Abstract is missing.
- LLMPrism: Black-box Performance Diagnosis for Production LLM Training PlatformsZhihan Jiang, Rui Ren, Guangba Yu, Yulun Wu, Wenwei Gu, Yichen Li 0003, Yujie Huang, Cong Feng, Zengyin Yang, Yongqiang Yang, Michael R. Lyu. 1-7 [doi]
- Anomaly Detection in Energy Performance Certificates - From Oblivious to EnlightenedNawel Benarba, Mathieu Chevalier, Sara Bouchenak, Benjamin Bertin, Olivier Jung. 8-14 [doi]
- Beyond Component Failures: Safety Challenges in Complex Maritime Control SystemsOdd Ivar Haugen, Aleks Karlsen, Steven Mearns, Jan van Tiggelen. 15-21 [doi]
- To Protect the LLM Agent Against the Prompt Injection Attack with Polymorphic PromptZhilong Wang, Neha Nagaraja, Lan Zhang 0008, Hayretdin Bahsi, Pawan Patil, Peng Liu 0005. 22-28 [doi]
- When Features Gets Exploited: Functional Abuse and the Future of Industrial Fraud PreventionElisa Chiapponi, Umberto Fontana, Elyssa Boulila, Claudio Costanza, Vincent Rigal, Olivier Thonnard. 29-35 [doi]
- DDR5 DRAM Faults in the FieldMajed Valad Beigi, Yi Cao, Grace Tsai, Sudhanva Gurumurthi, Vilas Sridharan. 36-41 [doi]
- Assessing the Transferability of Adversarial Patches in Real-World Systems: Implications for Adversarial Testing of Image Recognition SecurityStephan Kleber, Jeremias Eppler, Tim Palm, Dennis Eisermann, Frank Kargl. 42-48 [doi]
- Security-by-Design at the Telco Edge with OSS: Challenges and Lessons LearnedCarmine Cesarano 0002, Alessio Foggia, Gianluca Roscigno, Luca Andreani, Roberto Natella. 49-55 [doi]
- Expectations Versus Reality: Evaluating Intrusion Detection Systems in PracticeLarry Huynh, Jake Hesford, Daniel Cheng, Alan Wan, Seungho Kim, Hyoungshick Kim, Jin B. Hong. 56-62 [doi]
- Bridging the Safety Gap: A C-ITS Solution for Protecting Vulnerable Road UsersMario Fiorentino, Michele Caggiano, Alessandro Magliacane, Angelo Coppola, Andrea Marchetta. 63-69 [doi]
- Observe and Regulate Memory Interference on MPSoC: a Practical ApproachAndrea Bastoni, Alexander Zuepke, Marco Solieri. 70-76 [doi]
- Cordial: Cross-row Failure Prediction Method Based on Bank-level Error Locality for HBMsWenwei Gu, Jiazhen Gu, Renyi Zhong, Wenyu Zhang, Ming Li, Michael R. Lyu. 77-83 [doi]
- Energy-Efficient Anomaly Detection in Autonomous Vehicles Using RSNNsDaeho Kim, Eun-Kyu Lee, Jiwoo Lee. 84-90 [doi]
- KubeChecker: Detecting Configuration Bugs in Container OrchestrationYilin Sun, Dian Lyu, Cheng Cui, Hui Xu. 91-97 [doi]
- Quantitative Security Metrics: Assessment of Cyberattack Scenarios for Cyber-Physical SystemsMike Da Silva, Nga Nguyen. 98-104 [doi]
- Regulating Prosumer Device Security: a Key Priority in Power Grid ProtectionAlfredo Petruolo, Luigi Coppolino, Roberto Nardone, Luigi Romano. 105-111 [doi]
- Runtime Verification of Program Organization Units in Safe Programmable Logic Controller SystemsHisham Unniyankal, Davide Ancona, Angelo Ferrando 0001, Fabio Parodi, Alessandro Alessi, Federico Bottino. 112-118 [doi]
- On the Feasibility of Exploiting the USB Power Line for Side-Channel Attacks against Samsung Smartphone ModelsLeonardo da Costa, Witor Oliveira, Caio Peres, Rene de Mello, Jonghun Song, Seokwon Jeong, Hyungchul Jung. 119-125 [doi]
