Abstract is missing.
- Test of Time Award; DSN 2024Juan-Carlos Ruiz-Garcia, Homa Alemzadeh, Jean-Charles Fabre, Jiangshan Yu, Sy-Yen Kuo, Elias P. Duarte. [doi]
- Mutiny! How Does Kubernetes Fail, and What Can We Do About It?Marco Barletta, Marcello Cinque, Catello Di Martino, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer. 1-14 [doi]
- Reboot-Based Recovery of Unikernels at the Component LevelTakeru Wada, Hiroshi Yamada. 15-28 [doi]
- On the Correctness of Metadata-Based SBOM Generation: A Differential Analysis ApproachSheng Yu, Wei Song, Xunchao Hu, Heng Yin 0001. 29-36 [doi]
- SPP: Safe Persistent Pointers for Memory SafetyDimitrios Stavrakakis, Alexandrina Panfil, MJin Nam, Pramod Bhatotia. 37-52 [doi]
- Byzantine Attacks Exploiting Penalties in Ethereum PoSUlysse Pavloff, Yackolley Amoussou-Guenou, Sara Tucci Piergiovanni. 53-65 [doi]
- ADSynth: Synthesizing Realistic Active Directory Attack GraphsNhu Long Nguyen, Nickolas J. G. Falkner, Hung X. Nguyen. 66-74 [doi]
- Read Disturbance in High Bandwidth Memory: A Detailed Experimental Study on HBM2 DRAM ChipsAtaberk Olgun, Majd Osseiran, A. Giray Yaglikçi, Yahya Can Tugrul, Haocong Luo, Steve Rhyner, Behzad Salami 0001, Juan Gómez-Luna, Onur Mutlu. 75-89 [doi]
- A Fast Low-Level Error Detection TechniqueZhengyang He, Hui Xu 0009, Guanpeng Li. 90-98 [doi]
- Simultaneous Many-Row Activation in Off-the-Shelf DRAM Chips: Experimental Characterization and AnalysisIsmail Emir Yüksel, Yahya Can Tugrul, F. Nisa Bostanci, Geraldo F. Oliveira, A. Giray Yaglikçi, Ataberk Olgun, Melina Soysal, Haocong Luo, Juan Gómez-Luna, Mohammad Sadrosadati, Onur Mutlu. 99-114 [doi]
- Grunt Attack: Exploiting Execution Dependencies in MicroservicesXuhang Gu, Qingyang Wang 0001, Jianshu Liu, Jinpeng Wei. 115-128 [doi]
- PAROLE: Profitable Arbitrage in Optimistic Rollup with ERC-721 Token TransactionsAlvi Ataur Khalil, Mohammad Ashiqur Rahman. 129-141 [doi]
- iPrism: Characterize and Mitigate Risk by Quantifying Change in Escape RoutesShengkun Cui, Saurabh Jha, Ziheng Chen, Zbigniew T. Kalbarczvk, Ravishankar K. Iyer. 142-155 [doi]
- JITBULL: Securing JavaScript Runtime with a Go/No-Go Policy for JIT EngineJean-Baptiste Decourcelle, Boris Teabe, Daniel Hagimont. 156-168 [doi]
- Privacy Leakage from Logits Attack and its Defense in Federated DistillationDanyang Xiao, Diying Yang, Jialun Li, Xu Chen, Weigang Wu. 169-182 [doi]
- System Call Interposition Without CompromiseAdriaan Jacobs, Merve Gülmez, Alicia Andries, Stijn Volckaert, Alexios Voulimeneas. 183-194 [doi]
- Protecting Confidential Virtual Machines from Hardware Performance Counter Side ChannelsXiaoxuan Lou, Kangjie Chen, Guowen Xu, Han Qiu 0001, Shangwei Guo, Tianwei Zhang 0004. 195-208 [doi]
- ZLB: A Blockchain to Tolerate Colluding MajoritiesAlejandro Ranchal Pedrosa, Vincent Gramoli. 209-222 [doi]
- ZipChannel: Cache Side-Channel Vulnerabilities in Compression AlgorithmsMarina Minkin, Baris Kasikci. 223-237 [doi]
- ChainNet: A Customized Graph Neural Network Model for Loss-Aware Edge AI Service DeploymentZifeng Niu, Manuel Roveri, Giuliano Casale. 238-251 [doi]
- Goldfish: An Efficient Federated Unlearning FrameworkHouzhe Wang, Xiaojie Zhu, Chi Chen, Paulo Esteves Veríssimo. 252-264 [doi]
- IPMES: A Tool for Incremental TTP Detection Over the System Audit Event StreamHong-wei Li, Ping-Ting Liu, Bo-Wei Lin, Yi-Chun Liao, Yennun Huang. 265-273 [doi]
