo, Marcus Völp. 157-162 [doi]
- Investigating the Impact of High-Level Software Design on Low-Level Hardware Fault ResilienceBohan Zhang, Lishan Yang, Guanpeng Li, Hui Xu 0009. 163-167 [doi]
- Assurance of Software-Intensive Medical Devices: What About Mental Harm?Jose Luis de la Vara, Barbara Gallina, Antonio Fernández-Caballero 0001, José Pascual Molina, Arturo S. García 0001, Clara Ayora. 168-172 [doi]
- Tailoring and Verification of the Trust Boundaries in a Heterogeneous TEE LandscapeAnna Galanou. 173-175 [doi]
- Enhancing IoT Security and Privacy with Trusted Execution Environments and Machine LearningPeterson Yuhala. 176-178 [doi]
- Advancing Blockchain Security: from Vulnerability Detection to Transaction RevocationFernando Richter Vidal, Naghmeh Ivaki, Nuno Laranjeiro. 179-181 [doi]
- Towards PHP Vulnerability Detection at an Intermediate Language LevelPaulo Antunes 0002, Ibéria Medeiros, Nuno Neves 0001. 182-184 [doi]
- A Workflow for Distributed and Resilient Attack Graph GenerationAlessandro Palma, Silvia Bonomi. 185-187 [doi]
- Automating Vulnerability Management in the Software Development LifecycleHoracio L. França, César Alexandre Teixeira, Nuno Laranjeiro. 188-190 [doi]
- Techniques and Tools for Runtime Security Monitoring and Analysis of MicroservicesJessica Castro, Nuno Laranjeiro, Marco Vieira. 191-193 [doi]
- Multi-Consistency Transactional Support for Function-as-a-ServiceRafael Soares, Luís Rodrigues. 194-196 [doi]
- Rich and Expressive Specification of Continuous-Learning Cyber-Physical SystemsThomas Flinkow, Barak A. Pearlmutter, Rosemary Monahan. 197-199 [doi]
- AutoLock: Automatic Design of Logic Locking with Evolutionary ComputationZeng Wang, Lilas Alrahis, Dominik Sisejkovic, Ozgur Sinanoglu. 200-202 [doi]
- Exploring the Environmental Benefits of In-Process Isolation for Software ResilienceMerve Gülmez, Thomas Nyman, Christoph Baumann, Jan Tobias Mühlberg. 203-205 [doi]
- Secure Compiler Framework to Design Fault Attack Resistant SoftwareKeerthi K. 0002, Chester Rebeiro. 206-208 [doi]
- Beyond Detection: Securing Robotic VehiclesPritam Dash, Karthik Pattabiraman. 209-210 [doi]
- Towards Transient Fault Mitigation Techniques Optimized for Compressed Neural NetworksAlessio Colucci. 211-213 [doi]
- Bayesian Network Reliability Modeling for Three-version Machine Learning SystemsQiang Wen, Fumio Machida. 214-216 [doi]
- Programmable SEL Test Monitoring System for Radiation Hardness AssuranceDaniele Rizzieri, Sarah Azimi, Luca Sterpone, Corrado De Sio, Thomas Borel, Viyas Gupta, Margherita Cardi. 217-223 [doi]
- Design with low complexity fine-grained Dual Core Lock-Step (DCLS) RISC-V processorsPegdwende Romaric Nikiema, Angeliki Kritikakou, Marcello Traiola, Olivier Sentieys. 224-229 [doi]
- Towards Reliability Assessment of Systolic Arrays against Stuck-at FaultsUdit Kumar Agarwal, Abraham Chan, Ali Asgari, Karthik Pattabiraman. 230-236 [doi]