- IAM Role Diet: A Scalable Approach to Detecting RBAC Data InefficienciesRoberto Moratore, Eduardo Barbaro, Yury Zhauniarovich. 126-132 [doi]
- An Open-source Implementation and Security Analysis of Triad's TEE Trusted Time ProtocolMatthieu Bettinger, Sonia Ben Mokhtar, Anthony Simonet-Boulogne. 133-139 [doi]
- Large-Scale AI Infra Reliability: Challenges, Strategies, and Llama 3 Training ExperienceXun Jiao, Abhinav Pandey, Karthik Pattabiraman, Fan Fred Lin. 140-146 [doi]
- Hardware Telemetry at Scale: A Case Study on SSDs Endurance Monitoring in DatacentersOlusiji Medaiyese, Fred Lin, Harish Dattatraya Dixit, Richa Mishra, Andrea Baglioni, Leandro Silva, Mike Elkin, Andrei Ilyashenko, Gor Safaryan, Dhankaran Singh Ajravat, Xun Jiao, Vineet Parekh. 147-152 [doi]
- Integrating Testing with Runtime Verification for Mission-Critical Distributed Control SystemsDavide Ancona, Stefano Avola, Angelo Ferrando 0001, Pierpaolo Baglietto, Maurice H. ter Beek, Andrea Parodi, Giancarlo Camera, Matteo Pinasco. 153-159 [doi]
- Be My Guest: Welcoming Interoperability into IBC-Incompatible BlockchainsMichal Nazarewicz, Dhruv D. Jain, Miguel Matos, Blas Rodriguez. 160-166 [doi]
- Towards Robust Autonomous Landing Systems: Iterative Solutions and Key Lessons LearnedSebastian Schroder, Yao Deng, Alice James, Avishkar Seth, Kye Morton, Subhas Mukhopadhyay, Richard Han 0001, Xi Zheng 0001. 167-173 [doi]
- Generative AI in Cybersecurity: Generating Offensive Code from Natural LanguagePietro Liguori, Roberto Natella, Domenico Cotroneo. 174-175 [doi]
- Quantum Computing and Post-Quantum Cryptography: Preparing for the Next Era of CybersecurityHazel Murray, George O'Mahony, Anila Mjeda. 176-177 [doi]
- Benchmarking AI Agents for IT Automation Tasks with ITBenchJackson Clark, Rohan R. Arora, Saurabh Jha. 178-179 [doi]
- Decentralized Federated Learning: Enhancing Reliability with BlockchainAntonella Del Pozzo, Maxence Perion. 180-181 [doi]
- Evaluating Blockchain Fault Tolerance with StablVincent Gramoli, Rachid Guerraoui, Andrei Lebedev, Gauthier Voron. 182-183 [doi]
- Model-based Qualitative Dependability and Security Evaluation : Half-Day TutorialAndrás Földvári, András Pataricza. 184-185 [doi]
- Assessing the Validity of LLM-Driven Hazard Analysis: An Assessor's PerspectiveMichael Kevvay, Vladislav Gryaznykh, Oleg Kirovskii, Anton Korolev. 186-190 [doi]
- Enhancing Accuracy in Approximate Byzantine Agreement with Bayesian InferenceRoy Shadmon, Owen Arden. 191-195 [doi]
- Replicating Human Immune System via Harmonic Radar: A Framework and Preliminary Results in Thwarting Cyber-physical AttacksNathanaël Denis, Roberto Di Pietro. 196-200 [doi]
- Digital Cluster Circuits for Reliable DatacentersDavide Rovelli, Patrick Eugster. 201-205 [doi]
- Trusted Federated Learning: Towards a Partial Zero-Knowledge Proof ApproachYannis Formery, Léo Mendiboure, Jonathan Villain, Virginie Deniau, Christophe Gransart, Stéphane Delbruel. 206-210 [doi]
- UniPHY: Unified Physical Layer Security for LPWANsStéphane Delbruel, Léo Mendiboure, Yannis Formery, Joachim Bruneau-Queyreix, Laurent Réveillère. 211-215 [doi]
- Rethinking BFT: Leveraging Diverse Software Components with LLMsJoão Imperadeiro, Ana Nunes Alonso, José Pereira 0001. 216-220 [doi]