- Decentagram: Highly-Available Decentralized Publish/Subscribe SystemsHaofan Zheng, Tuan Tran, Roy Shadmon, Owen Arden. 274-287 [doi]
- Toward Evaluating Robustness of Reinforcement Learning with Adversarial PolicyXiang Zheng, Xingjun Ma, Shengjie Wang, Xinyu Wang, Chao Shen, Cong Wang. 288-301 [doi]
- Towards Shielding 5G Control Plane FunctionsSudip Maitra, Tolga O. Atalay, Angelos Stavrou, Haining Wang 0001. 302-315 [doi]
- A Comprehensive Study on Drones Resilience in the Presence of Inertial Measurement Unit FaultsAnamta Khan, Naghmeh Ivaki, Henrique Madeira. 316-323 [doi]
- Stealthy Peers: Understanding Security and Privacy Risks of Peer-Assisted Video StreamingSiyuan Tang, Eihal Alowaisheq, Xianghang Mi, Yi Chen, Xiaofeng Wang 0001, Yanzhi Dou. 324-337 [doi]
- Intrusion Tolerance for Networked Systems through Two-Level Feedback ControlKim Hammar, Rolf Stadler. 338-352 [doi]
- RABIT, a Robot Arm Bug Intervention Tool for Self-Driving LabsZainab Saeed Wattoo, Petal Vitis, Ruizhe Zhu, Noah Depner, Ivory Zhang, Jason Hein, Arpan Gujarati, Margo I. Seltzer. 353-361 [doi]
- Owl: Differential-Based Side-Channel Leakage Detection for CUDA ApplicationsYu Zhao, Wenjie Xue, Weijie Chen, Weizhong Qiang, Deqing Zou, Hai Jin 0001. 362-376 [doi]
- AOAB: Optimal and Fair Ordering of Financial TransactionsVincent Gramoli, Zhenliang Lu, Qiang Tang 0005, Pouriya Zarbafian. 377-388 [doi]
- BFTRAND: Low-Latency Random Number Provider for BFT Smart ContractsJinghui Liao, Borui Gong, Wenhai Sun, Fengwei Zhang, Zhenyu Ning, Man Ho Au, Weisong Shi. 389-402 [doi]
- Verifying Randomized Consensus Protocols with Common CoinsSong Gao, Bohua Zhan, Zhilin Wu, Lijun Zhang 0001. 403-415 [doi]
- Real-Time Intrusion Detection and Prevention with Neural Network in Kernel Using eBPFJunyu Zhang, Pengfei Chen 0002, Zilong He, Hongyang Chen, Xiaoyun Li. 416-428 [doi]
- PagPassGPT: Pattern Guided Password Guessing via Generative Pretrained TransformerXingyu Su, Xiaojie Zhu, Yang Li, Yong Li, Chi Chen, Paulo Jorge Esteves Veríssimo. 429-442 [doi]
- Iniva: Inclusive and Incentive-Compatible Vote AggregationArian Baloochestani, Hanish Gogada, Leander Jehl, Hein Meling. 443-455 [doi]
- Delphi: Efficient Asynchronous Approximate Agreement for Distributed OraclesAkhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Chen-Da Liu Zhang, Michael K. Reiter. 456-469 [doi]
- Moonshot: Optimizing Block Period and Commit Latency in Chain-Based Rotating Leader BFTIsaac Doidge, Raghavendra Ramesh, Nibesh Shrestha, Joshua Tobkin. 470-482 [doi]
- SyRep: Efficient Synthesis and Repair of Fast Re-Route Forwarding Tables for Resilient NetworksCsaba Györgyi, Kim G. Larsen, Stefan Schmid 0001, Jirí Srba. 483-494 [doi]
- FIRMRES: Exposing Broken Device-Cloud Access Control in IoT Through Static Firmware AnalysisYuting Xiao, Jiongyi Chen, Yupeng Hu, Jing Huang. 495-506 [doi]
- ChatScam: Unveiling the Rising Impact of ChatGPT on Domain Name AbuseMingxuan Liu, Zhenglong Jin, Jiahai Yang, Baoiun Liu, Haixin Duan, Ying Liu, Ximeng Liu, Shujun Tang. 507-521 [doi]
- SEDSpec: Securing Emulated Devices by Enforcing Execution SpecificationYang Chen, Shengzhi Zhang, Xiaoqi Jia, Qihang Zhou, Heqing Huang, Shaowen Xu, Haochao Du. 522-534 [doi]
- Offramps: An FPGA-Based Intermediary for Analysis and Modification of Additive Manufacturing Control SystemsJason Blocklove, Md Raz, Prithwish Basu Roy, Hammond Pearce, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri. 535-543 [doi]