Abstract is missing.
- AuSSE: A Novel Framework for Security and Safety Evaluation for Autonomous VehiclesNhung H. Nguyen, Jin-Hee Cho, Terrence J. Moore, Seunghyun Yoon 0001, Hyuk Lim, Frederica Free-Nelson, Guangdong Bai, Dan Dongseong Kim. 1-5 [doi]
- An Experimental Characterization of Combined RowHammer and RowPress Read Disturbance in Modern DRAM ChipsHaocong Luo, Ismail Emir Yüksel, Ataberk Olgun, A. Giray Yaglikçi, Mohammad Sadrosadati, Onur Mutlu. 6-11 [doi]
- Exploring Use of Symbolic Execution for Service AnalysisYang Zhang, Long Wang, Zhengang Wang, Dongdong Shangguan. 12-16 [doi]
- When Green Computing Meets Performance and Resilience SLOsHaoran Qiu, Weichao Mao, Chen Wang 0039, Saurabh Jha, Hubertus Franke, Chandra Narayanaswami, Zbigniew Kalbarczyk, Tamer Basar, Ravishankar K. Iyer. 17-22 [doi]
- Neural Fault Injection: Generating Software Faults from Natural LanguageDomenico Cotroneo, Pietro Liguori. 23-27 [doi]
- PANDA: Practical Adversarial Attack Against Network Intrusion DetectionSubrat Kumar Swain, Vireshwar Kumar, Guangdong Bai, Dan Dongseong Kim. 28-32 [doi]
- Harnessing Explainability to Improve ML Ensemble ResilienceAbraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan. 33-37 [doi]
- On the Design of Coordination Services for IoTTiago Carvalho 0002, António Casimiro, Alysson Bessani. 38-42 [doi]
- Patching the Cracks: Detecting and Addressing Adversarial Examples in Real-World ApplicationsNiklas Bunzel. 43-46 [doi]
- Reducing the gap between theory and practice in real-time systems with MARSGiann Spilere Nandi, David Pereira, José Proença, Eduardo Tovar, Luís Nogueira. 47-49 [doi]
- MTD in Plain Sight: Hiding Network Behavior in Moving Target DefensesTina Moghaddam, Guowei Yang 0001, Chandra Thapa, Seyit Camtepe, Dan Dongseong Kim. 50-52 [doi]
- Advancing NDN Security for IoT: Harnessing Machine Learning to Detect AttacksSai Gautam Mandapati, Chathurika Ranaweera 0001, Robin Doss. 53-55 [doi]
- Novel CAN Bus Fuzzing Framework for Finding Vulnerabilities in Automotive SystemsManu Jo Varghese, Adnan Anwar, Frank Jiang 0001, Robin Doss. 56-58 [doi]
- Secure Data Provenance in Internet of Vehicles with Verifiable Credentials for Security and PrivacyAnuj Nepal, Robin Doss, Frank Jiang 0001. 59-61 [doi]
- (Re)-envisioning Approximate Agreement for Distributed Cryptography and OraclesAkhil Bandarupalli, Saurabh Bagchi, Aniket Kate. 62-64 [doi]
- Tutorial: Safe, Secure, and Trustworthy Artificial Intelligence (AI) via Formal Verification of Neural Networks and Autonomous Cyber-Physical Systems (CPS) with NNVTaylor T. Johnson, Diego Manzanas Lopez, Hoang-Dung Tran. 65-66 [doi]
- Zero-Knowledge Proofs for BlockchainsSushmita Ruj. 67-68 [doi]
- Evaluating Performance and Dependability of Blockchain Protocols with DiabloAndrei Lebedev, Vincent Gramoli. 69-70 [doi]
- Tutorial: LLTFI and the Art of Fault InjectionKarthik Pattabiraman, Abraham Chan. 71-72 [doi]
- Intrusion Detection at Scale with the Assistance of a Command-line Language ModelJiongliang Lin, Yiwen Guo, Hao Chen. 73-79 [doi]
- Bridging the Gap: A Study of AI-based Vulnerability Management between Industry and AcademiaShengye Wan, Joshua Saxe, Craig Gomes, Sahana Chennabasappa, Avilash Rath, Kun Sun 0001, Xinda Wang 0001. 80-87 [doi]
- Investigating Memory Failure Prediction Across CPU ArchitecturesQiao Yu, Wengui Zhang, Min Zhou, Jialiang Yu, Zhenli Sheng, Jasmin Bogatinovski, Jorge Cardoso 0001, Odej Kao. 88-95 [doi]
- Federated Unlearning in the Internet of VehiclesGuofeng Li, Xia Feng, Liang-Min Wang 0001, Haiqin Wu, Boris Düdder. 96-103 [doi]
- Zone-Hopping: Sensitive Information Leakage Prevention for DNSSEC-NSECFatema Bannat Wala, Stephan Bohacek. 104-110 [doi]
- Optimizing Large-Scale Fault Injection Experiments through Martingale Hypothesis: A Systematic Approach for Reliability Assessment of Safety-Critical SystemsSaurabh Hukerikar, Atieh Lotfi, Yanxiang Huang, Jason Campbell, Nirmal R. Saxena. 111-117 [doi]
- Active Learning Omnivariate Decision Trees for Fault Diagnosis in Robotic SystemsCasidhe Hutchison, Milda Zizyte, David Guttendorf, Claire Le Goues, Philip Koopman. 118-124 [doi]
- Empowering Data Centers with Computational Storage Drive-Based Deep Learning Inference Functionality to Combat RansomwareKurt Friday, Elias Bou-Harb, Ron Lee, Pramod Peethambaran, Mayank Saxena. 125-132 [doi]
- Road Decals as Trojans: Disrupting Autonomous Vehicle Navigation with Adversarial PatternsWei-Jia Chen, Chia-Yi Hsu, Wei-Bin Lee, Chia-Mu Yu, Chun-Ying Huang. 133-140 [doi]
- Fault Localization Using Interventional Causal Learning for Cloud-Native ApplicationsSaurabh Jha, Jesus Rios, Naoki Abe, Frank Bagehorn, Laura Shwartz. 141-147 [doi]
- Federated Anomaly DetectionChunjiong Zhang, Byeong-hee Roh, Gaoyang Shan. 148-149 [doi]
- Mitigating False Positives in DGA Detection for Non-English Domain NamesHuiju Lee, Huy Kang Kim. 150-151 [doi]
- Cryptography-Based Bootstrapping Scheme for Permissionless Sharding BlockchainZiqiang Xu, Ahmad Salehi S., Naveen K. Chilamkurti. 152-153 [doi]
- Poster: Optimizing Tree-based Quorum Certification for BFT Systems at Planetary-ScaleChristian Berger 0006, Hans P. Reiser. 154-156 [doi]
- Boosting Communication Efficiency of Federated Learning's Secure AggregationNiousha Nazemi, Omid Tavallaie, Shuaijun Chen, Albert Y. Zomaya, Ralph Holz. 157-158 [doi]
- Balancing Privacy and Attack Utility: Calibrating Sample Difficulty for Membership Inference Attacks in Transfer LearningShuwen Liu, Yongfeng Qian, Yixue Hao. 159-160 [doi]
- Synergizing GCN and GAT for Hardware Trojan Detection and LocalizationYu-Chen Hsiao, Chia-Heng Yen, Bo-Yang Ke, Kai-Chiang Wu. 161-162 [doi]