- Strategies to Describe and Timely Detect AttacksTommaso Puccetti. 221-223 [doi]
- Effect of Human-Selected Hard Examples to Improve Accuracy of Semantic SegmentationYuriko Ueda, Marin Wada, Miho Adachi, Ryusuke Miyamoto. 224-226 [doi]
- Towards Provenance for Cybersecurity in Cloud-Native Production InfrastructurePaul R. B. Houssel, Sylvie Laniepce, Olivier Levillain. 227-229 [doi]
- Leaving No Blind Spots: Toward Automotive CybersecurityFrancesco Marchiori, Mauro Conti. 230-232 [doi]
- Enhanced Cybersecurity Monitoring in Multi-Plant Flexible Manufacturing EnvironmentsAntonio Iannaccone, Roberto Nardone. 233-235 [doi]
- On Predictive Modeling of Multi-Bit Upsets for Emulated Fault InjectionTrishna Rajkumar, Johnny Öberg. 236-238 [doi]
- AI Agent-based Adaptive Task Offloading for Autonomous Drones in Dynamic EnvironmentsQingyang Zhang, Fumio Machida. 239-241 [doi]
- ScamDetect: Towards a Robust, Agnostic Framework to Uncover Threats in Smart ContractsPasquale De Rosa, Pascal Felber, Valerio Schiavoni. 242-244 [doi]
- DeepICS: Deep Causal Relationship Modeling for Multi-Source Log-Based Anomaly Detection in Industrial Control SystemsSeong-Su Yoon, Dong-Hyuk Shin, Ieck-Chae Euom. 245-246 [doi]
- Poster: Designing Scalable, Secure Systems for Atomic-Scale Physical AI: Enabling Open Science and Collaborative Data Management and AnalyticsLewis Tseng, Yu-Tsun Shao. 247-248 [doi]
- Poster: Agree to Disagree: Revisiting the Comparison of (Multi-)Paxos and RaftLewis Tseng. 249-230 [doi]
- Jailbreaking Generative AI: Empowering Novices to Conduct Phishing AttacksRina Mishra, Gaurav Varshney, Shreya Singh. 251-252 [doi]
- Adaptive Identity Management: Unified Personalization and Privacy Protection for Web AppsMin-Chieh Wu, Yu-Sung Wu. 253-254 [doi]
- Intrusion Detection System with Domain-incremental Continual LearningHyejin Kim, Seunghyun Yoon 0001, Dan Dongseong Kim, Jin-Hee Cho, Terrence J. Moore, Frederica F. Nelson, Hyuk Lim. 255-256 [doi]
- Detecting Scrapers on E-commerce Websites Using a Reduced Feature SetUmberto Fontana, Elisa Chiapponi, Claudio Costanza, Vincent Rigal, Olivier Thonnard, Martynas Buozis, Hervé Debar. 257-258 [doi]
- Learnable Encryption with a Diffusion PropertyIjaz Ahmad 0002, Joongheon Kim, Seokjoo Shin. 259-260 [doi]
- Security Vulnerability Risk Growth Model based on CVSS 4.0Sora Okada, Masaya Shimakawa, Takashi Minohara. 261-262 [doi]
- TOSense: We Read, You ClickXinzhang Chen, Hassan Ali 0001, Arash Shaghaghi, Salil S. Kanhere, Sanjay K. Jha. 263-264 [doi]
- PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM OpcodesPasquale De Rosa, Simon Queyrut, Yérom-David Bromberg, Pascal Felber, Valerio Schiavoni. 265-266 [doi]
- Study of Appropriate Information Combination in Image-based Obfuscated Malware DetectionTetsuro Takahashi, Rikima Mitsuhashi, Masakatsu Nishigaki, Tetsushi Ohki. 267-268 [doi]
- Looking for Anomalies in Cross-Chain BridgesAndré Augusto, Rafael Belchior, Jonas Pfannschmidt, André Vasconcelos 0001, Miguel Correia 0001. 269-270 [doi]
- Real-Time GOOSE Attack Detection in IEC 61850 Substations Using SDN-Based Traffic InspectionSeunghyun Yoon 0001, Ryangsoo Kim, Hark Yoo, Hyuk Lim. 271-272 [doi]